{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00240906","sets":["6164:6165:6462:11854"]},"path":["11854"],"owner":"11","recid":"240906","title":["IoT機器における起動時自動実行プログラム特定手法の検証と評価"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2024-10-15"},"_buckets":{"deposit":"a11fec87-53e0-480c-ac20-ff4685d8a5be"},"_deposit":{"id":"240906","pid":{"type":"depid","value":"240906","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"IoT機器における起動時自動実行プログラム特定手法の検証と評価","author_link":["662112","662113","662114","662115","662116","662117","662118","662119","662120","662121","662122","662123"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"IoT機器における起動時自動実行プログラム特定手法の検証と評価","subitem_title_language":"ja"},{"subitem_title":"Verification and Evaluation of a Startup Program Identification Method for IoT Devices","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Internet of Things,ファームウェア,起動スクリプト,SysVinit","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2024-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"岡山大学 大学院環境生命自然科学研究科"},{"subitem_text_value":"岡山大学 工学部"},{"subitem_text_value":"岡山大学 大学院環境生命自然科学研究科"},{"subitem_text_value":"NTT社会情報研究所"},{"subitem_text_value":"NTT社会情報研究所"},{"subitem_text_value":"岡山大学 学術研究院 環境生命自然科学学域"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Environmental, Life, Natural Science and Technology, Okayama University","subitem_text_language":"en"},{"subitem_text_value":"School of Engineering, Okayama University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environmental, Life, Natural Science and Technology, Okayama University","subitem_text_language":"en"},{"subitem_text_value":"NTT Social Informatics Laboratories","subitem_text_language":"en"},{"subitem_text_value":"NTT Social Informatics Laboratories","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Environmental, Life, Natural Science and Technology, Okayama University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/240906/files/IPSJ-CSS2024160.pdf","label":"IPSJ-CSS2024160.pdf"},"date":[{"dateType":"Available","dateValue":"2026-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2024160.pdf","filesize":[{"value":"394.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"f6b4d017-3dad-4b77-80bc-11a8bda6eade","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"島本, 裕大"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Phinyodom, Jiratchaya"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉元, 亮太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"上川, 先之"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"秋山, 満昭"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山内, 利宏"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuta, Shimamoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Jiratchaya, Phinyodom","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ryota, Yoshimoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroyuki, Uekawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mitsuaki, Akiyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Toshihiro, Yamauchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"IoT(Internet of Things)機器のファームウェアには,利用する上で実行されないプログラムも含まれている.このため,優先度付けされずに実施されるセキュリティ調査はIoT機器利用時に実行されないプログラムを優先的に調査してしまう可能性がある.効率的なセキュリティ調査を行うため,我々は起動時に実行されるプログラムの特定手法を提案した.しかし,先行研究の評価では,使用したファームウェアが2件と少なく,OpenWrtベースのファームウェアに評価対象が限定されていた.本研究では,より多くのファームウェアを使用して評価と有効性の検証を行った.具体的には,評価可能な起動方式を増やし,合計11件のファームウェアを使用した.また,有効性検証に使用するファームウェアを225件に増やした.評価の結果,提案手法は少ない誤検知で起動時に実行されるプログラムを特定できることを示した.また検証結果から調査対象を優先度付けすることによって,セキュリティ調査の効率を大きく向上させられること,優先度付けすることに意義があることを示した.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In IoT (Internet of Things) devices, some programs are not used. Therefore, security investigations without prioritizing may lead to first investigating programs that are not executed while using IoT devices. To conduct efficient security investigations, we proposed a method that can identify the programs that execute during the startup process. However, only two firmware were used for the evaluation, and the security investigation to verify the efficiency and accuracy was also limited to OpenWrt-based firmware. In this paper, we use more firmware for the evaluation and verification. We use 11  firmware including which startup methods have not previously been used for evaluation. Also, the number of firmware used for validation increased to 225. The evaluation results show that the proposed method can identify with a small amount of FP. The verification shows that we can improve efficiency and has significance by prioritizing investigation targets.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1201","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2024論文集"}],"bibliographicPageStart":"1194","bibliographicIssueDates":{"bibliographicIssueDate":"2024-10-15","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":240906,"updated":"2025-03-06T05:56:13.931199+00:00","links":{},"created":"2025-01-19T01:45:21.957653+00:00"}