{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00098519","sets":["581:7397:7450"]},"path":["7450"],"owner":"11","recid":"98519","title":["コードの「不自然さ」に基づくソフトウェア保護機構のステルシネス評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-02-15"},"_buckets":{"deposit":"7e0ecf86-a96d-4fb1-9640-4b560f2071e8"},"_deposit":{"id":"98519","pid":{"type":"depid","value":"98519","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"コードの「不自然さ」に基づくソフトウェア保護機構のステルシネス評価","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"コードの「不自然さ」に基づくソフトウェア保護機構のステルシネス評価"},{"subitem_title":"A Method for Evaluating the Stealthiness of Protected Code Based on Its Artificiality","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:ソフトウェア工学] ソフトウェア保護,耐タンパソフトウェア,プログラムの難読化,確率的言語モデル,N-gram,ステルシネス","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2014-02-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"熊本高等専門学校人間情報システム工学科"},{"subitem_text_value":"奈良先端科学技術大学院大学情報科学研究科"},{"subitem_text_value":"奈良先端科学技術大学院大学情報科学研究科"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Department of Human-Oriented Information Systems Engineering, Kumamoto National College of Technology","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science, Nara Institute of Science and Technology","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science, Nara Institute of Science and Technology","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/98519/files/IPSJ-JNL5502043.pdf"},"date":[{"dateType":"Available","dateValue":"2016-02-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL5502043.pdf","filesize":[{"value":"1.2 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"4150167d-7676-4e58-ab1e-51ef4faa572a","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"神﨑, 雄一郎"},{"creatorName":"尾上, 栄浩"},{"creatorName":"門田, 暁人"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuichiro, Kanzaki","creatorNameLang":"en"},{"creatorName":"Takahiro, Onoue","creatorNameLang":"en"},{"creatorName":"Akito, Monden","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本論文では,ソフトウェア保護機構のステルシネス(保護されていないコードとの区別のつきにくさ)を評価する一方法を提案する.保護のために追加・変形されたコードの「不自然さ」が,保護されていないコードとの区別を容易にし,ステルシネスを低くするという仮定のもと,コードのステルシネスをコードの不自然さを用いて評価する.コードの不自然さ,すなわち,コンパイラが出力したコードとしてもっともらしくない度合いは,確率的言語モデル(N-gramモデル)によって数値化する.ケーススタディでは,既存のソフトウェア保護方法が適用されたコードの不自然さを提案方法によって数値化し,ステルシネスを考察した.結果から,コードの制御構造や命令表現の変形のみを行う保護はコードのステルシネスを高く維持できる一方,コードの暗号化など,元来のコードの意味を破壊する変形をともなう保護や,意味のないコードを無作為に挿入する保護は,コードのステルシネスを低くする傾向が強いことが分かった.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"This paper proposes a method for evaluating the stealthiness of protected code, that is, the degree to which protected code can be distinguished from unprotected code. Artificial code fragments, which means unusual code fragments caused by obfuscation, are easy to distinguish from unprotected code fragments. Based on the fact, we estimate the degree of stealthiness according to the “artificiality” of the protected code. We quantitate artificiality of the code by means of probabilistic language model (N-gram model). In the case study, we evaluate the stealthiness of the various programs that are obfuscated by the previous obfuscation techniques, by the proposed method. The result shows that the semantics-preserving obfuscating transformations (e.g., transformation of the control flow of the program) have little affect on the stealthiness. On the other hand, the obfuscation techniques that corrupt the original semantics of the program (e.g., code encryption), or that just insert junk code fragments to the program, tend to decrease the stealthiness.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1015","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"1005","bibliographicIssueDates":{"bibliographicIssueDate":"2014-02-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"55"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":98519,"updated":"2025-01-21T12:25:59.455287+00:00","links":{},"created":"2025-01-18T23:44:45.055543+00:00"}