Abstract:
An information provision apparatus includes: a data acquisition part that acquires data from a sensor(s) installed to grasp movement of a vehicle(s) traveling on a road; a database that accumulates primary data acquired by the sensor(s); a user-specific processing content storage part that stores a user-specific processing content(s) defining a processing content(s) on the primary data for each data user; a data processing part that reads out the user-specific processing content(s) stored in the user-specific processing content storage part and creates secondary data for the data user(s) from the primary data; and a data transmission part that transmits the secondary data to the data user(s).
Abstract:
In a backdoor inspection apparatus, a static analysis unit executes static analysis processing for a backdoor on each code block included in target software to be inspected to thereby specify a first code block and a condition, the first code possibly being the backdoor and the first code block being executed under the condition. Next, the static analysis unit outputs the target software to which first information indicating the specified first code block is added and second information indicating the specified condition to a dynamic analysis unit. The dynamic analysis unit controls dynamic analysis processing for the backdoor performed on the target software to which the first information is added based on the first information and the second information.
Abstract:
A feature estimating device includes a parser identifying means for identifying a parser, the parser being contained in software, for parsing user input and executing a relevant command, a dividing means for extracting commands form a character string in the parser and clustering control flows connecting with the extracted commands as starting points to divide a code of the software for each feature, and a feature estimating means for estimating, based on a characteristic part of each divided code, a feature for each divided code.
Abstract:
A program verification system of the invention includes program verification means 51 for verifying whether a verification target program input as a program operating in a secure environment does not include a program execution function which is a function of executing a new program in the same environment by a command in the corresponding program and/or whether the verification target program or a protection mechanism of the secure environment as an operation source of the verification target program includes an external input attack defense function which is a function of defending against an attack caused by an external data input during execution of the program; and signature means 52 for giving a signature to the program based on a result of the verification by the program verification means 51.
Abstract:
This invention provides an information processing system for controlling, in the management of network resources, with a desired accuracy and at a lower cost, whether to perform operations for the network resources. The information processing system comprises a means that performs a determination as to whether to execute an Application Programming (API) called up by an operating subject and used for controlling the network resources, said determination being performed on the basis of a correspondence among the operating subject, a tenant that is a set consisting of the network resources for which the operating subject has been permitted to perform operations, and the API for which the execution by the operating subject has been permitted. This means then controls the execution of the API on the basis of a result of the determination.
Abstract:
In a software correcting apparatus, a specification unit specifies a plurality of code blocks contained in a target software. A checking unit determines, for each of the specified code blocks, whether or not the specified code block is a code block that is possibly a backdoor, and specifies a code block that is determined to be possibly a backdoor as a backdoor block. A correction processing unit performs an execution-disabling process or a putting-under-surveillance process on the backdoor block contained in the target software. The execution-disabling process is a process for changing the state of the backdoor block into a state in which it cannot be executed. The putting-under-surveillance process is a process for handling the backdoor block as a subject that should be monitored when it is executed.
Abstract:
According to an example embodiment, a firmware rewriting apparatus includes: call position specifying means for specifying, among instructions described in a program of firmware stored in a memory, the instructions for changing a control flow; free area specifying means for specifying a free area in a storage area of the memory in which the program is not stored; and program rewriting means for rewriting the instruction specified by the call position specifying means into a call instruction of a frequency adjustment code and writing the frequency adjustment code for calling an inspection code at a frequency corresponding to a frequency of calling the frequency adjustment code and the inspection code for performing a security check of the program in response to a call from the frequency adjustment code into the free area specified by the free area specifying means.
Abstract:
A device 81 includes a memory space having a secure space. A determination device 82 is disposed in the secure space and determines a right in a region in the secure space. A policy storage unit 83 is disposed in the secure space and stores a policy having defined therein at least one of an access right to the region and an execution right of a function disposed in the region. Access to the secure space and execution of the function in the secure space are performed via the determination device 82, and the determination device 82 controls the access to and the execution in the secure space on the basis of the policy.
Abstract:
A control execution apparatus is provided with a communication unit that makes an inquiry concerning a packet processing method with respect to a predetermined control instruction apparatus, and a packet processing unit that processes packets based on an instruction from the control instruction apparatus. The control instruction apparatus is provided with a communication history management unit that manages communication history between nodes via the control execution apparatus, a node state determination unit that determines, making reference to the communication history of the communication history management unit, whether or not a node that is a transmission source or a transmission destination of the packet for which an inquiry concerning a processing method was received, is on a side that provides a service to another node, and a control instruction unit that prohibits, when at least the node is on the side that provides a service to another node, new communication from the node in question to the other node.
Abstract:
In backdoor inspection apparatus, an inspection control unit controls whether or not to cause a target functional block to be input to an inspection unit according to trust of the target functional block. The inspection unit executes inspection processing for a backdoor on the input target functional block.