{"updated":"2025-01-19T18:48:50.936833+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00208555","sets":["6164:6165:6462:10428"]},"path":["10428"],"owner":"44499","recid":"208555","title":["マルウェアの動的解析回避処理の傾向についてのSoliton Dataset 2020の分析"],"pubdate":{"attribute_name":"公開日","attribute_value":"2020-10-19"},"_buckets":{"deposit":"c8eb120c-7cdd-45f8-8582-30cfb2076217"},"_deposit":{"id":"208555","pid":{"type":"depid","value":"208555","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"マルウェアの動的解析回避処理の傾向についてのSoliton Dataset 2020の分析","author_link":["523604","523603","523602","523605"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"マルウェアの動的解析回避処理の傾向についてのSoliton Dataset 2020の分析"},{"subitem_title":"Analysis of Soliton Dataset 2020 on Trends of Evasive Operations by Malware","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"マルウェア,解析回避,ログ解析","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2020-10-19","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"筑波大学"},{"subitem_text_value":"筑波大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"University of Tsukuba","subitem_text_language":"en"},{"subitem_text_value":"University of Tsukuba","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/208555/files/IPSJCSS2020127.pdf","label":"IPSJCSS2020127.pdf"},"date":[{"dateType":"Available","dateValue":"2022-10-19"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2020127.pdf","filesize":[{"value":"396.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"a80ecf74-9ff3-4ebd-b831-77ed01a3374b","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2020 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"玉林, 亜喬"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大山, 恵弘"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Akyo, Tamabayashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoshihiro, Oyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"現代のマルウェアの多くには,自身を解析されないように解析を回避する処理(解析回避処理)が組み込まれていることが知られている.<br>中でもデバッガでの解析を回避するもの(アンチデバッグ)や,<br>VM環境での解析を回避するもの(アンチVM)が主要である.<br>これらについてはこれまでに多くの研究がなされ様々な手法が発見され対策されているが,<br>これらの手法がどの程度の割合で利用されているのかといった具体的な知見は不足している.<br>本研究では,マルウェアの動的解析ログであるSoliton Dataset 2020を分析し,<br>2019年1月から2020年4月に収集されたマルウェアの解析回避処理の傾向を明らかにする.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"It is known that most modern malware incorporates operations that evade analysis (analysis evasion operations).<br>Among them, the ones that evade analysis by the debugger (anti-debug) and those that evade analysis in virtual machine environments (anti-VM) are the main ones.<br>Many studies have been conducted on these methods and various methods have been discovered and countermeasures have been taken so far, but specific knowledge such as the proportion of these methods used is insufficient.<br>In this research, we analyze Soliton Dataset 2020 which is a dynamic analysis log of malware, and clarify the tendency of analysis evasion operations of malware collected from January 2019 to April 2020.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"919","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2020論文集"}],"bibliographicPageStart":"912","bibliographicIssueDates":{"bibliographicIssueDate":"2020-10-19","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:09:56.458695+00:00","id":208555,"links":{}}