{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00077914","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"77914","title":["マルウェアのコードの類似度を用いた分類手法に関する一考察"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"e2599ab4-4a8d-43bb-aad8-7464d0560c1d"},"_deposit":{"id":"77914","pid":{"type":"depid","value":"77914","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"マルウェアのコードの類似度を用いた分類手法に関する一考察","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"マルウェアのコードの類似度を用いた分類手法に関する一考察"},{"subitem_title":"Consideration on Malware Classification by the Function based on the Malware's Code","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"マルウェア検体(2)","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"奈良先端科学技術大学院大学/株式会社ラック"},{"subitem_text_value":"株式会社ラック"},{"subitem_text_value":"奈良先端科学技術大学院大学"},{"subitem_text_value":"慶應義塾大学大学院"},{"subitem_text_value":"奈良先端科学技術大学院大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Science, Nara Institute of Science and Technology / Little eArth Corporation Co., Ltd","subitem_text_language":"en"},{"subitem_text_value":"Little eArth Corporation Co., Ltd","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science, Nara Institute of Science and Technology","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Media Design, Keio University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science, Nara Institute of Science and Technology","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/77914/files/IPSJCSS2011019.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011019.pdf","filesize":[{"value":"57.2 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"1b24caad-5d5f-4827-aa67-9f6b29bde85a","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"東, 結香"},{"creatorName":"中津留, 勇"},{"creatorName":"猪俣, 敦夫"},{"creatorName":"砂原, 秀樹"},{"creatorName":"藤川, 和利"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuka, Higashi","creatorNameLang":"en"},{"creatorName":"You, Nakatsuru","creatorNameLang":"en"},{"creatorName":"Atsuo, Inomata","creatorNameLang":"en"},{"creatorName":"Hideki, Sunahara","creatorNameLang":"en"},{"creatorName":"Kazutoshi, Fujikawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,様々なマルウェアが攻撃において使用されており,マルウェアの挙動を正確に把握するための手法を確立することは急務である.しかし,詳細な挙動や機能を把握するのに適した静的解析は時間とコストだけでなく経験や技術も必要であり,膨大にマルウェアが発生する状況においては困難である.そこで本論文では,機械的にマルウェアの挙動を抽出するためコードの類似度を用いた分類手法を提案する.マルウェアの類似度をコード全体から導出する手法と関数のコードの類似度を用いて求める手法を比較した後,関数のコードと類似度の関係ついても分析し,考察を与える.そして,これらの結果よりコードの類似度を算出する際の問題点を整理する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Recently various kinds of security incidents occur and what is more the majority of attacks in such the incidents have been used Malware, there is an urgent need to analysis and measures against for unknown future Malware. Some of the static analysis of malware are suitable for understanding their behavior, however it needs more skills and more times. In this paper, we compare a method of calculation from the function with method of complete Malware code. Furtheremore we explore the relationship between function code and degree of its similarity.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"112","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"107","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"updated":"2025-01-21T20:40:38.439636+00:00","created":"2025-01-18T23:33:24.022801+00:00","links":{},"id":77914}