{"created":"2021-03-01T06:20:03.292551+00:00","id":3414,"links":{},"metadata":{"_buckets":{"deposit":"ff31fe6d-856b-4f91-8cae-36caebfcaf21"},"_deposit":{"id":"3414","owners":[],"pid":{"revision_id":0,"type":"depid","value":"3414"},"status":"published"},"_oai":{"id":"oai:repository.dl.itc.u-tokyo.ac.jp:00003414"},"item_7_alternative_title_1":{"attribute_name":"\u305d\u306e\u4ed6\u306e\u30bf\u30a4\u30c8\u30eb","attribute_value_mlt":[{"subitem_alternative_title":"\u52d5\u7684\u306a\u6587\u5b57\u5217\u5909\u63db\u306e\u691c\u51fa\u306b\u57fa\u3065\u304fDTP"}]},"item_7_biblio_info_7":{"attribute_name":"\u66f8\u8a8c\u60c5\u5831","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2012-03-22","bibliographicIssueDateType":"Issued"},"bibliographic_titles":[{}]}]},"item_7_date_granted_25":{"attribute_name":"\u5b66\u4f4d\u6388\u4e0e\u5e74\u6708\u65e5","attribute_value_mlt":[{"subitem_dategranted":"2012-03-22"}]},"item_7_degree_name_20":{"attribute_name":"\u5b66\u4f4d\u540d","attribute_value_mlt":[{"subitem_degreename":"\u4fee\u58eb(\u60c5\u5831\u7406\u5de5\u5b66)"}]},"item_7_description_5":{"attribute_name":"\u6284\u9332","attribute_value_mlt":[{"subitem_description":"Currently, the security of web applications is faced with the threat of script injection attacks, such as cross-site scripting, and SQL injection. DTP (Dynamic Taint Propagation) has been established as a powerful technique for detecting script injection attacks, but current DTP systems suffer from a trade-off between false positives and false negatives. Therefore, Li et al. proposed an enhanced DTP system called SWIFT. SWIFT traces memory accesses, detects string operations, and only propagates tainted information under string operations. Although the basic idea of SWIFT is quite promising, they only showed a preliminary implementation on a simulator and failed to show advantage in accuracy over Raksha, which is one of the most sophisticated platform DTP systems. In this paper, we implement SWIFT to PHP interpreter to put SWIFT into practical use. Moreover, we succeeded to show that SWIFT has better propagation accuracy than Raksha in real-world web applications.","subitem_description_type":"Abstract"}]},"item_7_full_name_3":{"attribute_name":"\u8457\u8005\u5225\u540d","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"8203","nameIdentifierScheme":"WEKO"}],"names":[{"name":"\u90fd\u4e95, \u7d18"}]}]},"item_7_select_21":{"attribute_name":"\u5b66\u4f4d","attribute_value_mlt":[{"subitem_select_item":"master"}]},"item_7_subject_13":{"attribute_name":"\u65e5\u672c\u5341\u9032\u5206\u985e\u6cd5","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_7_text_24":{"attribute_name":"\u7814\u7a76\u79d1\u30fb\u5c02\u653b","attribute_value_mlt":[{"subitem_text_value":"\u60c5\u5831\u7406\u5de5\u5b66\u7cfb\u7814\u7a76\u79d1\u96fb\u5b50\u60c5\u5831\u5b66\u5c02\u653b"}]},"item_7_text_4":{"attribute_name":"\u8457\u8005\u6240\u5c5e","attribute_value_mlt":[{"subitem_text_value":"\u6771\u4eac\u5927\u5b66\u5927\u5b66\u9662\u60c5\u5831\u7406\u5de5\u5b66\u7cfb\u7814\u7a76\u79d1\u96fb\u5b50\u60c5\u5831\u5b66\u5c02\u653b"},{"subitem_text_value":"Department of Information and Communication Engineering, Graduate School of Information Science and Technology, The University of Tokyo"}]},"item_creator":{"attribute_name":"\u8457\u8005","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Toi, Hiroshi"}],"nameIdentifiers":[{"nameIdentifier":"8202","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"\u30d5\u30a1\u30a4\u30eb\u60c5\u5831","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-05-31"}],"displaytype":"detail","filename":"48106425.pdf","filesize":[{"value":"559.4 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"48106425.pdf","url":"https://repository.dl.itc.u-tokyo.ac.jp/record/3414/files/48106425.pdf"},"version_id":"751ed3fa-d9fb-4c66-b2cf-6fc64f00585f"}]},"item_language":{"attribute_name":"\u8a00\u8a9e","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"\u8cc7\u6e90\u30bf\u30a4\u30d7","attribute_value_mlt":[{"resourcetype":"thesis","resourceuri":"http://purl.org/coar/resource_type/c_46ec"}]},"item_title":"Dynamic Taint Propagation Based on Dynamic String Conversion Detection","item_titles":{"attribute_name":"\u30bf\u30a4\u30c8\u30eb","attribute_value_mlt":[{"subitem_title":"Dynamic Taint Propagation Based on Dynamic String Conversion Detection"}]},"item_type_id":"7","owner":"1","path":["9/233/234","34/105/262"],"pubdate":{"attribute_name":"\u516c\u958b\u65e5","attribute_value":"2012-05-29"},"publish_date":"2012-05-29","publish_status":"0","recid":"3414","relation_version_is_last":true,"title":["Dynamic Taint Propagation Based on Dynamic String Conversion Detection"],"weko_creator_id":"1","weko_shared_id":null},"updated":"2021-03-02T08:06:51.071050+00:00"}