{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00227080","sets":["1164:1579:11081:11309"]},"path":["11309"],"owner":"44499","recid":"227080","title":["秘匿情報を格納する変数のProof-Carrying Codeを用いた追跡と安全性評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-07-27"},"_buckets":{"deposit":"87da577d-4714-4675-9cd4-7521a4c4c20d"},"_deposit":{"id":"227080","pid":{"type":"depid","value":"227080","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"秘匿情報を格納する変数のProof-Carrying Codeを用いた追跡と安全性評価","author_link":["604354","604352","604353","604357","604359","604358","604356","604355"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"秘匿情報を格納する変数のProof-Carrying Codeを用いた追跡と安全性評価"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"耐障害性・セキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2023-07-27","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"NTT社会情報研究所"},{"subitem_text_value":"NTT社会情報研究所"},{"subitem_text_value":"テクニカルジャパン"},{"subitem_text_value":"NTTテクノクロス"},{"subitem_text_value":"NTTテクノクロス"},{"subitem_text_value":"NTT社会情報研究所"},{"subitem_text_value":"NTT社会情報研究所"},{"subitem_text_value":"NTT社会情報研究所"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/227080/files/IPSJ-ARC23254003.pdf","label":"IPSJ-ARC23254003.pdf"},"date":[{"dateType":"Available","dateValue":"2025-07-27"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-ARC23254003.pdf","filesize":[{"value":"367.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"16"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"479db26a-1066-4892-a594-5a33162f23b4","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"奥田, 哲矢"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中林, 美郷"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"堀之内, 謙一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"岡崎, 智行"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"小林, 鉄太郎"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山村, 和輝"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"宮澤, 俊之"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"福永, 利徳"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10096105","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8574","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本研究では,形式検証分野の技術である Proof-Carrying Code を用いて,解析対象プログラムが扱うパーソナルデータなどの秘匿情報について,秘匿情報を格納する変数にラベリングして追跡を行い,秘匿情報に対して適正に暗号化処理やハッシュ処理を行っているかを解析して,プログラムに証拠となる検証論理式を付与することで,秘匿情報が適正に管理されていることをプログラム実行者が検証可能となる仕組みを提案する.先行研究に比べて,LLVM-IR(中間表現)に基づいて解析を行うことで,解析対象プログラムの開発言語が限定されないこと,および,検証論理式の結合が可能なため,例えば,ソフトウェアサプライチェーンにおいてプログラムの追加や改変が行われる場合に,検証論理式のデータサイズと検証時間を低減し得ることが利点である.提案手法の評価として,暗号化処理やハッシュ処理を行う計 6 点の OSS 等サンプルプログラムに対して解析を行い,出力された検証論理式の全 57 件の内 53 件で安全性要件を充足するという検証結果が正しく得られることを確認した.また,内 4 件の安全性要件を充足しない検証結果については,デバッグ出力のコードが存在していることを確認し,デバッグ用のテストコードとしては問題がないこと,一方で,そのようなデバッグ用のコードが商用向けのコードに存在する場合など,開発者の意図しない設定や実装の誤りを是正することに本提案手法が有効であることが示唆された.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告システム・アーキテクチャ(ARC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2023-07-27","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2023-ARC-254"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":227080,"updated":"2025-01-19T12:17:02.497579+00:00","links":{},"created":"2025-01-19T01:26:23.727574+00:00"}