{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00184676","sets":["6164:6165:6617:9297"]},"path":["9297"],"owner":"11","recid":"184676","title":["Linux上のメモリ破壊攻撃群に対応するプログラムローダ"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-11-28"},"_buckets":{"deposit":"27a06822-2aa0-442e-99c2-c289b2ebaebf"},"_deposit":{"id":"184676","pid":{"type":"depid","value":"184676","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"Linux上のメモリ破壊攻撃群に対応するプログラムローダ","author_link":["408537","408525","408526","408534","408529","408538","408536","408531","408532","408527","408535","408533","408528","408530"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Linux上のメモリ破壊攻撃群に対応するプログラムローダ"},{"subitem_title":"Safe Trans Loader: Mitigation and Prevention of Memory Corruption on Linux","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2017-11-28","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学"},{"subitem_text_value":"国立研究開発法人産業技術総合研究所"},{"subitem_text_value":"明治大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Meiji University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Meiji University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Meiji University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Meiji University","subitem_text_language":"en"},{"subitem_text_value":"Meiji University","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Advanced Industrial Science and Technology","subitem_text_language":"en"},{"subitem_text_value":"Meiji University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/184676/files/IPSJ-ComSys2017001.pdf","label":"IPSJ-ComSys2017001.pdf"},"date":[{"dateType":"Available","dateValue":"2019-11-28"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-ComSys2017001.pdf","filesize":[{"value":"1.7 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"11"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"1aedc2c9-4956-4f9e-92ba-0e6bc49b4201","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2017 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"渡辺, 亮平"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"近藤, 秀太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"菅原, 捷汰"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"横山, 雅展"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中村, 慈愛"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"須崎, 有康"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"齋藤, 孝道"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ryohei, Watanabe","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shuta, Kondo","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shota, Sugawara","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masahiro, Yokoyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Jiai, Nakamura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kuniyasu, Suzaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takamichi, Saito","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"実行バイナリにおける脆弱性の一つであるメモリ破壊脆弱性は,現在でも報告が絶えない.一方で,これまでに,コンパイラ,リンカ,OS,ライブラリにおける対策技術が提案 ・ 実装されてきた.しかし,コンパイラやリンカにおける対策技術は,ソースコードが必要で,主に,開発フェーズでの適用を想定する.また,ライブラリにおける対策技術は,バージョンなどの依存関係により適用できない場合がある.加えて,我々の先行研究により,主要な Linux ディストリビューションにおいて,コンパイラのセキュリティオプションが適用されていないバイナリが一定数存在することが示された.本論文の調査で,新たに 「メモリ破壊を招くライブラリ関数」 が現在でも一定数利用されていることがわかった.そこで,本論文では,ソースコードが入手できない配布済みの実行バイナリへ適用できるアプリケーションレベルのプログラムローダを用いたメモリ破壊攻撃への総合的な対策を提案する.提案手法では,「メモリ破壊を招くライブラリ関数」 をより安全な代替関数に置換をすることで,代表的なメモリ破壊攻撃を緩和する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Memory corruption vulnerabilities continue to be serious threats and reported even now. Until today, many countermeasures in compiler, linker, OS, and library have been proposed and implemented. However, countermeasures in compilers and linkers require source code, and are expected to be mainly applied in the development phase. Also, library countermeasures may not be applicable depending on its dependency version. Moreover, our previous research showed that there were a certain number of binaries without compiler security options in major Linux distributions. We found newly that a certain number of ”library functions causing memory corruption” such as strcpy function is still being used in the binaries. In this paper, we propose comprehensive countermeasure against memory corruption attacks by using application-level program loader which can apply to distributed binaries. Our proposed method mitigates representative memory corruption attacks by replacing ”library functions causing memory corruption” with safer alternative functions.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"11","bibliographic_titles":[{"bibliographic_title":"コンピュータシステム・シンポジウム論文集"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2017-11-28","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2017"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":184676,"updated":"2025-01-20T03:12:42.813949+00:00","links":{},"created":"2025-01-19T00:51:59.895147+00:00"}