Requirements on Security Management for Adaptive Platform, No.881, 2021-11
AUTOSAR R21-11(0) 仕様ダウンロード。単語帳。参考文献一覧作成
用語
glossary定義に依っている。
英日
日本語は仮訳
| no. | count | word | 日本語 |
|---|---|---|---|
| 1 | 422 | the | その |
| 2 | 234 | of | の |
| 3 | 224 | a | 一つの |
| 4 | 190 | to | に |
| 5 | 131 | and | と |
| 6 | 130 | is | です |
| 7 | 125 | for | にとって |
| 8 | 94 | in | の |
| 9 | 90 | be | です |
| 10 | 78 | autosar | AUTomotive Open System Architecture(短縮名) |
| 11 | 76 | memory | 記憶 |
| 12 | 75 | are | それは |
| 13 | 73 | system | 系 |
| 14 | 72 | on | の上 |
| 15 | 72 | or | また |
| 16 | 69 | code | 符号 |
| 17 | 59 | security | 安全 |
| 18 | 57 | adaptive | 適応 |
| 19 | 57 | as | なので |
| 20 | 57 | platform | 土台 |
| 21 | 55 | this | これ |
| 22 | 52 | that | それ |
| 23 | 50 | document | 文書 |
| 24 | 50 | management | 管理 |
| 25 | 50 | requirements | 要件 |
| 26 | 48 | an | 一つの |
| 27 | 46 | by | に |
| 28 | 42 | https | Hypertext Transfer Protocol Secure(短縮名) |
| 29 | 41 | rs_sec_ | rs_sec_ |
| 30 | 40 | can | できる |
| 31 | 38 | rs_main_ | rs_main_ |
| 32 | 37 | attacks | 攻撃 |
| 33 | 37 | pointer | 指示子 |
| 34 | 37 | r | r |
| 35 | 37 | stack | スタック |
| 36 | 36 | c | c |
| 37 | 36 | which | どれの |
| 38 | 35 | ap | adaptive platform(短縮名) |
| 39 | 35 | id | identifier, 識別子(短縮名) |
| 40 | 35 | support | 支援 |
| 41 | 34 | attack | 攻撃 |
| 42 | 34 | compiler | 編纂器 |
| 43 | 33 | address | 住所 |
| 44 | 33 | autosar_rs_securitymanagement | autosar_rs_securitymanagement |
| 45 | 33 | it | それ |
| 46 | 32 | process | 処理する |
| 47 | 31 | org | organization(短縮名) |
| 48 | 30 | control | 制御 |
| 49 | 30 | operating | 操作 |
| 50 | 30 | shall | しなければならない |
| 51 | 29 | with | と |
| 52 | 27 | flow | 流れ |
| 53 | 27 | not | いいえ |
| 54 | 26 | only | それだけ |
| 55 | 26 | software | ソフトウェア |
| 56 | 25 | application | 応用 |
| 57 | 25 | integrity | 威厳 |
| 58 | 24 | all | すべて |
| 59 | 24 | communication | 通信 |
| 60 | 24 | secure | 安全 |
| 61 | 23 | access | 接続 |
| 62 | 23 | linux | Linux is not Unix |
| 63 | 22 | data | 与件 |
| 64 | 22 | gcc | gnu c compiler, gnu compiler collection(短縮名) |
| 65 | 22 | if | もしも |
| 66 | 22 | such | そのような |
| 67 | 22 | use | 使用する |
| 68 | 21 | any | どれか |
| 69 | 21 | corruption | 腐敗 |
| 70 | 21 | description | 説明 |
| 71 | 21 | html | hyper text markup language(短縮名) |
| 72 | 21 | isolation | 隔離 |
| 73 | 21 | protection | 保護 |
| 74 | 20 | other | 他の |
| 75 | 19 | functions | 関数 |
| 76 | 19 | kernel | 核 |
| 77 | 18 | buffer | 緩衝器 |
| 78 | 18 | runtime | 実行時 |
| 79 | 18 | used | 使用済み |
| 80 | 18 | vulnerabilities | 脆弱性 |
| 81 | 17 | aslr | Address Space Layout(短縮名) |
| 82 | 17 | but | しかし |
| 83 | 17 | com | commercial(短縮名) |
| 84 | 17 | hardware | ハードウェア |
| 85 | 17 | level | 水準 |
| 86 | 17 | return | 戻る |
| 87 | 17 | space | 空間 |
| 88 | 16 | applications | 応用 |
| 89 | 16 | case | 場合 |
| 90 | 16 | cfi | Control-flow integrity(短縮名) |
| 91 | 16 | from | から |
| 92 | 16 | these | これらは |
| 93 | 15 | call | 電話 |
| 94 | 15 | execution | 実行 |
| 95 | 15 | material | 材料 |
| 96 | 15 | protected | 保護 |
| 97 | 15 | virtual | 仮想 |
| 98 | 15 | www | world wide web(短縮名) |
| 99 | 14 | at | で |
| 100 | 14 | cpi | Code Pointer Integrity (短縮名) |
| 101 | 14 | example | 例 |
| 102 | 14 | function | 働き |
| 103 | 14 | http | Hypertext Transfer Protocol(短縮名) |
| 104 | 14 | options | 選択肢 |
| 105 | 14 | out | 外 |
参照
[1] Standardization Template, AUTOSAR_TPS_StandardizationTemplate
[2] Main Requirements, AUTOSAR_RS_Main
[3] Explanation of Adaptive Platform Design, AUTOSAR_EXP_PlatformDesign
[4] SoK: Eternal War in Memory
[5] Guidelines for the use of the C++14 language in critical and safety-related systems, AUTOSAR_RS_CPP14Guidelines
[6] The SPARC Architectural Manual, Version 8, http://sparc.org/wp-content/uploads/2014/01/v8.pdf.gz
[7] OpenBSD-3.3 announcement, public release of WˆX, http://www.openbsd.org/33.html
[8] Smashing The Stack For Fun And Profit, http://phrack.org/issues/49/14.html
[9] The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)
[10] Jump-oriented Programming: A New Class of Code-reuse Attack
[11] On the Expressiveness of Return-into-libc Attacks
[12] Code-Pointer Integrity
[13] ARM Pointer Authentication
https://lwn.net/Articles/718888/
[14] PaX ASLR (Address Space Layout Randomization)
[15] Control-flow Integrity
[16] AMD64 Architecture Programmer’s Manual Volume 2: System Programming
http://support.amd.com/TechDocs/24593.pdf
[17] PowerPC Architecture Book, Version 2.02
https://www.ibm.com/developerworks/systems/library/es-archguide-v2.html
[18] PowerPC Operating Environment Architecture Book III
http://public.dhe.ibm.com/software/dw/library/es-ppcbook3.zip
[19] Linux Kernel, Summary of changes from v2.6.7 to v2.6.8
https://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.8
[20] PAX
https://pax.grsecurity.net/docs/pax.txt
[21] CPI LLVM on github
https://github.com/cpi-llvm
[22] Flipping bits in memory without accessing them: An experimental study of DRAM
disturbance errors
[23] Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
[24] ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks
[25] A seccomp overview
https://lwn.net/Articles/656307/
[26] Frequently Asked Questions for FreeBSD 10.X and 11.X
https://www.freebsd.org/doc/en/books/faq/security.html
[27] pledge(2)
https://man.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/pledge.2