{"provider_url":"https://hatena.blog","width":"100%","published":"2009-05-23 00:00:01","description":"Dynamic Data Flow Analysis via VirtualCode Integration (aka The SpiderPig case) http://piotrbania.com/all/spiderpig/pbania-spiderpig2008.pdf \u300c2008\u5e74 \u56fd\u5185\u306b\u304a\u3051\u308b\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e8b\u8c61\u88ab\u5bb3\u72b6\u6cc1\u8abf\u67fb\u300d\u5831\u544a\u66f8\u3092\u516c\u958b http://www.ipa.go.jp/security/fy20/reports/isec-survey/index.html \u300cWindows 7\u300d\u300cVista\u300d\u300cXP\u300d\u306e\u6bd4\u8f03\u4e00\u89a7--\u5404\u30d0\u30fc\u30b8\u30e7\u30f3\u306e\u4e3b\u8981\u6a5f\u80fd http://japan.cn\u2026","provider_name":"Hatena Blog","version":"1.0","type":"rich","image_url":null,"categories":["sec-summary","\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u30fb\u8aad\u307f\u7269"],"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fnaoe.hatenadiary.org%2Fentry%2F20090523%2Fp2\" title=\" - naoe\u306e\u65e5\u8a18\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","blog_url":"https://naoe.hatenadiary.org/","author_url":"https://blog.hatena.ne.jp/naoe/","height":"190","author_name":"naoe","url":"https://naoe.hatenadiary.org/entry/20090523/p2","blog_title":"naoe\u306e\u65e5\u8a18","title":""}