{"created":"2023-05-15T12:05:16.334474+00:00","id":9892,"links":{},"metadata":{"_buckets":{"deposit":"98a4dedb-2342-47ea-85ed-ec7d6cc809e2"},"_deposit":{"created_by":3,"id":"9892","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"9892"},"status":"published"},"_oai":{"id":"oai:iwate-u.repo.nii.ac.jp:00009892","sets":["1515:1519"]},"author_link":["61440","61441","61439"],"item_16_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2009-01-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicPageEnd":"196","bibliographicPageStart":"190","bibliographicVolumeNumber":"E92-A","bibliographic_titles":[{"bibliographic_title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"}]}]},"item_16_date_6":{"attribute_name":"登録日","attribute_value_mlt":[{"subitem_date_issued_datetime":"2009-12-04"}]},"item_16_description_12":{"attribute_name":"Abstract","attribute_value_mlt":[{"subitem_description":"New computer viruses are continually being generated and they cause damage all over the world. In general, current anti-virus software detects viruses by matching a pattern based on the signature; thus, unknown viruses without any signature cannot be detected. Although there are some static analysis technologies that do not depend on signatures, virus writers often use code obfuscation techniques, which make it difficult to execute a code analysis. As is generally known, unknown viruses and known viruses share a common feature. In this paper we propose a new static analysis technology that can circumvent code obfuscation to extract the common feature and detect unknown viruses based on similarity. The results of evaluation experiments demonstrated that this technique is able to detect unknown viruses without false positives.","subitem_description_type":"Other"}]},"item_16_publisher_14":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"社団法人 電子情報通信学会"}]},"item_16_relation_26":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1587/transfun.E92.A.190","subitem_relation_type_select":"DOI"}}]},"item_16_rights_18":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"Copyright (c) 2009 (社)電子情報通信学会"}]},"item_16_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0916-8508","subitem_source_identifier_type":"ISSN"}]},"item_16_text_4":{"attribute_name":"著者(機関)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Engineering, Iwate University"}]},"item_16_version_type_27":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"LIU, Zhongda"}],"nameIdentifiers":[{"nameIdentifier":"61439","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"NAKAYA, Naoshi"}],"nameIdentifiers":[{"nameIdentifier":"61440","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"KOUI, Yuuji"}],"nameIdentifiers":[{"nameIdentifier":"61441","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2016-11-14"}],"displaytype":"detail","filename":"ieicet-ve92-an1p190-196-.pdf","filesize":[{"value":"3.8 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"ieicet-ve92-an1p190-196-.pdf","url":"https://iwate-u.repo.nii.ac.jp/record/9892/files/ieicet-ve92-an1p190-196-.pdf"},"version_id":"cd6e8d8f-bff9-442a-a7a9-02c136af0ae5"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"computer virus","subitem_subject_scheme":"Other"},{"subitem_subject":"unknown virus","subitem_subject_scheme":"Other"},{"subitem_subject":"static analysis technology","subitem_subject_scheme":"Other"},{"subitem_subject":"similarity","subitem_subject_scheme":"Other"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"The Unknown Computer Viruses Detection Based on Similarity","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"The Unknown Computer Viruses Detection Based on Similarity"}]},"item_type_id":"16","owner":"3","path":["1519"],"pubdate":{"attribute_name":"公開日","attribute_value":"2009-12-04"},"publish_date":"2009-12-04","publish_status":"0","recid":"9892","relation_version_is_last":true,"title":["The Unknown Computer Viruses Detection Based on Similarity"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2023-05-16T11:53:37.700433+00:00"}