| Âê̾ | ʬ»¶¥·¥¹¥ƥà¤ˤª¤±¤륢¥¯¥»¥¹¸æ/¥¡¼¥¹¸æ¥ե졼¥à¥¥¯¤ÎÄó°Æ |
| Ãø¼Ô | *ËÜÅÄ ÆƻË, īÁÒ µÁ, ºÍÅÄ ¹¥§ (NEC) |
| Page | pp. 991 - 997 |
| Keyword | ¥»¥¥å¥ê¥ƥ£, ¥¢¥¯¥»¥¹¸æ, ¥¡¼¥¹¸æ, ʬ»¶ |
| Abstract | ʬ»¶¥·¥¹¥ƥà¤ǥ»¥¥å¥ê¥ƥ£¤ò³ÎÊݤ¹¤뤿¤á¤ˤϡ¤¾üËö¤Çĵ¤ì¤Ƥ¤¤륪¥֥¸¥§¥¯¥Ȥ䥡¼¥¹¤âŬÀڤ˴ÉÍý¤·¡¤ÉÔÅö¤ʥ¡¼¥¹¤λÈÍѤäÉÔ¤ʥª¥֥¸¥§¥¯¥ȤؤΥ¢¥¯¥»¥¹¤òËɤ°ɬÍפ¬¤¢¤롥¤½¤³¤Dz桹¤ϡ¤ʬ»¶¥·¥¹¥ƥà¤ˤª¤±¤ë¥ץé¥åȥե©¡¼¥à¤ǤΥ»¥¥å¥ê¥ƥ£¶¯²½¼êˡ¤òÄó°Ƥ¹¤롥Äó°Ƥ¹¤륢¥¯¥»¥¹¸æ/¥¡¼¥¹¸æ¥ե졼¥à¥¥¯¤Ǥϡ¤ʬ»¶¥·¥¹¥ƥà¤ËŤ륪¥֥¸¥§¥¯¥Ȥª¤è¤ӥ¡¼¥¹¤ò³ÆüËö¤ˤª¤¤¤ÆŬÀڤ˸椹¤뵡ǽ¤ò»ý¤ġ¥Ëܥե졼¥à¥¥¯¤Ǥϡ¤¥ª¥֥¸¥§¥¯¥Ȥª¤è¤ӥ¡¼¥¹¤ؤθæ¤ËɬÍפȤʤë°Ãͤò³ÆüËö¤ˤª¤¤¤ƼèÆ·¡¤¤½¤ì¤ò¸æ¤Ëȿ±Ǥµ¤»¤롥¤³¤ì¤ˤè¤êʬ»¶¥·¥¹¥ƥप¤è¤ӳÆüËö¤ΰ¤ò¹â¤á¤뤳¤Ȥ¬¤Ǥ¤롥 |
| Âê̾ | ¥»¥¥å¥ê¥ƥ£¥ݥꥷ¡¼¥â¥ǥë¤˴ð¤Ť¯³¬Áط¿³ÖΥ¤ˤè¤ë¾ðÊó¥ե¸楷¥¹¥ƥà |
| Ãø¼Ô | *¾¡Ìî ¶³¼£ (ÆüËܥ¢¥¤¡¦¥ӡ¼¡¦¥¨¥à¡ʳô¡ËÅìµþ´ðÁø¦µæ½ꡢÃÞÇÈÂç³ØÂç³ر¡ ¥·¥¹¥ƥà¾ðÊظ¦µæ²Ê), ÅÏî´ ͵¼£, ¹©ƣ ƻ¼£ (ÆüËܥ¢¥¤¡¦¥ӡ¼¡¦¥¨¥à¡ʳô¡ËÅìµþ´ðÁø¦µæ½ê), ²¬ËÜ ±ɻÊ (ÃÞÇÈÂç³ØÂç³ر¡ ¥·¥¹¥ƥà¾ðÊظ¦µæ²Ê) |
| Page | pp. 998 - 1006 |
| Keyword | ¶¯¥¢¥¯¥»¥¹¸æ, ¾ðÊó¥ե¸æ, ¥³¥ó¥ݡ¼¥ͥó¥ȳÖΥ, ʬ»¶¥»¥¥奢¥°¥롼¥× |
| Abstract | ¾ðÊó¥ե¸æ¤ϡ¢¥³¥ó¥ݡ¼¥ͥó¥ȤΥ¡¼¥¹¤ؤΥ¢¥¯¥»¥¹¤¥å¥ê¥ƥ£¥ݥꥷ¡¼¤˴ð¤Ť¤¤ƶ¯Ū¤Ë¸椹¤뤳¤Ȥˤè¤äơ¢ʬ»¶¤·¤¿ʣ¿ô¤Υ³¥ó¥ݡ¼¥ͥó¥ȤËÂФ·¤ÆÆÃÄê¤Υ»¥¥å¥ê¥ƥ£¥ݥꥷ¡¼¤òŬ±þ¤Ǥ¤ë´ðËܳµǰ¤Ǥ¢¤롣¤½¤·¤ƶáǯ¡¢¾ðÊó¥ե¸æ¤ò¼¸½¤¹¤ëÊýˡ¤Î1 ¤ĤȤ·¤ơ¢ʬ»¶¤·¤¿¥Ρ¼¥ɾå¤Υ³¥ó¥ݡ¼¥ͥó¥ȴ֤ǹ½Ãۤ·¤¿¥°¥롼¥פËÂФ·¤ƥ»¥¥å¥ê¥ƥ£¥ݥꥷ¡¼¤ò¶¯Ū¤ËŬ±þ¤¹¤롢ʬ»¶¥»¥¥奢¥°¥롼¥פ¬ÃíÌܤµ¤ì¤Ƥ¤¤롣¸½ºߡ¢ʬ»¶¥»¥¥奢¥°¥롼¥פΥץí¥ȥ¿¥¤¥פ¬´ö¤Ĥ«Äó°Ƥµ¤ì¤Ƥª¤ꡢ¤½¤ì¤é¤ϥ³¥ó¥ݡ¼¥ͥó¥ȤΥ¡¼¥¹¤Υ¢¥¯¥»¥¹¤ò¸椷¤ƥ³¥ó¥ݡ¼¥ͥó¥Ȥò³ÖΥ¤¹¤륳¥ó¥ݡ¼¥ͥó¥ȥ³¥ó¥ȥ¥顼¤¬¥Ρ¼¥ɾå¤Ë1 ¤ĤǤ¢¤뤳¤ȤòÁÛÄꤷ¤Ƥ¤¤롣¤½¤Τ¿¤ᡢOS ¥ì¥٥ë¤Υ³¥ó¥ݡ¼¥ͥó¥ȥ³¥ó¥ȥ¥顼¤Ȳ¾Áۥޥ·¥ó¥â¥˥¿¡¼¥ì¥٥ë¤Υ³¥ó¥ݡ¼¥ͥó¥ȥ³¥ó¥ȥ¥顼¤Τɤ餫¤ò¼è¼ÎÂëɬÍפ¬¤¢¤ꡢ¤½¤ηë²̡¢¶¯¸ǤʳÖΥ¤ȺÙγÅ٤ʥ¢¥¯¥»¥¹¸æ¤òξΩ¤µ¤»¤뤳¤Ȥ¬¤Ǥ¤ʤ¤¡£ ËÜÏÀʸ¤Ǥϡ¢¶¯¸ǤʳÖΥ¤ȺÙγÅ٤ʥ¢¥¯¥»¥¹¸æ¤òξΩ¤·¤¿ʬ»¶¥»¥¥奢¥°¥롼¥פò¹½Ãۤ¹¤뤿¤á¤Ρ¢¥»¥¥å¥ê¥ƥ£¥ݥꥷ¡¼¥â¥ǥë¤˴ð¤Ť¯³¬Áط¿³ÖΥ¼êˡLCC¡ÊLayered Component Confinement¡ˤòÄó°Ƥ¹¤롣LCC ¤ϡ¢³ÖΥ¤òÊݾڤ¹¤륻¥¥å¥ê¥ƥ£¥ݥꥷ¡¼¥â¥ǥë¤˴ð¤Ť¡¢OS ¥ì¥٥ë¤ζ¯¥¢¥¯¥»¥¹¸浡¹½¤Ȳ¾Áۥޥ·¥ó¥â¥˥¿¡¼¥ì¥٥ë¤ζ¯¥¢¥¯¥»¥¹¸浡¹½¤¬Ϣư¤·¤ơ¢OS ¥ץ¥¹¡¢²¾Áۥޥ·¥ó¤Υ¡¼¥¹¤ؤΥ¢¥¯¥»¥¹¸æ¤ò¹Ԥ¦¡£¤µ¤é¤ˡ¢³ÖΥ¤òÊݾڤ¹¤륻¥¥å¥ê¥ƥ£¥ݥꥷ¡¼¥â¥ǥë¤ÎÃæ¤ÇÍø³²Áêȿ¤¬µ¯¤³¤륢¥¯¥»¥¹¤ò´ʰפʵ½ҤǸ椹¤ë¥ݥꥷ¡¼¤Ȥ·¤ƹ¤¯»Ȥï¤ì¤Ƥ¤¤ë¥㥤¥ˡ¼¥º¥¦¥©¡¼¥ë¥ݥꥷ¡¼¥â¥ǥë¤γµǰ¤òºÎÍѤ·¤ơ¢Microsoft Windows ¤ÈXen ¾å¤ǹ½Ãۤµ¤ì¤ë¥ץí¥ȥ¿¥¤¥פ¹¡£ |
| Âê̾ | ÆâÉâ¤ò¸¡ÃβÄǽ¤ʥâ¥Х¤¥ëüËö¸þ¤±ưŪ¥°¥롼¥°¶¦ͭ¥ץí¥ȥ³¥ë |
| Ãø¼Ô | *¼ÅÄ ½ã°ì, ÇòÀÐ ÌÀ (̾¸Ų°¹©¶ÈÂç³Ø), ʡÅÄ Íμ£ (°¦Ãζµ°éÂç³Ø) |
| Page | pp. 1007 - 1016 |
| Keyword | ¥°¥롼¥°¶¦ͭ, ÆâÉâ¼Ô, ¾ÚÌÄǽ°Â |
| Abstract | ¥ӥǥª²ñµĤäP2P¤Τ褦¤ʶ¨Ĵ·¿¤Υ¢¥ץꥱ¡¼¥·¥ç¥ó¤Ǥϡ¤Ä̿®¤˻²²ä¹¤ë¥Ρ¼¥ɤ¬ʣ¿ô¤ˤʤꡤn > 2¤λ²²üԴ֤ÇƱ°ì¤Υ»¥å·¥ç¥ò¶¦ͭ¤¹¤륰¥롼¥°¶¦ͭ¥ץí¥ȥ³¥뤬ɬÍפȤµ¤ì¤롥´û¸¤Υ°¥롼¥°¶¦ͭ¥ץí¥ȥ³¥ë¤Î¿¤¯¤ϡ¤¥ץí¥ȥ³¥뻲²üԤÏƱÅù¤η»¤ª¤è¤ÓÄ̿®¤Υ³¥¹¥ȤǼ¹Ԥ¹¤ë¤â¤ΤȤʤäƤ¤¤롥¤Ȥ³¤¡¤¿¼ï¿ÍͤÊüËö¤¬Àܳ¤µ¤ì¤ë¥â¥Х¤¥ë´Ķ¤òÁÛÄꤹ¤ë¤ȡ¤̵Àþ¥¢¥¯¥»¥¹¥ݥ¤¥ó¥Ȥ¢¤뤤¤ϥ°¥롼¥פÎÃæ¤ǽèÍýǽÎϤι⤤üˤ¥ץí¥ȥ³¥ëÃæ¤νŤ¤½èÍý¤òôŤ¤½¤ì°ʳ°¤ÎüËö¤Ϸڤ¤½èÍý¤±¤Ǹ°¶¦ͭ¤¬´°λ¤¹¤ë¤褦¤ʥץí¥ȥ³¥ë¤ÎɬÍפϹ⤤¡¥¤ޤ¿¡¤µ¬¤λ²²üԤ¬ÅÓÃ椫¤黲²üԤΥ»¥å·¥ç¥ò°ìÃפµ¤»¤ʤ¤¤褦¤˿¶Éñ¤¦ÆâÉô¤