¥¼¥ß¥Ê¡¼¥ëȯɽ

Æü»þ: 9·î29Æü¡ÊÌÚ¡Ë3¸Â (13:30-15:00)


²ñ¾ì: L2

»Ê²ñ¡§ÌÚëͧºÈ ½õ¼ê
±ü¡¡·òÂÀ M2 ¿¢Â¼¡¡½Óμ °ËÆ£¡¡¼Â ÌڸͽС¡Àµåë µÜºê¡¡½ã
ȯɽÂêÌÜ¡§ Context-Aware SVM¡¢¥Ò¡¢è¤ë¾õ¶·°Í¸·¿¶¨Ä´¥Õ¥£¥ë¥¿¥ê¥ó¥ ȯɽ³µÍס§ ¥æ¡¼¥¶¤Î¥³¥ó¥Æ¥¯¥¹¥È¤Ë°Í¸¤·¤¿¾ðÊó¿äÁ¦¼êË¡¤È¤·¤Æ¡¤Context-Aware SVM¤Ë¤è¤ë¾õ¶·°Í¸·¿¶¨Ä´¥Õ¥£¥ë¥¿¥ê¥ó¥°¤òÄó°Æ¤¹¤ë¡¥½¾Íè¤ÎÂåɽŪ¤Ê¾ðÊó¿äÁ¦µ»½Ñ¤Ç¤¢ ¤ë¡¤¶¨Ä´¥Õ¥£¥ë¥¿¥ê¥ó¥°¤Ç¤Ï¡¤¥æ¡¼¥¶¤Î¥³¥ó¥Æ¥¯¥¹¥È¤¬¹Í褵¤ì¤Æ¤¤¤Ê¤¤¡¥¤·¤«¤·¡¤¥æ¡¼ ¥¶¤ÎÍ×µá¤Ï¤½¤Î¤È¤­¤Î¥³¥ó¥Æ¥¯¥¹¥È¤Ë¤è¤Ã¤ÆÊѲ½¤¹¤ë¤È¹Í¤¨¤é¤ì¤ë¡¥Ëܸ¦µæ¤Ç¤Ï¡¤2¥¯¥é ¥¹Ê¬ÎàÌäÂê¤ËŬÍѤµ¤ì¤ëSVM(Support Vector Machine)¤Ë¡¤¥³¥ó¥Æ¥¯¥¹¥È¤ò¹Íθ¤·¤¿Context-Aware SVM¤òÍѤ¤¤¿¾õ¶·°Í¸·¿¤Î¶¨Ä´¥Õ¥£¥ë¥¿¥ê¥ó¥°¤Î¼êË¡¤òÄó°Æ¤¹¤ë¡¥¤³¤ì¤Ë¤è¤ê¡¤¥³¥ó¥Æ¥¯ ¥¹¥È¤Ë°Í¸¤·¤¿¾ðÊó¿äÁ¦¤ò¼Â¸½¤¹¤ë¡¥¤Ê¤ª¡¤Âоݥɥᥤ¥ó¤Ï¥â¥Ð¥¤¥ë´Ä¶­¤Ë¤ª¤±¤ë°û¿©Å¹ ¾ðÊó¤Î¿äÁ¦¤È¤¹¤ë¡¥ËÜȯɽ¤Ç¤Ï¡¤¤½¤Î¥É¥á¥¤¥ó¤Ë¤ª¤¤¤Æ°·¤¦¥³¥ó¥Æ¥¯¥¹¥È¤ª¤è¤ÓŹÊÞ¤Î¥Ñ ¥é¥á¡¼¥¿¤òÄ󼨤·¡¤¼Â¸³Êý¿Ë¤Ë¤Ä¤¤¤Æ½Ò¤Ù¤ë¡¥
 
