±ü¡¡·òÂÀ M2 | ¿¢Â¼¡¡½Óμ | °ËÆ£¡¡¼Â | ÌڸͽС¡Àµåë | µÜºê¡¡½ã |
ȯɽÂêÌÜ¡§ Context-Aware SVM¡¢¥Ò¡¢è¤ë¾õ¶·°Í¸·¿¶¨Ä´¥Õ¥£¥ë¥¿¥ê¥ó¥ ȯɽ³µÍס§ ¥æ¡¼¥¶¤Î¥³¥ó¥Æ¥¯¥¹¥È¤Ë°Í¸¤·¤¿¾ðÊó¿äÁ¦¼êË¡¤È¤·¤Æ¡¤Context-Aware SVM¤Ë¤è¤ë¾õ¶·°Í¸·¿¶¨Ä´¥Õ¥£¥ë¥¿¥ê¥ó¥°¤òÄó°Æ¤¹¤ë¡¥½¾Íè¤ÎÂåɽŪ¤Ê¾ðÊó¿äÁ¦µ»½Ñ¤Ç¤¢ ¤ë¡¤¶¨Ä´¥Õ¥£¥ë¥¿¥ê¥ó¥°¤Ç¤Ï¡¤¥æ¡¼¥¶¤Î¥³¥ó¥Æ¥¯¥¹¥È¤¬¹Í褵¤ì¤Æ¤¤¤Ê¤¤¡¥¤·¤«¤·¡¤¥æ¡¼ ¥¶¤ÎÍ×µá¤Ï¤½¤Î¤È¤¤Î¥³¥ó¥Æ¥¯¥¹¥È¤Ë¤è¤Ã¤ÆÊѲ½¤¹¤ë¤È¹Í¤¨¤é¤ì¤ë¡¥Ëܸ¦µæ¤Ç¤Ï¡¤2¥¯¥é ¥¹Ê¬ÎàÌäÂê¤ËŬÍѤµ¤ì¤ëSVM(Support Vector Machine)¤Ë¡¤¥³¥ó¥Æ¥¯¥¹¥È¤ò¹Íθ¤·¤¿Context-Aware SVM¤òÍѤ¤¤¿¾õ¶·°Í¸·¿¤Î¶¨Ä´¥Õ¥£¥ë¥¿¥ê¥ó¥°¤Î¼êË¡¤òÄó°Æ¤¹¤ë¡¥¤³¤ì¤Ë¤è¤ê¡¤¥³¥ó¥Æ¥¯ ¥¹¥È¤Ë°Í¸¤·¤¿¾ðÊó¿äÁ¦¤ò¼Â¸½¤¹¤ë¡¥¤Ê¤ª¡¤Âоݥɥᥤ¥ó¤Ï¥â¥Ð¥¤¥ë´Ä¶¤Ë¤ª¤±¤ë°û¿©Å¹ ¾ðÊó¤Î¿äÁ¦¤È¤¹¤ë¡¥ËÜȯɽ¤Ç¤Ï¡¤¤½¤Î¥É¥á¥¤¥ó¤Ë¤ª¤¤¤Æ°·¤¦¥³¥ó¥Æ¥¯¥¹¥È¤ª¤è¤ÓŹÊÞ¤Î¥Ñ ¥é¥á¡¼¥¿¤òÄ󼨤·¡¤¼Â¸³Êý¿Ë¤Ë¤Ä¤¤¤Æ½Ò¤Ù¤ë¡¥ | ||||
ÉÍÌî¡¡ÂÙÃË M2 | ¿¢Â¼¡¡½Óμ | °ËÆ£¡¡¼Â | ÌڸͽС¡Àµåë | µÜºê¡¡½ã |
