{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00201310","sets":["6164:6165:6462:10022"]},"path":["10022"],"owner":"44499","recid":"201310","title":["Javaバイトコードを対象とした命令の頻度解析による適用難読化ツールの特定"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-10-14"},"_buckets":{"deposit":"910341ae-7cd4-40d6-9caf-a594348d6977"},"_deposit":{"id":"201310","pid":{"type":"depid","value":"201310","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Javaバイトコードを対象とした命令の頻度解析による適用難読化ツールの特定","author_link":["491783","491784","491782","491781"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Javaバイトコードを対象とした命令の頻度解析による適用難読化ツールの特定"},{"subitem_title":"Identifying Applied Obfuscation Tools by Analyzing Opcode Frequencies for the JVM Platform","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"難読化,逆変換,ソフトウェア保護,頻度分析","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2019-10-14","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"京都産業大学"},{"subitem_text_value":"熊本高等専門学校"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Kyoto Sangyo University","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Technology, Kumamoto College","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/201310/files/IPSJCSS2019017.pdf","label":"IPSJCSS2019017.pdf"},"date":[{"dateType":"Available","dateValue":"2021-10-14"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2019017.pdf","filesize":[{"value":"506.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"c6cffbce-435d-49e5-8c99-7d13331df322","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"玉田, 春昭"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"神崎, 雄一郎"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Haruaki, Tamada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuichiro, Kanzaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年様々なソフトウェア保護手法が提案・リリースされている.しかしながら,それらについての評価が十分であるとは言い難いのが現状である.本研究ではJVMプラットフォーム向けの既存の難読化ツールに焦点を当て,逆変換の困難さの評価を目指す.逆変換のためには,どのようなツール/手法が適用されたかを特定する必要がある.そのために,逆難読化の困難さ評価の足掛かりとして,本稿では適用された難読化ツールの特定を試みる.ツールの特定には,あらかじめ多くのツールで難読化しておいたソフトウェアを用意する.それらのソフトウェアから命令列のk-gramの頻度を記録しておく.そして,ソフトウェアが与えられた時,その命令列のk-gramの頻度を抽出し,記録しておいたものと比較することで,適用された難読化ツールの特定を試みる.評価実験の結果,Allatoriの製品版は特定が可能である反面,ProGuard,yGuardは命令列の変更が少ないため,判定が困難であることがわかった.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Currently, many software protection methods and tools were proposed and released. However, enough evaluation is not conducted for those methods and tools. This paper focuses on the existing obfuscation tools for the JVM platform and evaluates tolerance against de-obfuscation. Generally, we must identify the applied tools/methods at the first step for de-obfuscation. Therefore, this paper tries to identify applied obfuscation tools. The proposed method extracts the frequencies of opcode k-grams from many obfuscated software, and store them. Then, we try to identify the method by matching the opcode k-grams from the given software protected by some tool. From our experimental evaluation, the proposed method succeeded to identify Allatori; however, could not identify ProGuard and yGuard because ProGuard and yGuard change only little opcode sequences.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"124","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2019論文集"}],"bibliographicPageStart":"119","bibliographicIssueDates":{"bibliographicIssueDate":"2019-10-14","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2019"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":201310,"updated":"2025-01-19T21:06:00.316196+00:00","links":{},"created":"2025-01-19T01:04:35.117791+00:00"}