• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research on attack avoidance method for essential services by hiding process information and related files

Research Project

Project/Area Number 16K16067
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeMulti-year Fund
Research Field Information security
Research InstitutionOkayama University

Principal Investigator

Sato Masaya  岡山大学, 自然科学研究科, 助教 (30752414)

Project Period (FY) 2016-04-01 – 2018-03-31
Project Status Completed (Fiscal Year 2017)
Budget Amount *help
¥2,730,000 (Direct Cost: ¥2,100,000、Indirect Cost: ¥630,000)
Fiscal Year 2017: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Fiscal Year 2016: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Keywords情報セキュリティ / マルウェア対策 / 仮想化技術
Outline of Final Research Achievements

Software for protecting computers or evidence preservation is critical to protecting computers. This software sometimes becomes an attack target because it is an obstacle to attackers. Attackers identify the service on a computer firstly. If the service is found, they disable it and achieve their goals. On the other hand, attackers utilize not only application programs but also an operating system to attack the computer. To address these problems, we propose an attack avoiding method to complicate identification of essential services by a virtual machine monitor. In particular, our method monitors access to running information or related files of essential services and controls the visibility of that information. Our method requires no modification to existing essential services and provides greater security for essential services.

Report

(3 results)
  • 2017 Annual Research Report   Final Research Report ( PDF )
  • 2016 Research-status Report
  • Research Products

    (7 results)

All 2018 2017 2016 Other

All Presentation (6 results) (of which Int'l Joint Research: 1 results) Remarks (1 results)

  • [Presentation] 重要サービスの特定を困難化する通信処理制御法2018

    • Author(s)
      奥田勇喜,佐藤将也,谷口秀夫
    • Organizer
      情報処理学会第80回全国大会
    • Related Report
      2017 Annual Research Report
  • [Presentation] プロセス管理表へのアクセス制御機能の評価2017

    • Author(s)
      佐藤将也,山内利宏,谷口秀夫
    • Organizer
      第78回コンピュータセキュリティ第24回セキュリティ心理学とトラスト合同研究発表会
    • Related Report
      2017 Annual Research Report
  • [Presentation] 仮想計算機を用いた重要ファイル保護手法2017

    • Author(s)
      佐藤将也,山内利宏,谷口秀夫
    • Organizer
      コンピュータセキュリティシンポジウム2017(CSS2017)
    • Related Report
      2017 Annual Research Report
  • [Presentation] Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services2016

    • Author(s)
      Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi
    • Organizer
      3rd International Workshop on Information and Communication Security (WICS2016)
    • Place of Presentation
      東広島芸術文化ホール (広島県東広島市)
    • Year and Date
      2016-11-22
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] 攻撃回避のためのファイル不可視化手法の提案2016

    • Author(s)
      佐藤将也,山内利宏,谷口秀夫
    • Organizer
      コンピュータセキュリティシンポジウム 2016 (CSS2016)
    • Place of Presentation
      秋田キャッスルホテル(秋田県秋田市)
    • Year and Date
      2016-10-11
    • Related Report
      2016 Research-status Report
  • [Presentation] プロセス情報不可視化のための仮想計算機モニタによるメモリアクセス制御機能の評価2016

    • Author(s)
      佐藤将也,山内利宏,谷口秀夫
    • Organizer
      第74回コンピュータセキュリティ・第19回情報セキュリティ心理学とトラスト合同研究発表会
    • Place of Presentation
      中市コミュニティーホールNac (山口県山口市)
    • Year and Date
      2016-07-14
    • Related Report
      2016 Research-status Report
  • [Remarks] 仮想化技術を用いたセキュリティ向上技術の研究

    • URL

      http://www.swlab.cs.okayama-u.ac.jp/lab/tani/research/vm/index-j.html

    • Related Report
      2016 Research-status Report

URL: 

Published: 2016-04-21   Modified: 2019-03-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi