{"id":194480,"created":"2025-01-19T00:59:31.871077+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00194480","sets":["1164:2735:9724:9725"]},"path":["9725"],"owner":"44499","recid":"194480","title":["USBセキュリティに関するリスク推定に関する考察"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-02-21"},"_buckets":{"deposit":"1ecc8e09-34c0-42c9-b1c7-c635736a4c75"},"_deposit":{"id":"194480","pid":{"type":"depid","value":"194480","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"USBセキュリティに関するリスク推定に関する考察","author_link":["460419","460413","460416","460418","460411","460421","460417","460414","460412","460422","460415","460420"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"USBセキュリティに関するリスク推定に関する考察"},{"subitem_title":"Consideration on Risk Estimation for USB Security","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2019-02-21","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"長崎県立大学情報セキュリティ学科"},{"subitem_text_value":"長崎県立大学情報セキュリティ学科"},{"subitem_text_value":"長崎県立大学情報セキュリティ学科"},{"subitem_text_value":"長崎県立大学情報セキュリティ学科"},{"subitem_text_value":"長崎県立大学情報セキュリティ学科"},{"subitem_text_value":"国立研究開発法人情報通信研究機構"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/194480/files/IPSJ-MPS19122017.pdf","label":"IPSJ-MPS19122017.pdf"},"date":[{"dateType":"Available","dateValue":"2021-02-21"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-MPS19122017.pdf","filesize":[{"value":"805.8 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"17"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"4f716b54-3739-4b7e-883a-fce9d250db1f","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"西山, 魁人"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"鈴木, 海斗"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"田中, 雅浩"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"村田, 雄一朗"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"松田, 健"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"園田, 道夫"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kaito, Nishiyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kaito, Suzuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masahiro, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuichiro, Murata","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takeshi, Matsuda","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Michio, Sonoda","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10505667","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8833","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"データのやり取りや機器の接続時に,PC やマイコン,IoT 製品の USB ポートを利用する機会は多くのユーザーにとって少なからず存在するものと考えられる.USB セキュリティに関する情報は組織における研修やメディアなどを通じて共有されるようになりつつあるものの,身近にある USB 製品が安全なものであるかどうか検査する方法に関する従来研究は存在するが,未だ浸透しているとは言えないのが実情である.本稿では,USB ポートに接続された USB 機器のバイナリデータを解析することで有害なデータを含むUSBを検知する手法について考察を行う.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"It may be said that there are many opportunities to use PCs, microcomputers, USB ports of IoT products when exchanging data and connecting equipment. A lot of information on USB security are shared through organizational training and media. In addition, there exist conventional studies on how to check whether USB products are safe. However, many pepoples do not have software or devices that can check the safety of USB. This paper considers a method to detect USB including malicious data by analyzing binary data of USB device connected to USB port.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"3","bibliographic_titles":[{"bibliographic_title":"研究報告数理モデル化と問題解決(MPS)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2019-02-21","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"17","bibliographicVolumeNumber":"2019-MPS-122"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"updated":"2025-01-19T23:28:13.077513+00:00","links":{}}