{"updated":"2025-01-21T20:41:51.058358+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00077953","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"77953","title":["仮想マシンモニタを改変することでリアルタイムに仮想マシン上のAES鍵を奪い取る手法"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"68bd84ff-68c8-4221-b817-99b9464907f6"},"_deposit":{"id":"77953","pid":{"type":"depid","value":"77953","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"仮想マシンモニタを改変することでリアルタイムに仮想マシン上のAES鍵を奪い取る手法","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"仮想マシンモニタを改変することでリアルタイムに仮想マシン上のAES鍵を奪い取る手法"},{"subitem_title":"Exception Handling Attack against AES-NI on VM","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"共通鍵暗号・ハッシュ関数(2)","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"ジャパンデータコム株式会社"},{"subitem_text_value":"株式会社セキュアウェア"},{"subitem_text_value":"神戸大学大学院工学研究科"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Japan Datacom Co., LTD.","subitem_text_language":"en"},{"subitem_text_value":"Secureware Inc.","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Engineering, Kobe University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/77953/files/IPSJCSS2011058.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011058.pdf","filesize":[{"value":"211.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"202f7ba3-39cc-468a-918c-20edcdeaa44e","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"竹久, 達也"},{"creatorName":"野川, 裕記"},{"creatorName":"森井, 昌克"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tatsuya, Takehisa","creatorNameLang":"en"},{"creatorName":"Hiroki, Nogawa","creatorNameLang":"en"},{"creatorName":"Masakatu, Morii","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"仮想化技術は,仮想マシン(VM)を管理するソフトウエアとその関連ソフトウエアにより実現される.仮想化技術の利用者が,仮想マシン(VM)を利用する際,利用している仮想マシンモニタ(VMM)が信頼できるかどうかを検証する手段はない.仮に,悪意のあるサービス提供者が改ざんしたVMMを提供し,そのVMMの上で利用者がVMを動作させた場合,ユーザの意図しない情報流出が発生する可能性がある.本論文では,VMMにおいてVMのAESの暗号鍵を盗むことが可能であることを示し,さらに,暗号鍵盗難の対処法について述べる.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The virtualization technology composes two software parts: one is virtual machine(VM) management software called Virtual Machine Monitor(VMM), and the other is its related software. The virtualization technology at present does not provide users methods for certifying the VMM's dependability. In this situation, the following case is possible: when malicious service providers supply tampered VMMs and their users run their VMs on these VMMs, the users will suffer unintended information leakage. As one leakage case stated above, in this paper, we propose a method for snooping AES encryption key on VMM, Also, we state a countermeasure against this attack.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"342","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"337","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"created":"2025-01-18T23:33:25.910209+00:00","id":77953,"links":{}}