{"created":"2025-01-18T22:56:21.118484+00:00","updated":"2025-01-22T19:28:39.870736+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00025487","sets":["1164:1867:1878:1880"]},"path":["1880"],"owner":"1","recid":"25487","title":["携帯端末向けソフトウェア異常検知技術"],"pubdate":{"attribute_name":"公開日","attribute_value":"2006-05-12"},"_buckets":{"deposit":"5f3d8c87-56ef-49be-8f7e-a52744527458"},"_deposit":{"id":"25487","pid":{"type":"depid","value":"25487","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"携帯端末向けソフトウェア異常検知技術","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"携帯端末向けソフトウェア異常検知技術"},{"subitem_title":"Anomaly Detection Technique for Mobile Terminals","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2006-05-12","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"㈱NTTドコモマルチメディア研究所"},{"subitem_text_value":"㈱NTTドコモマルチメディア研究所"},{"subitem_text_value":"㈱NTTドコモマルチメディア研究所"},{"subitem_text_value":"㈱NTTドコモマルチメディア研究所"},{"subitem_text_value":"筑波大学"},{"subitem_text_value":"科学技術振興機構"},{"subitem_text_value":"筑波大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Multimedia Labs, NTT DoCoMo, Inc.","subitem_text_language":"en"},{"subitem_text_value":"Multimedia Labs, NTT DoCoMo, Inc.","subitem_text_language":"en"},{"subitem_text_value":"Multimedia Labs, NTT DoCoMo, Inc.","subitem_text_language":"en"},{"subitem_text_value":"Multimedia Labs, NTT DoCoMo, Inc.","subitem_text_language":"en"},{"subitem_text_value":"Tsukuba University","subitem_text_language":"en"},{"subitem_text_value":"Japan Science and Technology Agency","subitem_text_language":"en"},{"subitem_text_value":"Tsukuba University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/25487/files/IPSJ-OS06102001.pdf"},"date":[{"dateType":"Available","dateValue":"2008-05-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-OS06102001.pdf","filesize":[{"value":"97.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"11"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"7db6a07a-f221-4a16-909d-513df02ad82a","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2006 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"金野, 晃"},{"creatorName":"池部, 優佳"},{"creatorName":"中山, 雄大"},{"creatorName":"竹下, 敦"},{"creatorName":"鈴木, 勝博"},{"creatorName":"阿部, 洋丈"},{"creatorName":"加藤, 和彦"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Akira, Kinno","creatorNameLang":"en"},{"creatorName":"Yuka, Ikebe","creatorNameLang":"en"},{"creatorName":"Takehiro, Nakayama","creatorNameLang":"en"},{"creatorName":"Atsushi, Takeshita","creatorNameLang":"en"},{"creatorName":"Katsuhiro, Suzuki","creatorNameLang":"en"},{"creatorName":"Hirotake, Abe","creatorNameLang":"en"},{"creatorName":"Kazuhiko, Kato","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10444176","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"PCやサーバ、携帯電話など、すべての計算機は外部もしくは内部からの攻撃にさらされている。われわれはこの中でも携帯電話を攻撃から守るために、スタック情報を用いたソフトウェアの動作検証方法に注目した。携帯電話など処理能力の低い計算機において、動作を検証するシステムを搭載するためには、限られた資源での処理の高速化、使用メモリ量の抑制が重要となる。そこで、われわれは低速なメモリアクセスを伴うスタック探索を簡略化し、オーバーヘッドを低減することを試みた。","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We propose an anomaly detection technique, which achieves low overhead. It monitors issuing pattern of system and function calls, and makes probability models of software behavior by learning. To apply this technique to mobile terminals, it is necessary to speed up the process and reduce the memory size because of limited resources of mobile terminals. In this study, we propose the method for reducing overhead of the anomaly detection software by simplifying the stuck trace. As a result of preliminary experiments, it is recognized that our method can be effective. ","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告システムソフトウェアとオペレーティング・システム(OS)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2006-05-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"44(2006-OS-102)","bibliographicVolumeNumber":"2006"}]},"relation_version_is_last":true,"weko_creator_id":"1"},"id":25487,"links":{}}