*商品について |
|
表紙はついていません(本文のみ中綴じ製本です)。
号単位でも購入できます。
すべてモノクロ印刷です。
Extended Summaryはついていません。
|
|
・会員価格 ¥550 |
・一般価格 ¥770 |
|
こちらはBookPark「電気学会 電子図書館(IEEJ Electronic Library)」による文献紹介ページです。 |
|
|
|
電気学会会員の方はこちらから一旦ログインのうえ、マイページからお入りください。
会員価格で購入することができます。
|
|
非会員の方はログインの必要はありません。このまま お進みください。 |
|
|
■論文No. |
|
■ページ数 |
7ページ |
■発行日
|
2018/09/01 |
■タイトル |
Application and Evaluation of Visual CPU Simulator to Support Information Security Education |
■タイトル(英語) |
Application and Evaluation of Visual CPU Simulator to Support Information Security Education |
■著者名 |
Yoshiro Imai (Kagawa University), Shinya Hara (Kagawa University), Shunsuke Doi (Kagawa University), Koji Kagawa (Kagawa University), Kazuaki Ando (Kagawa University), Tetsuo Hattori (Kagawa University) |
■著者名(英語) |
Yoshiro Imai (Kagawa University), Shinya Hara (Kagawa University), Shunsuke Doi (Kagawa University), Koji Kagawa (Kagawa University), Kazuaki Ando (Kagawa University), Tetsuo Hattori (Kagawa University) |
■価格 |
会員 ¥550 一般 ¥770 |
■書籍種類 |
論文誌(論文単位) |
■グループ名 |
【C】電子・情報・システム部門 |
■本誌 |
電気学会論文誌C(電子・情報・システム部門誌) Vol.138 No.9 (2018) 特集T:知能メカトロニクス分野と連携する知覚情報技術 特集U:国際会議ICESS 2017
|
■本誌掲載ページ |
1116-1122ページ |
■原稿種別 |
論文/英語 |
■電子版へのリンク |
https://www.jstage.jst.go.jp/article/ieejeiss/138/9/138_1116/_article/-char/ja/
|
■キーワード |
educational visualization,computer simulation,e-learning,buffer overflow,information security education |
■要約(日本語) |
|
■要約(英語) |
This paper proposes a new approach to improve and support Information Security Education based on a visual CPU simulator. Our visual CPU simulator can provide suitable demonstration for learners to comprehend how buffer overflow causes some remarkable effects for security matter. At the first stage of Information Security Education, a normal program including subroutine call and its return has been graphically and correctly executed by the visual CPU simulator, secondly demonstration of buffer overflow phenomena can be performed by the simulator through stack overwriting in order for learners to understand typical software vulnerability. Learners will be able to recognize how such an overflow phenomena easily occur some violence of stack replacement and exordinary program execution through utilization of the CPU simulator. This approach to visualize Information Security Education with our CPU simulator has been evaluated through questionnaire by learners in classroom lectures. It is confirmed that approach to visualize Information Security Education has been effective for learners to study buffer overflow phenomena by means of qualitative and quantitative analysis of the result of questionnaire. |
■版 型 |
A4 |
|
|
|