{"updated":"2025-01-19T18:28:52.962392+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00209558","sets":["1164:6389:10492:10493"]},"path":["10493"],"owner":"44499","recid":"209558","title":["適応的サンドボックスによる持続感染型IoTマルウェアの解析"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-02-22"},"_buckets":{"deposit":"567a12d8-7f5b-4ae8-a448-bac46effe650"},"_deposit":{"id":"209558","pid":{"type":"depid","value":"209558","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"適応的サンドボックスによる持続感染型IoTマルウェアの解析","author_link":["528461","528460","528455","528467","528457","528453","528451","528447","528456","528450","528462","528465","528449","528454","528458","528466","528452","528448","528446","528464","528459","528463"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"適応的サンドボックスによる持続感染型IoTマルウェアの解析"},{"subitem_title":"Dynamic Analysis of Persistent IoT Malware Using Adaptive Sandbox","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ICSS","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2021-02-22","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"横浜国立大学"},{"subitem_text_value":"横浜国立大学/富士ソフト株式会社"},{"subitem_text_value":"横浜国立大学/株式会社レインフォレスト"},{"subitem_text_value":"横浜国立大学/株式会社レインフォレスト"},{"subitem_text_value":"NTT セキュアプラットフォーム研究所"},{"subitem_text_value":"横浜国立大学/NTT セキュアプラットフォーム研究所"},{"subitem_text_value":"横浜国立大学"},{"subitem_text_value":"横浜国立大学"},{"subitem_text_value":"横浜国立大学"},{"subitem_text_value":"横浜国立大学"},{"subitem_text_value":"横浜国立大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University / FUJISOFT INCORPORATED","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University / RainForest","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University / RainForest","subitem_text_language":"en"},{"subitem_text_value":"NTT Secure Platform Laboratories","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University / NTT Secure Platform Laboratories","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/209558/files/IPSJ-SPT21041021.pdf","label":"IPSJ-SPT21041021.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT21041021.pdf","filesize":[{"value":"1.6 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"007e17f7-8daf-45bb-9e47-db48cc1d5837","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"井上, 貴弘"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"原, 悟史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"榊, 博史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"岡田, 晃市郎"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"塩治, 榮太朗"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"秋山, 満昭"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"佐々木, 貴之"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"田辺, 瑠偉"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉岡, 克成"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中尾, 康二"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"松本, 勉"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takahiro, Inoue","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Satoshi, Hara","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hironobu, Sakaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kouichirou, Okada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Eitaro, Shioji","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mitsuaki, Akiyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takayuki, Sasaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Rui, Tanabe","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Katsunari, Yoshioka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Koji, Nakao","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tsutomu, Matsumoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8671","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"脆弱な IoT 機器に感染するマルウェアの高度化が進みつつある.従来の IoT マルウェアとは異なり,機器の再起動後も永続的に感染し続ける持続感染型 IoT マルウェアの事例が報告されている.このようなマルウェアは特定の機器の構成に依存するため,一般的な組み込み OS を用いた仮想環境による動的解析では挙動を正しく観測することができないことが想定される.本研究では,マルウェアが実行するシステムコールを分析することにより,対象 とするIoT 機器の構成を推定し,マルウェアが動作する環境に仮想環境を適応させる手法を提案する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persistent IoT malware that continues to infect devices even after their reboot has been reported. Since such malware depends on the configuration of a specific device, it is assumed that the behavior cannot be observed correctly by dynamic analysis using a virtual environment based on a general embedded OS. In this study, we propose a method to estimate the configuration of the target IoT devices by analyzing system calls executed by the malware and to adapt the sandbox to the environment in which the malware can work.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2021-02-22","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"21","bibliographicVolumeNumber":"2021-SPT-41"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:10:51.620930+00:00","id":209558,"links":{}}