{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00045095","sets":["1164:3925:3956:3957"]},"path":["3957"],"owner":"1","recid":"45095","title":["一階述語論理を用いた脆弱性診断ツール"],"pubdate":{"attribute_name":"公開日","attribute_value":"2002-12-20"},"_buckets":{"deposit":"f8c1c2e8-30a4-4bb1-bb7c-4736d11b303a"},"_deposit":{"id":"45095","pid":{"type":"depid","value":"45095","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"一階述語論理を用いた脆弱性診断ツール","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"一階述語論理を用いた脆弱性診断ツール"},{"subitem_title":"A Vulnerability Assessment Tool Using First - Order Predicate Logic","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2002-12-20","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"三菱電機(株) 情報技術総合研究所"},{"subitem_text_value":"三菱電機(株) 情報技術総合研究所"},{"subitem_text_value":"三菱電機(株) 情報技術総合研究所"},{"subitem_text_value":"三菱電機(株) 情報技術総合研究所"},{"subitem_text_value":"三菱電機(株) 情報技術総合研究所"},{"subitem_text_value":"三菱電機(株) 通信機製作所"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Mitsubishi Electric Corporation, Information Technology R&D Center","subitem_text_language":"en"},{"subitem_text_value":"Mitsubishi Electric Corporation, Information Technology R&D Center","subitem_text_language":"en"},{"subitem_text_value":"Mitsubishi Electric Corporation, Information Technology R&D Center","subitem_text_language":"en"},{"subitem_text_value":"Mitsubishi Electric Corporation, Information Technology R&D Center","subitem_text_language":"en"},{"subitem_text_value":"Mitsubishi Electric Corporation, Information Technology R&D Center","subitem_text_language":"en"},{"subitem_text_value":"Mitsubishi Electric Corporation, Communication Systems Center","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/45095/files/IPSJ-CSEC02019008.pdf"},"date":[{"dateType":"Available","dateValue":"2004-12-20"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC02019008.pdf","filesize":[{"value":"60.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"5cb93c2a-69ad-4323-834e-fde191a7282a","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2002 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"河内, 清人"},{"creatorName":"北澤, 繁樹"},{"creatorName":"中野, 初美"},{"creatorName":"大越丈弘"},{"creatorName":"藤井, 誠司"},{"creatorName":"河木理一"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kiyoto, Kawauchi","creatorNameLang":"en"},{"creatorName":"Shigeki, Kitazawa","creatorNameLang":"en"},{"creatorName":"Hatsumi, Nakano","creatorNameLang":"en"},{"creatorName":"Takehiro, Ohkoshi","creatorNameLang":"en"},{"creatorName":"Seiji, Fujii","creatorNameLang":"en"},{"creatorName":"Motokazu, Kawaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"脆弱性診断で一般的に使用されるセキュリティスキャナは,脆弱点の列挙を行うのみであるため,それらを組み合わせて利用した場合の脅威や,盗聴のような受動的な攻撃を受けた場合の脅威についての情報をツールから得ることはできない.そこで本稿では,攻撃をスクリプトとして表現し,一階述語論理上での自動推論に従って実行することで,上記場合も含めて,可能な限り攻撃者の振る舞いを模擬可能な脆弱性診断ツールを提案し,その有効性について述べる.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Attackers often intrude their target sites by using one or more vulnerabilities found in victim hosts. Also, they can use viruses to put backdoors into target sites. Security scanners which are commonly used for security assessment cannot detect such risks described above, because they can just enumerate vulnerabilities. In this paper, we propose a vulnerability assessment tool, which can simulate whole possible activities taken by attackers. This is achieved by applying an inference engine based on first-order predicate logic to decide attack scenarios.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"48","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"43","bibliographicIssueDates":{"bibliographicIssueDate":"2002-12-20","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"122(2002-CSEC-019)","bibliographicVolumeNumber":"2002"}]},"relation_version_is_last":true,"weko_creator_id":"1"},"id":45095,"updated":"2025-01-22T10:08:56.394008+00:00","links":{},"created":"2025-01-18T23:11:07.033494+00:00"}