{"created":"2023-07-25T10:25:42.033515+00:00","id":4135,"links":{},"metadata":{"_buckets":{"deposit":"4eca3698-bf61-423e-825e-890c88025273"},"_deposit":{"created_by":4,"id":"4135","owners":[4],"pid":{"revision_id":0,"type":"depid","value":"4135"},"status":"published"},"_oai":{"id":"oai:naist.repo.nii.ac.jp:00004135","sets":["34:35"]},"author_link":["8365","329","120","8366"],"item_7_alternative_title_1":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"A Software Protection Method Based on Instruction Camouflage","subitem_alternative_title_language":"en"}]},"item_7_biblio_info_9":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2004-06-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"6","bibliographicPageEnd":"767","bibliographicPageStart":"755","bibliographicVolumeNumber":"J87-A","bibliographic_titles":[{"bibliographic_title":"電子情報通信学会論文誌 A","bibliographic_titleLang":"ja"}]}]},"item_7_description_19":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_7_description_7":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"本論文では,プログラムに含まれる多数の命令をカムフラージュ(偽装)することにより,悪意をもったユーザ(攻撃者)によるプログラムの解析を困難にする方法を提案する.提案方法では,プログラム中の任意の命令(ターゲット)を異なる命令で偽装し,プログラムの自己書換え機構を用いて,実行時のある期間においてのみ元来の命令に復元する.攻撃者がカムフラージュされた命令を含む範囲の解析を試みたとしても,ターゲットの書換えを行うルーチン(書換えルーチン)の存在に気づかない限り,プログラムの元来の動作を正しく理解することは不可能である.解析を成功させるためには,書換えルーチンを含む範囲についても解析する必要があり,結果として,攻撃者はより広範囲にわたるプログラムの解析を強いられることとなる.提案方法は自動化が容易であり,要求される保護の強さ,及び,許容される実行効率の低下の度合に応じて,ターゲットの個数を任意に決定できる.","subitem_description_language":"ja","subitem_description_type":"Abstract"}]},"item_7_publisher_10":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"電子情報通信学会","subitem_publisher_language":"ja"}]},"item_7_rights_11":{"attribute_name":"出版者URL","attribute_value_mlt":[{"subitem_rights":"http://search.ieice.org/bin/summary.php?id=j87-a_6_755&category=A&year=2004&lang=J&abst= "}]},"item_7_rights_18":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"Copyright c 2004 IEICE","subitem_rights_language":"en"}]},"item_7_source_id_12":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0913-5707","subitem_source_identifier_type":"ISSN"}]},"item_7_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"神﨑, 雄一郎","creatorNameLang":"ja"}],"nameIdentifiers":[{"nameIdentifier":"8365","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"門田, 暁人","creatorNameLang":"ja"}],"nameIdentifiers":[{"nameIdentifier":"329","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"80311786","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=80311786"}]},{"creatorNames":[{"creatorName":"中村, 匡秀","creatorNameLang":"ja"}],"nameIdentifiers":[{"nameIdentifier":"8366","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":""}],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"松本, 健一","creatorNameLang":"ja"},{"creatorName":"マツモト, ケンイチ","creatorNameLang":"ja-Kana"}],"familyNames":[{"familyName":"松本","familyNameLang":"ja"},{"familyName":"マツモト","familyNameLang":"ja-Kana"}],"givenNames":[{"givenName":"健一","givenNameLang":"ja"},{"givenName":"ケンイチ","givenNameLang":"ja-Kana"}],"nameIdentifiers":[{"nameIdentifier":"120","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"70219492","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=70219492"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2023-03-02"}],"displaytype":"detail","filename":"IS-Matsumoto-115.pdf","filesize":[{"value":"356.4 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"fulltext","objectType":"fulltext","url":"https://naist.repo.nii.ac.jp/record/4135/files/IS-Matsumoto-115.pdf"},"version_id":"ee0ed3b3-23b5-416f-b202-fb1ef02b82dd"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"著作権保護","subitem_subject_language":"ja","subitem_subject_scheme":"Other"},{"subitem_subject":"ソフトウェア保護","subitem_subject_language":"ja","subitem_subject_scheme":"Other"},{"subitem_subject":"プログラムの難読化","subitem_subject_language":"ja","subitem_subject_scheme":"Other"},{"subitem_subject":"プログラムの暗号化","subitem_subject_language":"ja","subitem_subject_scheme":"Other"},{"subitem_subject":"自己書換え","subitem_subject_language":"ja","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"命令のカムフラージュによるソフトウェア保護方法","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"命令のカムフラージュによるソフトウェア保護方法","subitem_title_language":"ja"}]},"item_type_id":"7","owner":"4","path":["35"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2018-04-03"},"publish_date":"2018-04-03","publish_status":"0","recid":"4135","relation_version_is_last":true,"title":["命令のカムフラージュによるソフトウェア保護方法"],"weko_creator_id":"4","weko_shared_id":-1},"updated":"2024-01-16T04:39:59.287508+00:00"}