{"created":"2025-01-19T01:44:10.195617+00:00","updated":"2025-01-19T08:04:05.779377+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00240146","sets":["6164:6165:6640:11802"]},"path":["11802"],"owner":"44499","recid":"240146","title":["不正コード検出のためのソースコード分割方法の検討"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-06-19"},"_buckets":{"deposit":"8fff7113-3385-4de4-a647-1e25dcb51a6a"},"_deposit":{"id":"240146","pid":{"type":"depid","value":"240146","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"不正コード検出のためのソースコード分割方法の検討","author_link":["658449","658450"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"不正コード検出のためのソースコード分割方法の検討"},{"subitem_title":"Investigating Source Code Partitioning Methods for Malicious Code Detection","subitem_title_language":"en"}]},"item_type_id":"18","publish_date":"2024-06-19","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"創価大学"},{"subitem_text_value":"創価大学"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/240146/files/IPSJ-DICOMO2024030.pdf","label":"IPSJ-DICOMO2024030.pdf"},"date":[{"dateType":"Available","dateValue":"2026-06-19"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DICOMO2024030.pdf","filesize":[{"value":"1.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"2e577b28-ea85-45c2-8a37-5eb89497ed45","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"須藤, 智也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"寺島, 美昭"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"ソフトウェア開発における OSS 等の第三者によるソフトウェアの利用が増えており,そのセキュリティ対策は課題である.近年では,機密情報の流出やマルウェアをダウンロードさせるコード片を広く使用されている OSS に挿入し,利用者の環境で実行させる攻撃が報告されている.本研究は,こうした本来の OSS の意図とは異なるコード片を不正コードと定義し,言語モデルによってドキュメント文との関連度を用いて検出する手法を提案する.本稿では,この手法におけるソースコード分割手法としてプログラムスライスを導入した.実装実験において,スライスに基づく分割手法を適用した場合に高い精度を示し,かつ不正コードと正常コードの混在の影響が軽減され,頑健な検出が可能であることを示した.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"220","bibliographic_titles":[{"bibliographic_title":"マルチメディア,分散,協調とモバイルシンポジウム2024論文集"}],"bibliographicPageStart":"215","bibliographicIssueDates":{"bibliographicIssueDate":"2024-06-19","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2024"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":240146,"links":{}}