ι¶·â¤ˤĤ¤¤Ƥâ¹Íθ¤·¤ʤ±¤ì¤Фʤé¤ʤ¤¡¥ËÜÏÀʸ¤Ǥϡ¤ưŪ¤˻²²üԤ¬ÊѲ½¤¹¤륰¥롼¥×Ä̿®¤ˤª¤¤¤ơ¤AKE°Â¤«¤Ä»²²üԤΥ»¥å·¥ç¥¬°ìÃפ·¤Ƥ¤¤뤳¤Ȥò³Îǧ¤Ǥ¡¤·»ǽÎϤ¬°ۤʤëÄ̿®¤ò¹Íθ¤·¤¿3¥饦¥ó¥ɤǥ»¥å·¥ç¥ò¶¦ͭ¤¹¤ë¥â¥Х¤¥ëüËö¸þ¤±¤Υץí¥ȥ³¥ë¤òÄó°Ƥ·¤Ƥ¤¤롥Äó°ƥץí¥ȥ³¥ë¤ΰ¤ÏCMA(Chosen-Message Attack)-EF(Existential Forgery)°Â¤ʥǥ£¥¸¥¿¥ë½ð̾Êý¼°¤ÈCDH(Computational Diffie-Hellman)ÌäÂê¤η»ÎÌŪ°Â¤˵¢Ã夵¤ì¤롥 |
| Âê̾ | A Secure Centralized Logging Scheme with syslog-ng based on Virtualization |
| Ãø¼Ô | *¼þ 㽷Å, ËÙ Îɾ´, ݯ°æ ¹¬°ì (¶彣Âç³Ø) |
| Page | pp. 1017 - 1022 |
| Keyword | centralized logging, virtualization, syslog-ng |
| Abstract | Logs contain actions and events that take place on a computer. Logging brings several important benefits such as system monitoring, trouble shooting, forensic investigation and so on. However, logging faces two threats. one is that the logging daemon could be stopped by attackers; the other is that existing log data could be tampered and deleted by attackers. Each threat results in the loss of logs. Thus, we design a centralized and virtualized logging scheme with the logging daemon syslog-ng which is the next generation of syslog. The syslog application provides a secure and reliable transfer to keep logs from tampering and deleting. The virtualization technology provides a more secure environment by isolation to protect the logging daemon from being shut down. |