{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00222514","sets":["6164:6805:6807:11063"]},"path":["11063"],"owner":"44499","recid":"222514","title":["Linuxアプリケーションバイナリにおけるコンパイラセキュリティオプションの有効性の静的解析"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-01-19"},"_buckets":{"deposit":"5b11f3fa-da80-441d-a2fc-093377145b13"},"_deposit":{"id":"222514","pid":{"type":"depid","value":"222514","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Linuxアプリケーションバイナリにおけるコンパイラセキュリティオプションの有効性の静的解析","author_link":["583936","583928","583935","583929","583930","583937","583939","583941","583931","583934","583932","583940","583933","583938"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Linuxアプリケーションバイナリにおけるコンパイラセキュリティオプションの有効性の静的解析"},{"subitem_title":"Static Analysis of Effectiveness of Compiler Security Options in Linux Application Binaries","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"メモリ破壊攻撃,対策技術の適用状況,普及度の違い","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2018-01-19","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学"},{"subitem_text_value":"国立研究開発法人産業技術総合研究所"},{"subitem_text_value":"明治大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Meiji","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Meiji","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Meiji","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Meiji","subitem_text_language":"en"},{"subitem_text_value":"University Meiji","subitem_text_language":"en"},{"subitem_text_value":"University National Institute of Advanced Industrial Science and Technology","subitem_text_language":"en"},{"subitem_text_value":"University Meiji","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/222514/files/IPSJ-WPRO2018027.pdf","label":"IPSJ-WPRO2018027.pdf"},"date":[{"dateType":"Available","dateValue":"2018-01-19"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-WPRO2018027.pdf","filesize":[{"value":"1.2 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"03bcdfe1-a303-42f3-aed2-8686d885af7c","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"近藤, 秀太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"渡辺, 亮平"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"菅原, 捷汰"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"横山, 雅展"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中村, 慈愛"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"須崎, 有康"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"齋藤, 孝道"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Shuta, Kondo","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ryohei, Watanabe","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shota, Sugawara","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masahiro, Yokoyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Jiai, Nakamura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kuniyasu, Suzaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takamichi, Saito","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"現在のLinuxアプリケーションはコンパイラで複数のセキュリティオプションを有効にして,バイナリが作成される.しかしながら,このセキュリティオプションにより期待されるセキュリティ機能が,すべてのバイナリに対して有効であるかは不明である.本論文では,4つのセキュリティ対策技術(スタックを保護するSSP, ELFバイナリのgotセクションを読み出し専用にするRELRO,メモリのランダム配置を有効にするPIE,脆弱なライブラリ関数を置き換えるAutomatic Fortification)がどの程度有効化しているかを3つのLinuxディストリビューション(CentOS, Ubuntu, openSuse)の4世代に対して総数30,000以上のバイナリおよびパッケージの調査を行った.この結果,セキュリティ対策技術が開発者の期待通り適用されていないこと,普及度に違いがあること,また,過去にビルドされた古いパッケージを利用し続けているディストリビューションが存在することが分かった.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"220","bibliographic_titles":[{"bibliographic_title":"第59回プログラミング・シンポジウム予稿集"}],"bibliographicPageStart":"207","bibliographicIssueDates":{"bibliographicIssueDate":"2018-01-19","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2018"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":222514,"updated":"2025-01-19T13:43:07.406408+00:00","links":{},"created":"2025-01-19T01:22:27.978771+00:00"}