{"updated":"2025-01-21T15:14:13.689860+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00091896","sets":["1164:3925:7119:7164"]},"path":["7164"],"owner":"11","recid":"91896","title":["制御フロー解析により生成されたグラフ比較によるAndroidマルウェア検出方法の提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2013-05-02"},"_buckets":{"deposit":"9109d986-3da2-4512-8276-d0b44c0d7364"},"_deposit":{"id":"91896","pid":{"type":"depid","value":"91896","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"制御フロー解析により生成されたグラフ比較によるAndroidマルウェア検出方法の提案","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"制御フロー解析により生成されたグラフ比較によるAndroidマルウェア検出方法の提案"},{"subitem_title":"Detection Method for Android Malware by comparing Control Flow Graphs","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"マルウェア対策","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2013-05-02","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"信州大学大学院総合工学系研究科"},{"subitem_text_value":"信州大学大学院総合工学系研究科"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Interdisciplinary Graduate School of Science and Technology, Shinshu University","subitem_text_language":"en"},{"subitem_text_value":"Interdisciplinary Graduate School of Science and Technology, Shinshu University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/91896/files/IPSJ-CSEC13061005.pdf"},"date":[{"dateType":"Available","dateValue":"2015-05-02"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC13061005.pdf","filesize":[{"value":"308.8 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"ecfb541e-6a9c-4351-be96-f82ba00840b8","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2013 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"岩本, 一樹"},{"creatorName":"和﨑, 克己"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kazuki, Iwamoto","creatorNameLang":"en"},{"creatorName":"Katsumi, Wasaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Android のマルウェアは大幅に増加しているため,マルウェアを効率よく検出できる方法が必要である.本研究では Android のアプリを制御フロー解析してメソッド毎のグラフを生成し,そのグラフを比較することでマルウェアを検出する方法を提案する.提案する方法ではマルウェアから生成したグラフを Android のアプリが含んでいる割合を包含度で表し,包含度が閾値を超えた場合にはマルウェアとして検出する.我々は制御フロー解析の結果をそのまま用いるアルゴリズムと,最適化や難読化を考慮したアルゴリズムを実装した.これら 2 つのアルゴリズムでマルウェアから生成したグラフと収集した Android のアプリから生成したグラフを比較することで包含度を求め,それぞれの 2 つのアルゴリズムの性能を検討した.結果,我々が提案する方法で収集した Android のアプリの中からマルウェアを検出することができた.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The effective method to detect Android malware is necessary, because the number of Android malware has been increasing. In this paper, we propose the method to detect malware by comparing the graphs generated from Android applications by control flow analysis. We defined inclusion degree as the ratio including the graph extracted from malware. And an application is detected if inclusion degree is greater than threshold. We implemented 2 algorithms. The first algorithm uses the results of control flow analysis directly. The second algorithm corresponds to the optimization and obfuscation. We got inclusion degrees by comparing the graphs generated from Android applications with the graphs generated from malware, and considered the performances of those algorithms. Finally, we detected some malware in Android applications.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2013-05-02","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"5","bibliographicVolumeNumber":"2013-CSEC-61"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-18T23:41:00.714245+00:00","id":91896,"links":{}}