ÉÍÌî¡¡ÂÙÃË M2 ¿¢Â¼¡¡½Óμ °ËÆ£¡¡¼Â ÌڸͽС¡Àµåë µÜºê¡¡½ã
ȯɽÂêÌÜ: XML¥¹¥È¥ê¡¼¥à¤ËÂФ¹¤ë»þÀ©Ìä¹ç¤» ȯɽ³µÍ×: ¶áǯ¡¤¥Í¥Ã¥È¥ï¡¼¥¯¥í¥°¤ä¥»¥ó¥µ¥Ç¡¼¥¿¤Ê¤É¤ÎXML¥¹¥È¥ê¡¼¥à¥Ç¡¼¥¿¤¬Áý²Ã¤·¤Æ¤¤¤ë¡¥¤³¤ì¤é¤Î¥Ç¡¼¥¿¤ËÂФ¹¤ë»þÀ©Ìä¹ç¤»¤Î¸¦µæ¤Ï¤Û¤È¤ó¤É¤µ¤ì¤Æ¤¤¤Ê¤¤¡¥Ëܸ¦µæ¤Ç¤Ï¡¤XPath½èÍý¥¨¥ó¥¸¥ó¤È¥¤¥Ù¥ó¥ÈÂå¿ô¤òÁȤ߹ç¤ï¤»¤ë¤³¤È¤Ë¤è¤Ã¤Æ¡¤XML¥¹¥È¥ê¡¼¥à¤ËÂФ¹¤ë»þÀ©Ìä¹ç¤»¤Î¼êË¡¤òÄó°Æ¤¹¤ë¡¥ËܼêË¡¤Ç¤ÏXML¥¹¥È¥ê¡¼¥à¥Ç¡¼¥¿¤ò¥·¡¼¥±¥ó¥·¥ã¥ë¤Ë°ìÅÙ¤À¤±Æɤ߹þ¤à¤³¤È¤Ç¡¤»þÀ©Ìä¹ç¤»¤¬²Äǽ¤Ë¤Ê¤ë¡¥
 
·ªÅÄ¡¡Íµ¿Í M2 ¿¢Â¼¡¡½Óμ ´Ø¡¡¹ÀÇ· ÌڸͽС¡Àµåë µÜºê¡¡½ã
ȯɽÂêÌÜ¡§Â絬ÌÏXML¥Ç¡¼¥¿¤Îʬ»¶ÇÛÃÖµÚ¤ÓÌä¹ç¤»½èÍý¤Ë´Ø¤¹¤ë¸¦µæ ȯɽ³µÍס§¶áǯ¡¢¾ðÊó¤ÎµÞ·ã¤ÊÁý²Ã¤Ëȼ¤¤Â絬ÌϤÊXML¥Ç¡¼¥¿¤ò¸úΨÎɤ¯½èÍý¤¹¤ë¤³¤È¤¬É¬ÍפȤµ¤ì¤Æ¤¤¤ë¡£¤½¤Î°ì¤Ä¤Î¼êË¡¤È¤·¤Æ¡¢²æ¡¹¤ÏXML¥Ç¡¼¥¿¤òʬ³ä¤·¡¢Ê£¿ô¤Î¥µ¥¤¥È¤Øʬ»¶¤µ¤»¤Æ½èÍý¤¹¤ëÊýË¡¤ò¹Í¤¨¤ë¡£¤³¤Î¤è¤¦¤Êʬ»¶´Ä¶­¤Ç¤ÏÌä¹ç¤»½èÍý¤Ë¤«¤«¤ë¥³¥¹¥È¤ò¾®¤µ¤¯¤¹¤ë¤¿¤á¤Ë¡¢³Æ¥µ¥¤¥È¤ËÇÛÃÖ¤¹¤ë¥Ç¡¼¥¿Î̤ȡ¢ÇÛÃÖ¤µ¤ì¤¿Éôʬ¥Ç¡¼¥¿¤Ø¤Î¥¢¥¯¥»¥¹ÉÑÅÙ¤ò¹Íθ¤¹¤ëɬÍפ¬¤¢¤ë¡£Ëܸ¦µæ¤Ç¤Ï¡¢ºÇŬ¤Ê¥Ç¡¼¥¿¤Îʬ³ä¡¢Ê¬³ä¤µ¤ì¤¿¥Ç¡¼¥¿¤Î³Æ¥µ¥¤¥È¤Ø¤ÎÇÛÃÖ¡¢Ê¤ӤËʬ»¶Ìä¹ç¤»¤Ë´Ø¤¹¤ë¼êË¡¤òÄó°Æ¤¹¤ë¡£
 

