{"updated":"2025-01-21T23:58:50.518475+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00069369","sets":["1164:4088:6025:6093"]},"path":["6093"],"owner":"10","recid":"69369","title":["ベアメタルハイパーバイザを用いたカーネルレベルルートキット検知システムの実現"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-05-06"},"_buckets":{"deposit":"43867ab6-810a-42e5-960b-f517d318822e"},"_deposit":{"id":"69369","pid":{"type":"depid","value":"69369","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"ベアメタルハイパーバイザを用いたカーネルレベルルートキット検知システムの実現","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ベアメタルハイパーバイザを用いたカーネルレベルルートキット検知システムの実現"},{"subitem_title":"Implementing Kernel-level Rootkits Detection System by Bare-Metal Hypervisor","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2010-05-06","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"千葉大学大学院融合科学研究科"},{"subitem_text_value":"千葉大学総合メディア基盤センター"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Advanced Integrated Science, Chiba University","subitem_text_language":"en"},{"subitem_text_value":"Institute of Media and Information Technology, Chiba University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/69369/files/IPSJ-IOT10009007.pdf"},"date":[{"dateType":"Available","dateValue":"2012-05-06"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT10009007.pdf","filesize":[{"value":"147.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"a2b44afe-34c1-41fd-a80b-4ab4e8f01a39","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2010 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"秋月, 康志"},{"creatorName":"今泉, 貴史"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yasushi, Akizuki","creatorNameLang":"en"},{"creatorName":"Takashi, Imaizumi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"現状のマルウェア対策では,アンチウイルスソフトウェアを各ホストにインストールする方法が標準的となっている.しかし,ルートキット技術を利用して自身の存在を隠すステルスマルウェアが蔓延し始め,既存のアンチウイルスソフトウェアによる検知や対策は困難になってきている.本論文では,仮想化技術を用いて OS の外部から OS を監視することで,マルウェアを隠蔽しているルートキットを検知・無効化する手法を提案する.この手法を用いることで,既存のアンチウイルスソフトウェアでもステルスマルウェアを検知できるようになる.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"System administrators usually install anti-virus software to each host as countermeasures against malware. As the stealth malware that hides itself using rootkit technologies spread, an anti-virus software becomes hard to detect it. In this paper, we proposes the technique that detects and nullifies the rootkits by monitoring OS behavior from the outside of OS using the virtualization technique. By using this technique, we can detect the stealth malware even with existing anti-virus software.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2010-05-06","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"7","bibliographicVolumeNumber":"2010-IOT-9"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"created":"2025-01-18T23:28:50.228198+00:00","id":69369,"links":{}}