{"created":"2023-07-25T10:33:22.750150+00:00","id":4758,"links":{},"metadata":{"_buckets":{"deposit":"32574b44-9f32-4279-ae8f-a3274c88505f"},"_deposit":{"created_by":3,"id":"4758","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"4758"},"status":"published"},"_oai":{"id":"oai:shizuoka.repo.nii.ac.jp:00004758","sets":["80:222"]},"author_link":["1198","1202","1210","941","1200","1201"],"item_26_alternative_title_1":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"A keylogger detection using dynamic API inspection (part 2)"}]},"item_26_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2007-03-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"16","bibliographicPageEnd":"152","bibliographicPageStart":"147","bibliographicVolumeNumber":"2007","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告. CSEC, [コンピュータセキュリティ]"}]}]},"item_26_description_30":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_26_description_9":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"我々は,キーボード入力を取得するというキーロガーの挙動に着目し,キーボード入力に用いられるAPIの使用を検出することでキーロガーの検知を行う方式を提案している.基礎実験により本方式が未知キーロガー検知に対して有効であることを示したが,本方式には自プロセスをユーザから隠すキーロガーを検知できないという課題を残していた.そこで本稿では,「自プロセスをユーザから隠す」という挙動を新たにキーロガーらしい挙動として追加することでキーロガーの検知精度の向上を図る.本方式の有効性を示すための実験を行い,本方式をWindows OS上に実装したときの検知率と誤検知率,オーバーヘッドについて評価する.","subitem_description_type":"Abstract"}]},"item_26_publisher_6":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_26_relation_22":{"attribute_name":"NII論文ID","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"110006250289","subitem_relation_type_select":"NAID"}}]},"item_26_rights_7":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"本文データは学協会の許諾に基づきCiNiiから複製したものであるここに掲載した著作物の利用に関する注意 本著作物の著作権は(社)情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。 Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan."}]},"item_26_source_id_19":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"09196072","subitem_source_identifier_type":"ISSN"}]},"item_26_source_id_23":{"attribute_name":"NII書誌ID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_26_subject_8":{"attribute_name":"NDC","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_26_version_type_32":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"高見, 知寛"}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"鈴木, 功一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"馬場, 達也"}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"前田, 秀介"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"松本, 隆明"}],"nameIdentifiers":[{},{},{}]},{"creatorNames":[{"creatorName":"西垣, 正勝"}],"nameIdentifiers":[{},{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-12-14"}],"displaytype":"detail","filename":"101102001.pdf","filesize":[{"value":"490.9 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"101102001.pdf","url":"https://shizuoka.repo.nii.ac.jp/record/4758/files/101102001.pdf"},"version_id":"2b8db9ad-29f2-4c11-a074-38d232932cd8"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"動的API検査方式によるキーロガー検知方式の提案(その2)(セッション3-C : 侵入検知(2))","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"動的API検査方式によるキーロガー検知方式の提案(その2)(セッション3-C : 侵入検知(2))"}]},"item_type_id":"26","owner":"3","path":["222"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-11-02"},"publish_date":"2010-11-02","publish_status":"0","recid":"4758","relation_version_is_last":true,"title":["動的API検査方式によるキーロガー検知方式の提案(その2)(セッション3-C : 侵入検知(2))"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2024-02-14T02:53:12.636792+00:00"}