{"created":"2025-01-19T00:53:54.656001+00:00","updated":"2025-01-20T02:22:58.133659+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00187222","sets":["6164:6165:6462:9463"]},"path":["9463"],"owner":"11","recid":"187222","title":["マルウェアに実装されている仮想マシン検知機能の調査分析"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-10-16"},"_buckets":{"deposit":"a6ed68f0-8168-41bb-a1d9-b8b0d6cea69a"},"_deposit":{"id":"187222","pid":{"type":"depid","value":"187222","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"マルウェアに実装されている仮想マシン検知機能の調査分析","author_link":["422702","422704","422699","422703","422698","422697","422701","422695","422700","422696"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"マルウェアに実装されている仮想マシン検知機能の調査分析"},{"subitem_title":"Survey Analysis of Anti Virtual Machine Functions in Malicious Software","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"MWS,マルウェア,アンチVM,仮想マシン,動的解析","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2017-10-16","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社セキュアブレイン"},{"subitem_text_value":"株式会社セキュアブレイン"},{"subitem_text_value":"国立研究開発法人 情報通信研究機構"},{"subitem_text_value":"国立研究開発法人 情報通信研究機構"},{"subitem_text_value":"国立研究開発法人 情報通信研究機構"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"SecureBrain Corporation","subitem_text_language":"en"},{"subitem_text_value":"SecureBrain Corporation","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/187222/files/IPSJCSS2017047.pdf","label":"IPSJCSS2017047.pdf"},"date":[{"dateType":"Available","dateValue":"2019-10-16"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2017047.pdf","filesize":[{"value":"351.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"ba0a958a-1581-43c4-8450-57051425a0da","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2017 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"岩本, 一樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高田, 一樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"津田, 侑"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"遠峰, 隆史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"井上, 大介"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kazuki, Iwamoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazuki, Takada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yu, Tsuda","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takashi, Tomine","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Daisuke, Inoue","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"マルウェアの動的解析は静的解析に比べて短い時間でマルウェアの動作概要を知ることができる. そのため初動の対応として有効である.しかし,仮想マシンを検知することで動的解析を妨げる機能を有 するマルウェアが存在する.ゆえにマルウェアの仮想マシン検知機能を無効化して動的解析するシステム が必要である.システム構築のために,まずマルウェアに実装されている仮想マシン検知機能についての 情報を収集する.本研究では実際のマルウェアを静的解析した結果および文献から,仮想マシン検知機能を 分類し,それらへの対応方法を提案する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Dynamic analysis gives an outline of malware shorter time than static analysis. It is effective as initial response. However, some of malware have a function to prevent analyst from dynamic analysis by detecting virtual machine. Therefore, we need a dynamic analysis system which disable the virtual machine detection. For building the system, we survey functions of the virtual machine detection implemented in malware. In this paper, we propose the anti detection methods from the results of static analysis of wild malware and related works.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2017論文集"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2017-10-16","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2017"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":187222,"links":{}}