{"updated":"2025-01-21T17:36:06.191438+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00086684","sets":["6164:6165:6462:6909"]},"path":["6909"],"owner":"11","recid":"86684","title":["解析済みマルウェアとの差分抽出による静的解析の効率化手法の提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-10-23"},"_buckets":{"deposit":"90882b09-10c9-4c5a-a7ab-37a0a4bbcdbe"},"_deposit":{"id":"86684","pid":{"type":"depid","value":"86684","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"解析済みマルウェアとの差分抽出による静的解析の効率化手法の提案","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"解析済みマルウェアとの差分抽出による静的解析の効率化手法の提案"},{"subitem_title":"Extracting Differences Among the Same Kind of the Malwares to Make Static Analysis Efficient","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"マルウェア,フォレンジック,静的解析","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2012-10-23","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"情報セキュリティ大学院大学"},{"subitem_text_value":"情報セキュリティ大学院大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Institute of Information Security","subitem_text_language":"en"},{"subitem_text_value":"Institute of Information Security","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/86684/files/IPSJCSS2012049.pdf"},"date":[{"dateType":"Available","dateValue":"2014-10-23"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2012049.pdf","filesize":[{"value":"790.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"8364168d-eaa9-4f86-9508-1521209a41d6","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2012 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"羽田, 大樹"},{"creatorName":"後藤, 厚宏"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroki, Hada","creatorNameLang":"en"},{"creatorName":"Atsuhiro, Goto","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"社会インフラにおけるマルウェアの被害においては,フォレンジックによる正確な被害範囲の特定が必要となる.このような状況におけるマルウェア解析では,手動での静的解析による厳密な解析作業が必要である.本稿では,既に解析が完了した複数のマルウェアの情報を用いて,効率的に静的解析を行うアーキテクチャを提案する.本アーキテクチャでは,プログラムをグラフ構造で表現して2つのプログラムの差分を特定する手法を活用する.実際のマルウェア検体を用いてこの提案アーキテクチャを評価し,解析が完了した複数のマルウェアと対象とするマルウェアとの差分抽出が,静的解析の効率化に有効となる事例を示す.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"374","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2012論文集"}],"bibliographicPageStart":"368","bibliographicIssueDates":{"bibliographicIssueDate":"2012-10-23","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2012"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-18T23:37:41.530207+00:00","id":86684,"links":{}}