{"created":"2025-01-19T01:27:55.807621+00:00","updated":"2025-01-19T11:43:04.619147+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00228793","sets":["6164:6165:6462:11379"]},"path":["11379"],"owner":"44499","recid":"228793","title":["表層解析と動的解析に基づくIoTマルウェアの攻撃傾向分析"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-10-23"},"_buckets":{"deposit":"d4bcaa2d-3bff-4269-9679-ebcea9f7a1c6"},"_deposit":{"id":"228793","pid":{"type":"depid","value":"228793","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"表層解析と動的解析に基づくIoTマルウェアの攻撃傾向分析","author_link":["613999","613998","613995","614002","614001","613996","613997","614000"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"表層解析と動的解析に基づくIoTマルウェアの攻撃傾向分析"},{"subitem_title":"Attack trend analysis of IoT malware based on surface and dynamic analysis","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"IoTマルウェア,ハニーポット,表層解析,動的解析","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2023-10-23","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社セキュアブレイン/横浜国立大学先端科学高等研究院"},{"subitem_text_value":"株式会社セキュアブレイン"},{"subitem_text_value":"株式会社セキュアブレイン"},{"subitem_text_value":"横浜国立大学大学院環境情報研究院/先端科学高等研究院"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"SecureBrain Corporation / Yokohama National University Institute of Advanced Sciences","subitem_text_language":"en"},{"subitem_text_value":"SecureBrain Corporation","subitem_text_language":"en"},{"subitem_text_value":"SecureBrain Corporation","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University Graduate School of Environment and Information Sciences / Institute of Advanced Sciences","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/228793/files/IPSJ-CSS2023180.pdf","label":"IPSJ-CSS2023180.pdf"},"date":[{"dateType":"Available","dateValue":"2025-10-23"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2023180.pdf","filesize":[{"value":"1.2 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"2a1c25e4-a3f2-4192-8778-e74950437274","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"高田, 一樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"巻島, 和雄"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"岩本, 一樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉岡, 克成"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kazuki, Takada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazuo, Makishima","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazuki, Iwamoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Katsunari, Yoshioka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"IoT 機器を狙ったサイバー攻撃が一般的になりつつある.これに伴い,IoT 機器に感染するマルウェア(IoTマルウェア)を用いたサイバー攻撃も増加している.IoT 機器に対する攻撃実態の解明を目的として IoT 機器を模したハニーポットが考案されている.本研究では,IoT 機器向けの攻撃を観測するためのハニーポットである IoTPOT と X-POT の 2 種類のハニーポットで収集した IoT マルウェアを対象に表層解析と動的解析を行うことで攻撃の傾向を明らかにすることを目的とする.まず,表層解析の結果から IoT マルウェアの対象アーキテクチャ,利用するランタイムライブラリおよびパックの有無などの傾向について明らかにする.次に,ARM および MIPS アーキテクチャ上で動作する IoT マルウェアを対象に動的解析を行った結果から IoT マルウェアの通信先である C&C サーバの傾向および C&C サーバとの最初の通信のペイロードの内容から IoT マルウェアファミリの分類を行った結果について述べる.また,全解析結果を通して IoT マルウェアを用いた攻撃の傾向について考察する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Cyberattacks against IoT devices are becoming increasingly common. As a result, malware that infects IoT devices is increasing. It is called IoT malware. Honeypots that mimic IoT devices have been devised aiming to reveal cyberattacks against IoT devices. IoTPOT and X-POT are efficient honeypots for this purpose. In this research, we analyze IoT malware by surface and dynamic analysis, which is collected by IoTPOT and X-POT.  Then we consider the attack trend of IoT malware based on that results. First, It is revealed targeted architectures, used runtime libraries, and the existence of pack. Then we execute a dynamic analysis of malware to work on ARM and MIPS. Accordingly, it is clarified the trend of a malware family and used C&C server. Finally, we consider the attack trend of IoT malware through whole results.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1324","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2023論文集"}],"bibliographicPageStart":"1317","bibliographicIssueDates":{"bibliographicIssueDate":"2023-10-23","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":228793,"links":{}}