ȯɽÂêÌÜ: XML¥¹¥È¥ê¡¼¥à¤ËÂФ¹¤ë»þÀ©Ìä¹ç¤» ȯɽ³µÍ×: ¶áǯ¡¤¥Í¥Ã¥È¥ï¡¼¥¯¥í¥°¤ä¥»¥ó¥µ¥Ç¡¼¥¿¤Ê¤É¤ÎXML¥¹¥È¥ê¡¼¥à¥Ç¡¼¥¿¤¬Áý²Ã¤·¤Æ¤¤¤ë¡¥¤³¤ì¤é¤Î¥Ç¡¼¥¿¤ËÂФ¹¤ë»þÀ©Ìä¹ç¤»¤Î¸¦µæ¤Ï¤Û¤È¤ó¤É¤µ¤ì¤Æ¤¤¤Ê¤¤¡¥Ëܸ¦µæ¤Ç¤Ï¡¤XPath½èÍý¥¨¥ó¥¸¥ó¤È¥¤¥Ù¥ó¥ÈÂå¿ô¤òÁȤ߹ç¤ï¤»¤ë¤³¤È¤Ë¤è¤Ã¤Æ¡¤XML¥¹¥È¥ê¡¼¥à¤ËÂФ¹¤ë»þÀ©Ìä¹ç¤»¤Î¼êË¡¤òÄó°Æ¤¹¤ë¡¥ËܼêË¡¤Ç¤ÏXML¥¹¥È¥ê¡¼¥à¥Ç¡¼¥¿¤ò¥·¡¼¥±¥ó¥·¥ã¥ë¤Ë°ìÅÙ¤À¤±Æɤ߹þ¤à¤³¤È¤Ç¡¤»þÀ©Ìä¹ç¤»¤¬²Äǽ¤Ë¤Ê¤ë¡¥ | ||||
·ªÅÄ¡¡Íµ¿Í M2 | ¿¢Â¼¡¡½Óμ | ´Ø¡¡¹ÀÇ· | ÌڸͽС¡Àµåë | µÜºê¡¡½ã |
ȯɽÂêÌÜ¡§Â絬ÌÏXML¥Ç¡¼¥¿¤Îʬ»¶ÇÛÃÖµÚ¤ÓÌä¹ç¤»½èÍý¤Ë´Ø¤¹¤ë¸¦µæ ȯɽ³µÍס§¶áǯ¡¢¾ðÊó¤ÎµÞ·ã¤ÊÁý²Ã¤Ëȼ¤¤Â絬ÌϤÊXML¥Ç¡¼¥¿¤ò¸úΨÎɤ¯½èÍý¤¹¤ë¤³¤È¤¬É¬ÍפȤµ¤ì¤Æ¤¤¤ë¡£¤½¤Î°ì¤Ä¤Î¼êË¡¤È¤·¤Æ¡¢²æ¡¹¤ÏXML¥Ç¡¼¥¿¤òʬ³ä¤·¡¢Ê£¿ô¤Î¥µ¥¤¥È¤Øʬ»¶¤µ¤»¤Æ½èÍý¤¹¤ëÊýË¡¤ò¹Í¤¨¤ë¡£¤³¤Î¤è¤¦¤Êʬ»¶´Ä¶¤Ç¤ÏÌä¹ç¤»½èÍý¤Ë¤«¤«¤ë¥³¥¹¥È¤ò¾®¤µ¤¯¤¹¤ë¤¿¤á¤Ë¡¢³Æ¥µ¥¤¥È¤ËÇÛÃÖ¤¹¤ë¥Ç¡¼¥¿Î̤ȡ¢ÇÛÃÖ¤µ¤ì¤¿Éôʬ¥Ç¡¼¥¿¤Ø¤Î¥¢¥¯¥»¥¹ÉÑÅÙ¤ò¹Íθ¤¹¤ëɬÍפ¬¤¢¤ë¡£Ëܸ¦µæ¤Ç¤Ï¡¢ºÇŬ¤Ê¥Ç¡¼¥¿¤Îʬ³ä¡¢Ê¬³ä¤µ¤ì¤¿¥Ç¡¼¥¿¤Î³Æ¥µ¥¤¥È¤Ø¤ÎÇÛÃÖ¡¢Ê¤ӤËʬ»¶Ìä¹ç¤»¤Ë´Ø¤¹¤ë¼êË¡¤òÄó°Æ¤¹¤ë¡£ | ||||
²¼Ûê¡¡ÉÒÃË D2 | »³¸ý ±Ñ | º½¸¶¡¡½¨¼ù | ÌçÎÓ¡¡Íº´ð |
ȯɽÂêÌÜ¡§Ç§¾Úµ»½Ñ¤È´Æ»ë¤È¤ò°ì³ç´ÉÍý¤¹¤ë¤¿¤á¤Î¥»¥¥å¥ê¥Æ¥£¥Ý¥ê¥· ȯɽ³µÍס§Ëܸ¦µæ¤Ç¤Ï¡¢ÁÈ¿¥Æâ¥Í¥Ã¥È¥ï¡¼¥¯¤ËƳÆþ¤µ¤ì¤Ä¤Ä¤¢¤ëÍÍ¡¹¤Ê¥»¥¥å¥ê¥Æ¥£µ¡´ï¤ò°ì³ç´ÉÍý¤¹¤ë¤¿¤á¤ÎÊý¼°¤òÄó°Æ¤¹¤ë¡£ËÜȯɽ¤Ç¤Ï¡¢¸½ºß¤Î¸¦µæ¾õ¶·¤Èº£¸å¤Î¸¦µæÊý¿Ë¤Ë¤Ä¤¤¤Æ½Ò¤Ù¤ë¡£ | |||
ÎëÌÚ¡¡Ì¤±û D2 | »³¸ý ±Ñ | º½¸¶¡¡½¨¼ù | ÌçÎÓ¡¡Íº´ð |
ȯɽÂêÌÜ¡§¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥¨¥ß¥å¥ì¡¼¥·¥ç¥ó´Ä¶¤òÍѤ¤¤¿¸úΨŪ¤Ê¼ÂÁõɾ²Á¼êË¡ ȯɽ³µÍס§Ëܸ¦µæ¤Ç¤Ï¡¢¥¤¥ó¥¿¡¼¥Í¥Ã¥È¸¦µæ¤Ë¤ª¤¤¤Æɾ²Á¤Î¤¿¤á¤ËÍѤ¤¤é¤ì¤ë¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥¨¥ß¥å¥ì¡¼¥·¥ç¥ó´Ä¶¡¢Æä˰ìµòÅÀ½¸Ãæ·¿¤Î¥Í¥Ã¥È¥ï¡¼¥¯¥¨¥ß¥å¥ì¡¼¥·¥ç¥ó¥Æ¥¹¥È¥Ù¥Ã¥É¤Ë¤ª¤¤¤Æ¡¢¤è¤ê¸úΨŪ¤Ëɾ²Á¤ò¹Ô¤¦¤¿¤á¤Î¼êË¡¤òÄó°Æ¤¹¤ë¡£Ëܸ¦µæ¤ÇÍѤ¤¤ë¼êË¡¤Ç¤Ï¡¤¥Æ¥¹¥È¥Ù¥Ã¥É¤ÎʪÍýŪ¤Ê¾ðÊó¤ÈÏÀÍýŪ¤Ê¾ðÊó¤òʬΥ¤·É¾²Á´Ä¶¤ÎºÆÍøÍÑÀ¤ò³ÎÊݤ¹¤ë¤³¤È¤Ç¸¦µæ¼Ô¤ÎÉé²Ù¤òÄ㸺¤¹¤ë¡¥ËÜȯɽ¤Ç¤Ï¡¢¸½ºß¤Î¸¦µæ¾õ¶·¤Èº£¸å¤Î¸¦µæÊý¿Ë¤Ë¤Ä¤¤¤Æ½Ò¤Ù¤ë¡£ | |||
¸ãÇ㼤¹¾¡¡»ÊÇϵÁ D2 | »³¸ý ±Ñ | º½¸¶¡¡½¨¼ù | ÌçÎÓ¡¡Íº´ð |
ȯɽÂêÌÜ¡§An Automatic Detection/Collection System for Cross-Site
Scripting Vulnerability
ȯɽ³µÍס§ | |||