{"updated":"2025-01-19T12:47:01.804159+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00225518","sets":["1164:2822:11181:11182"]},"path":["11182"],"owner":"44499","recid":"225518","title":["組込みシステムシミュレータを用いたファジング"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-03-16"},"_buckets":{"deposit":"98dc3817-dc03-4b9e-9c94-5a7e3f65aec1"},"_deposit":{"id":"225518","pid":{"type":"depid","value":"225518","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"組込みシステムシミュレータを用いたファジング","author_link":["596902","596900","596899","596901"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"組込みシステムシミュレータを用いたファジング"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"設計手法・テスト手法・並列分散処理1","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2023-03-16","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"名古屋大学大学院情報学研究科"},{"subitem_text_value":"名古屋大学大学院情報学研究科"},{"subitem_text_value":"名古屋大学大学院情報学研究科"},{"subitem_text_value":"名古屋大学大学院情報学研究科"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Informatics, Nagoya University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Informatics, Nagoya University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Informatics, Nagoya University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Informatics, Nagoya University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/225518/files/IPSJ-EMB23062011.pdf","label":"IPSJ-EMB23062011.pdf"},"date":[{"dateType":"Available","dateValue":"2025-03-16"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-EMB23062011.pdf","filesize":[{"value":"959.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"42"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"ec37ce67-76ec-4b6c-90ec-3cb6b1f63680","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"元田, 匡哉"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"伊藤, 弘将"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"松原, 豊"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高田, 広章"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12149313","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-868X","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,IoT の普及に伴い,ファームウェアに含まれる脆弱性によるセキュリティの脅威が増加し,対策が求められている.ファームウェアに含まれる脆弱性を見つける手法として,ファジングが利用されている.このとき,実機を使用せずにファジングを適用するために,Rehosting という手法がある.Rehosting は,ファームウェアを,ハードウェアの挙動を十分にモデル化した仮想環境へ移行する手法である.既存の Rehosting では,周辺回路の近似モデルを作成するため,モデルの挙動は実機と異なる.近似モデルの構築では,ファジング実行時にファームウェアの実行継続性を優先したり,ハードウェアに依存するコードを置換したりする.その結果,ハードウェアの異常対策コードや,システム起動処理における周辺回路の初期化コードをテストできないという問題が生じる.本研究では,組込みシステムシミュレータ Renode とファジングツール AFL を組み合わせたファジング環境を構築し,この課題を解決する.テスト対象の周辺回路の振舞いをより正確にモデル化し,特定のレジスタに対してファジングを行う.提案手法を,既存手法の評価に用いられたファームウェアとシリアル通信 UART の初期化時における異常系コードに対して適用した.その結果,UART に起因する既知の Buffer Overflow 脆弱性を検知し,UART の初期化時における異常系コードのファジングに成功した.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告組込みシステム(EMB)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2023-03-16","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"11","bibliographicVolumeNumber":"2023-EMB-62"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:25:01.573905+00:00","id":225518,"links":{}}