{"id":197711,"created":"2025-01-19T01:02:08.589160+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00197711","sets":["1164:2735:9724:9827"]},"path":["9827"],"owner":"44499","recid":"197711","title":["文字コードの分布を考慮した特定データ検知手法の検討"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-06-10"},"_buckets":{"deposit":"89a979d4-fb1e-4836-9341-5586d1597f05"},"_deposit":{"id":"197711","pid":{"type":"depid","value":"197711","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"文字コードの分布を考慮した特定データ検知手法の検討","author_link":["475002","475005","474998","475004","475001","475000","475003","474999"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"文字コードの分布を考慮した特定データ検知手法の検討"},{"subitem_title":"Examination of specific data detection method considering distribution of character codes","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2019-06-10","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"長崎県立大学情報セキュリティ学科"},{"subitem_text_value":"長崎県立大学情報セキュリティ学科"},{"subitem_text_value":"長崎県立大学情報セキュリティ学科"},{"subitem_text_value":"国立研究開発法人情報通信研究機構"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/197711/files/IPSJ-MPS19123049.pdf","label":"IPSJ-MPS19123049.pdf"},"date":[{"dateType":"Available","dateValue":"2021-06-10"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-MPS19123049.pdf","filesize":[{"value":"842.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"17"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"fe8783dc-9cd7-46bf-9b4c-e06f3a9ec1e3","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"西山, 魁人"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"鈴木, 海斗"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"松田, 健"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"園田, 道夫"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kaito, Nishiyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kaito, Suzuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takeshi, Matsuda","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Michio, Sonoda","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10505667","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8833","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"コンピュータ上で操作することができるファイルは様々な種類のものが存在する.その中には,悪意のあるプログラムが含まれていたり,ユーザーのPCに何らかの害を与えるファイルが含まれている場合もある.本稿では,バイナリエディタを用いていくつかのファイル形式の文字コード,特にアスキーコードの分布の状態について調査することで,特定のデータやコードを含むファイルを自動検知する手法について考察を行う.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"There are various types of files that can be manipulated on the computer. It may contain malicious programs, or it may contain files that do some harm to your PC. In this paper, we examine a method of automatically detecting a file containing specific data or code by examining the character code of some file formats, especially the distribution state of ASCII code, using a binary editor.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"2","bibliographic_titles":[{"bibliographic_title":"研究報告数理モデル化と問題解決(MPS)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2019-06-10","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"49","bibliographicVolumeNumber":"2019-MPS-123"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"updated":"2025-01-19T22:14:21.320918+00:00","links":{}}