{"updated":"2025-01-19T18:48:47.592583+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00208557","sets":["6164:6165:6462:10428"]},"path":["10428"],"owner":"44499","recid":"208557","title":["ランサムウェアに対する一対策とその実装"],"pubdate":{"attribute_name":"公開日","attribute_value":"2020-10-19"},"_buckets":{"deposit":"a55fb7d4-4053-4d1d-b9f5-f1ae5d87688c"},"_deposit":{"id":"208557","pid":{"type":"depid","value":"208557","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"ランサムウェアに対する一対策とその実装","author_link":["523618","523621","523622","523623","523620","523616","523617","523613","523619","523612","523615","523614"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ランサムウェアに対する一対策とその実装"},{"subitem_title":"A Countermeasure against Ransomware and Their Implementation","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ランサムウェア,マルウェア","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2020-10-19","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"神戸大学院工学研究科"},{"subitem_text_value":"キヤノンマーケティングジャパン株式会社マルウェアラボ"},{"subitem_text_value":"キヤノンマーケティングジャパン株式会社マルウェアラボ"},{"subitem_text_value":"キヤノンマーケティングジャパン株式会社マルウェアラボ"},{"subitem_text_value":"神戸大学院工学研究科"},{"subitem_text_value":"神戸大学院工学研究科"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Engineering, Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Malware Laboratory, Endpoint Security Technology Development Division, Endpoint Security Planning Group, Canon Marketing Japan Inc.","subitem_text_language":"en"},{"subitem_text_value":"Malware Laboratory, Endpoint Security Technology Development Division, Endpoint Security Planning Group, Canon Marketing Japan Inc.","subitem_text_language":"en"},{"subitem_text_value":"Malware Laboratory, Endpoint Security Technology Development Division, Endpoint Security Planning Group, Canon Marketing Japan Inc.","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Engineering, Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Engineering, Kobe University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/208557/files/IPSJCSS2020129.pdf","label":"IPSJCSS2020129.pdf"},"date":[{"dateType":"Available","dateValue":"2022-10-19"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2020129.pdf","filesize":[{"value":"652.8 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"6445c153-87de-448f-989f-e570fc81f7d3","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2020 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"古門, 良介"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"池上, 雅人"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"住田, 裕輔"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"木谷, 浩"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"白石, 善明"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森井, 昌克"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ryosuke, Kokado","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masato, Ikegami","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yusuke, Sumida","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroshi, Kitani","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoshiaki, Shiraishi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masakatu, Morii","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"コンピュータウイルスとかつて呼ばれたマルウェアの登場とその被害発生からほぼ半世紀,インターネットの隆盛とともマルウェアの被害はさらに深刻に,そして広範囲に渡るようになった.現在でもマルウェアへの対策はサイバー社会の安全安心に対して不可欠かつ最重要な課題なのである.ここ数年,ランサムウェアと呼ばれる,サーバやパソコンを含む端末デバイス上のデータを暗号化し,その復号鍵を質に,対価(身代金)を要求するマルウェアが流行している.<br>ランサムウェアは暗号化に際して,安全性が証明された外部の暗号ライブラリ等を利用して,公開鍵暗号方式と共通鍵暗号を組み合わせたハイブリット暗号方式で強固にデータを暗号化する.そのため,ランサムウェア感染後に暗号化されたデータを復号するのは困難である.<br>本研究では,ランサムウェアの感染時,その暗号化プロセスに対してDLLインジェクションすることで暗号化に用いられる暗号鍵を意図的に任意の秘匿鍵にすり替え,暗号化データの復号を容易にする手法について紹介する.さらに前述の機能実装とその評価についておこなった.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In recent years, malware called ransomware, which encrypts data on terminal devices, including servers and personal computers, and requires a price (ransom) based on the quality of the decryption key, has become popular.<br>In this paper, we introduce a technique to facilitate the decryption of ransomware by intentionally replacing the encryption key with an arbitrary secret key by DLL injection for the encryption process. In this paper, we present the implementation and evaluation of the aforementioned functions.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"931","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2020論文集"}],"bibliographicPageStart":"926","bibliographicIssueDates":{"bibliographicIssueDate":"2020-10-19","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:09:56.569256+00:00","id":208557,"links":{}}