{"created":"2023-05-15T12:00:43.076133+00:00","id":7639,"links":{},"metadata":{"_buckets":{"deposit":"327508dc-c782-48c8-a727-7490fd77800e"},"_deposit":{"created_by":3,"id":"7639","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"7639"},"status":"published"},"_oai":{"id":"oai:kyutech.repo.nii.ac.jp:00007639","sets":["8:24"]},"author_link":["33060","20772"],"item_21_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2022-03-07","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"7","bibliographicPageEnd":"10","bibliographicPageStart":"1","bibliographicVolumeNumber":"2022-OS-154","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告. [システムソフトウェアとオペレーティング・システム]"}]}]},"item_21_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"IaaS型クラウドが提供する仮想マシン(VM)はインターネット経由で攻撃を受けやすいため,侵入検知システム(IDS)を用いて監視する必要がある.ホストベースIDSを安全に実行するために,IDSをVMの外で実行するIDSオフロードと呼ばれる手法が用いられているが,オフロードしたIDSも攻撃を受ける可能性がある.この問題を解決するために,CPUのセキュリティ機構であるIntel SGXを用いた安全なIDSオフロードが提案されている.しかし,IDSの開発にはOSカーネルレベルのプログラミングが必要となり,SGX専用ライブラリを用いなければならない.本稿では,SGX向け実行環境を用いてOS上で動作する従来のIDSをエンクレイヴ内にオフロードすることを可能にするSCwathcerを提案する.SCwatcherでは,SGX向け実行環境がエンクレイヴ内のIDSに標準的なOSインタフェースを提供する.さらに,SCwatcherはVMのシステム情報を取得可能なVM監視用procファイルシステムをIDSに提供する.SGX仮想化をサポートしたXen-SGXおよび,OcclumとSCONEの2種類のSGX向け実行環境を用いてSCwatcherを実装し,従来のIDSの動作確認と性能比較を行った.","subitem_description_type":"Abstract"}]},"item_21_description_5":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"情報処理学会 第154回 システムソフトウェアとオペレーティング・システム研究会, 2022年3月14日-15日, オンライン開催","subitem_description_type":"Other"}]},"item_21_description_60":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"subitem_description":"Journal Article","subitem_description_type":"Other"}]},"item_21_publisher_7":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_21_relation_14":{"attribute_name":"情報源","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"http://id.nii.ac.jp/1001/00217221/"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://id.nii.ac.jp/1001/00217221/","subitem_relation_type_select":"URI"}}]},"item_21_rights_13":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"Copyright (c) 2022 by the Information Processing Society of Japan"}]},"item_21_select_59":{"attribute_name":"査読の有無","attribute_value_mlt":[{"subitem_select_item":"no"}]},"item_21_source_id_10":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10444176","subitem_source_identifier_type":"NCID"}]},"item_21_source_id_8":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8795","subitem_source_identifier_type":"ISSN"}]},"item_21_text_36":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"九州工業大学"},{"subitem_text_value":"九州工業大学"}]},"item_21_text_63":{"attribute_name":"連携ID","attribute_value_mlt":[{"subitem_text_value":"10320"}]},"item_21_version_type_58":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"河村, 拓実"}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"Kourai, Kenichi","creatorNameLang":"en"},{"creatorName":"光来, 健一","creatorNameLang":"ja"},{"creatorName":"コウライ, ケンイチ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{},{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2022-05-13"}],"displaytype":"detail","filename":"RECN_2021-63.pdf","filesize":[{"value":"1.3 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"RECN_2021-63.pdf","url":"https://kyutech.repo.nii.ac.jp/record/7639/files/RECN_2021-63.pdf"},"version_id":"9ea4a9c4-4ca7-4fdc-92f2-1d37b9182841"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"SGX向け実行環境OcclumとSCONEを用いたVMの安全な監視手法","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"SGX向け実行環境OcclumとSCONEを用いたVMの安全な監視手法"}]},"item_type_id":"21","owner":"3","path":["24"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-05-13"},"publish_date":"2022-05-13","publish_status":"0","recid":"7639","relation_version_is_last":true,"title":["SGX向け実行環境OcclumとSCONEを用いたVMの安全な監視手法"],"weko_creator_id":"3","weko_shared_id":3},"updated":"2023-10-25T08:59:08.873403+00:00"}