²ñ¾ì: L3

»Ê²ñ¡§¿¹Åçľ¿Í ½õ¼ê
²¼Ûê¡¡ÉÒÃË D2 »³¸ý ±Ñ º½¸¶¡¡½¨¼ù ÌçÎÓ¡¡Íº´ð
ȯɽÂêÌÜ¡§Ç§¾Úµ»½Ñ¤È´Æ»ë¤È¤ò°ì³ç´ÉÍý¤¹¤ë¤¿¤á¤Î¥»¥­¥å¥ê¥Æ¥£¥Ý¥ê¥· ȯɽ³µÍס§Ëܸ¦µæ¤Ç¤Ï¡¢ÁÈ¿¥Æâ¥Í¥Ã¥È¥ï¡¼¥¯¤ËƳÆþ¤µ¤ì¤Ä¤Ä¤¢¤ëÍÍ¡¹¤Ê¥»¥­¥å¥ê¥Æ¥£µ¡´ï¤ò°ì³ç´ÉÍý¤¹¤ë¤¿¤á¤ÎÊý¼°¤òÄó°Æ¤¹¤ë¡£ËÜȯɽ¤Ç¤Ï¡¢¸½ºß¤Î¸¦µæ¾õ¶·¤Èº£¸å¤Î¸¦µæÊý¿Ë¤Ë¤Ä¤¤¤Æ½Ò¤Ù¤ë¡£
 
ÎëÌÚ¡¡Ì¤±û D2 »³¸ý ±Ñ º½¸¶¡¡½¨¼ù ÌçÎÓ¡¡Íº´ð
ȯɽÂêÌÜ¡§¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥¨¥ß¥å¥ì¡¼¥·¥ç¥ó´Ä¶­¤òÍѤ¤¤¿¸úΨŪ¤Ê¼ÂÁõɾ²Á¼êË¡ ȯɽ³µÍס§Ëܸ¦µæ¤Ç¤Ï¡¢¥¤¥ó¥¿¡¼¥Í¥Ã¥È¸¦µæ¤Ë¤ª¤¤¤Æɾ²Á¤Î¤¿¤á¤ËÍѤ¤¤é¤ì¤ë¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥¨¥ß¥å¥ì¡¼¥·¥ç¥ó´Ä¶­¡¢Æä˰ìµòÅÀ½¸Ãæ·¿¤Î¥Í¥Ã¥È¥ï¡¼¥¯¥¨¥ß¥å¥ì¡¼¥·¥ç¥ó¥Æ¥¹¥È¥Ù¥Ã¥É¤Ë¤ª¤¤¤Æ¡¢¤è¤ê¸úΨŪ¤Ëɾ²Á¤ò¹Ô¤¦¤¿¤á¤Î¼êË¡¤òÄó°Æ¤¹¤ë¡£Ëܸ¦µæ¤ÇÍѤ¤¤ë¼êË¡¤Ç¤Ï¡¤¥Æ¥¹¥È¥Ù¥Ã¥É¤ÎʪÍýŪ¤Ê¾ðÊó¤ÈÏÀÍýŪ¤Ê¾ðÊó¤òʬΥ¤·É¾²Á´Ä¶­¤ÎºÆÍøÍÑÀ­¤ò³ÎÊݤ¹¤ë¤³¤È¤Ç¸¦µæ¼Ô¤ÎÉé²Ù¤òÄ㸺¤¹¤ë¡¥ËÜȯɽ¤Ç¤Ï¡¢¸½ºß¤Î¸¦µæ¾õ¶·¤Èº£¸å¤Î¸¦µæÊý¿Ë¤Ë¤Ä¤¤¤Æ½Ò¤Ù¤ë¡£
 
¸ãÇ㼤¹¾¡¡»ÊÇϵÁ D2 »³¸ý ±Ñ º½¸¶¡¡½¨¼ù ÌçÎÓ¡¡Íº´ð
ȯɽÂêÌÜ¡§An Automatic Detection/Collection System for Cross-Site Scripting Vulnerability ȯɽ³µÍס§ Cross-Site Scripting (XSS) vulnerability is caused by failure of Web applications to properly validate user input before returning it to the client's Web browser. Although several approaches exist for defending against XSS attacks, XSS vulnerabilities continue to appear in Web applications. These weaknesses, which often result from poorly developed Web applications and data processing systems, allows attackers to embed malicious HTML-based contents, such as JavaScripts, within client HTTP requests. Through embedding HTML code and scripting elements, it is possible to steal session ID information, thus resulting in the leakage of confidential information. I propose a system that automatically detects XSS vulnerability by manipulating either a request or a server response at the client side. The system also shares the collected vulnerability information via a central reposotory. My approach is quite different from other work in the literature, wich only protects users from XSS attacks, but also detects Web servers with XSS vulnerabilities.