{"updated":"2025-01-21T21:27:48.189902+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00074919","sets":["6164:6165:6462:6463"]},"path":["6463"],"owner":"5","recid":"74919","title":["静的解析によるマルウェアのAPI推移の抽出とクラスタ解析"],"pubdate":{"attribute_name":"公開日","attribute_value":"2009-10-19"},"_buckets":{"deposit":"d4cd0d6d-336f-42fa-8dda-0de94a98bf23"},"_deposit":{"id":"74919","pid":{"type":"depid","value":"74919","revision_id":0},"owners":[5],"status":"published","created_by":5},"item_title":"静的解析によるマルウェアのAPI推移の抽出とクラスタ解析","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"静的解析によるマルウェアのAPI推移の抽出とクラスタ解析"},{"subitem_title":"API Sequence Extraction and Cluster Analysis for MalwareCodes based on the Static Analysis","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"コンピュータウイルス","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2009-10-19","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"日本コンピュータセキュリティリサーチ株式会社"},{"subitem_text_value":"信州大学大学院工学系研究科"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Japan Computer Security Research Center","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Science and Technology,Shinshu University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/74919/files/IPSJ-CSS2009F41.pdf"},"date":[{"dateType":"Available","dateValue":"2011-10-19"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2009F41.pdf","filesize":[{"value":"114.2 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"6c4fcf34-aaf5-454f-a05a-9ddb244c86da","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2009 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"岩本, 一樹"},{"creatorName":"和崎, 克己"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kazuki, Iwamoto","creatorNameLang":"en"},{"creatorName":"Katsumi, Wasaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"大量のマルウェアが作られている今日ではマルウェアの分類はマルウェア対策において重要である.未知のマルウェアの分類ができれば,どの既知のマルウェアと類似しているのかわかり,またマルウェアの機能を推定することができる.しかしマルウェアのバイナリコードを単純に比較しただけでは分類は不可能であり,マルウェアの構造に基づく特徴を抽出する必要がある.本研究では大量のマルウェアを効率よく自動的に分類する手法を提案する.具体的にはマルウェアに対して制御フロー解析を行うことでAPI の推移を抽出し,マルウェアの特徴とした.またそれらのマルウェアの特徴に基づいてクラスタ解析を用いて検体を分類を行った.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"A classi cation for malware is important in anti-malware, because lots of malwaresare released nowadays. If we can classify unanalysed malwares, we can know the nearest knownmalware and estimate functions. But malwares aren't classi ed by comparing their binaries only.So we have to extract features based on the structure of malware. In this paper, we propose themethod to classify lots of malwares automatically.Concretely, we extracted API sequences by using control ow analysis from malware samplesand de ned that API sequence is the feature of malware. Also we classi ed malwares based onthe feature of malware by cluster analysis.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2009"}]},"relation_version_is_last":true,"weko_creator_id":"5"},"created":"2025-01-18T23:32:16.028644+00:00","id":74919,"links":{}}