{"created":"2023-05-15T12:25:48.821303+00:00","id":1127,"links":{},"metadata":{"_buckets":{"deposit":"f00eeef1-493c-4493-8f65-2b13932a06c9"},"_deposit":{"created_by":4,"id":"1127","owners":[4],"pid":{"revision_id":0,"type":"depid","value":"1127"},"status":"published"},"_oai":{"id":"oai:kait.repo.nii.ac.jp:00001127","sets":["2:16:42:129"]},"author_link":[],"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2015-03-20","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"44","bibliographicPageStart":"35","bibliographicVolumeNumber":"39","bibliographic_titles":[{"bibliographic_title":"神奈川工科大学研究報告.B,理工学編"}]}]},"item_10002_description_19":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"This paper proposes a method for prevention of DEP bypass, using API hooks. The method reduces the overhead of ROP detection by focusing on when the only Windows APIs for the DEP bypass are called. ROP detection performs the check whether Windows API is called by a CALL instruction and the check of the stack address. Experiments showed that a prototype system can prevent the DEP bypass by vulnerability attacks of Metasploit Framework, while legitimate normal applications work without false alarms.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_10002_identifier_registration":{"attribute_name":"ID登録","attribute_value_mlt":[{"subitem_identifier_reg_text":"10.34411/00001120","subitem_identifier_reg_type":"JaLC"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"神奈川工科大学"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12669200","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"21882878","subitem_source_identifier_type":"PISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"岡本, 剛","creatorNameLang":"ja"}]},{"creatorNames":[{"creatorName":"Okamoto, Takeshi","creatorNameLang":"en"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2015-04-30"}],"displaytype":"detail","filename":"kkb-039-008.pdf","filesize":[{"value":"518.0 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"kkb-039-008.pdf","objectType":"fulltext","url":"https://kait.repo.nii.ac.jp/record/1127/files/kkb-039-008.pdf"},"version_id":"d860321b-7c11-4121-9016-e71efe88ce40"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"DEP","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"API hook","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"ROP","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"shellcode","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"DLL injection","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Metasploit Framework","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"API フックによるDEP 回避の防止","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"API フックによるDEP 回避の防止","subitem_title_language":"ja"},{"subitem_title":"Prevention of DEP bypass by API hooks.","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"4","path":["129"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2020-11-24"},"publish_date":"2020-11-24","publish_status":"0","recid":"1127","relation_version_is_last":true,"title":["API フックによるDEP 回避の防止"],"weko_creator_id":"4","weko_shared_id":-1},"updated":"2023-08-04T09:26:20.795349+00:00"}