Requirements on Security Management for Adaptive Platform, No.881, 2021-11
AUTOSAR R21-11(0) 仕様ダウンロード。単語帳。参考文献一覧作成
用語
glossary定義に依っている。
英日
日本語は仮訳
no. | count | word | 日本語 |
---|---|---|---|
1 | 422 | the | その |
2 | 234 | of | の |
3 | 224 | a | 一つの |
4 | 190 | to | に |
5 | 131 | and | と |
6 | 130 | is | です |
7 | 125 | for | にとって |
8 | 94 | in | の |
9 | 90 | be | です |
10 | 78 | autosar | AUTomotive Open System Architecture(短縮名) |
11 | 76 | memory | 記憶 |
12 | 75 | are | それは |
13 | 73 | system | 系 |
14 | 72 | on | の上 |
15 | 72 | or | また |
16 | 69 | code | 符号 |
17 | 59 | security | 安全 |
18 | 57 | adaptive | 適応 |
19 | 57 | as | なので |
20 | 57 | platform | 土台 |
21 | 55 | this | これ |
22 | 52 | that | それ |
23 | 50 | document | 文書 |
24 | 50 | management | 管理 |
25 | 50 | requirements | 要件 |
26 | 48 | an | 一つの |
27 | 46 | by | に |
28 | 42 | https | Hypertext Transfer Protocol Secure(短縮名) |
29 | 41 | rs_sec_ | rs_sec_ |
30 | 40 | can | できる |
31 | 38 | rs_main_ | rs_main_ |
32 | 37 | attacks | 攻撃 |
33 | 37 | pointer | 指示子 |
34 | 37 | r | r |
35 | 37 | stack | スタック |
36 | 36 | c | c |
37 | 36 | which | どれの |
38 | 35 | ap | adaptive platform(短縮名) |
39 | 35 | id | identifier, 識別子(短縮名) |
40 | 35 | support | 支援 |
41 | 34 | attack | 攻撃 |
42 | 34 | compiler | 編纂器 |
43 | 33 | address | 住所 |
44 | 33 | autosar_rs_securitymanagement | autosar_rs_securitymanagement |
45 | 33 | it | それ |
46 | 32 | process | 処理する |
47 | 31 | org | organization(短縮名) |
48 | 30 | control | 制御 |
49 | 30 | operating | 操作 |
50 | 30 | shall | しなければならない |
51 | 29 | with | と |
52 | 27 | flow | 流れ |
53 | 27 | not | いいえ |
54 | 26 | only | それだけ |
55 | 26 | software | ソフトウェア |
56 | 25 | application | 応用 |
57 | 25 | integrity | 威厳 |
58 | 24 | all | すべて |
59 | 24 | communication | 通信 |
60 | 24 | secure | 安全 |
61 | 23 | access | 接続 |
62 | 23 | linux | Linux is not Unix |
63 | 22 | data | 与件 |
64 | 22 | gcc | gnu c compiler, gnu compiler collection(短縮名) |
65 | 22 | if | もしも |
66 | 22 | such | そのような |
67 | 22 | use | 使用する |
68 | 21 | any | どれか |
69 | 21 | corruption | 腐敗 |
70 | 21 | description | 説明 |
71 | 21 | html | hyper text markup language(短縮名) |
72 | 21 | isolation | 隔離 |
73 | 21 | protection | 保護 |
74 | 20 | other | 他の |
75 | 19 | functions | 関数 |
76 | 19 | kernel | 核 |
77 | 18 | buffer | 緩衝器 |
78 | 18 | runtime | 実行時 |
79 | 18 | used | 使用済み |
80 | 18 | vulnerabilities | 脆弱性 |
81 | 17 | aslr | Address Space Layout(短縮名) |
82 | 17 | but | しかし |
83 | 17 | com | commercial(短縮名) |
84 | 17 | hardware | ハードウェア |
85 | 17 | level | 水準 |
86 | 17 | return | 戻る |
87 | 17 | space | 空間 |
88 | 16 | applications | 応用 |
89 | 16 | case | 場合 |
90 | 16 | cfi | Control-flow integrity(短縮名) |
91 | 16 | from | から |
92 | 16 | these | これらは |
93 | 15 | call | 電話 |
94 | 15 | execution | 実行 |
95 | 15 | material | 材料 |
96 | 15 | protected | 保護 |
97 | 15 | virtual | 仮想 |
98 | 15 | www | world wide web(短縮名) |
99 | 14 | at | で |
100 | 14 | cpi | Code Pointer Integrity (短縮名) |
101 | 14 | example | 例 |
102 | 14 | function | 働き |
103 | 14 | http | Hypertext Transfer Protocol(短縮名) |
104 | 14 | options | 選択肢 |
105 | 14 | out | 外 |
参照
[1] Standardization Template, AUTOSAR_TPS_StandardizationTemplate
[2] Main Requirements, AUTOSAR_RS_Main
[3] Explanation of Adaptive Platform Design, AUTOSAR_EXP_PlatformDesign
[4] SoK: Eternal War in Memory
[5] Guidelines for the use of the C++14 language in critical and safety-related systems, AUTOSAR_RS_CPP14Guidelines
[6] The SPARC Architectural Manual, Version 8, http://sparc.org/wp-content/uploads/2014/01/v8.pdf.gz
[7] OpenBSD-3.3 announcement, public release of WˆX, http://www.openbsd.org/33.html
[8] Smashing The Stack For Fun And Profit, http://phrack.org/issues/49/14.html
[9] The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)
[10] Jump-oriented Programming: A New Class of Code-reuse Attack
[11] On the Expressiveness of Return-into-libc Attacks
[12] Code-Pointer Integrity
[13] ARM Pointer Authentication
https://lwn.net/Articles/718888/
[14] PaX ASLR (Address Space Layout Randomization)
[15] Control-flow Integrity
[16] AMD64 Architecture Programmer’s Manual Volume 2: System Programming
http://support.amd.com/TechDocs/24593.pdf
[17] PowerPC Architecture Book, Version 2.02
https://www.ibm.com/developerworks/systems/library/es-archguide-v2.html
[18] PowerPC Operating Environment Architecture Book III
http://public.dhe.ibm.com/software/dw/library/es-ppcbook3.zip
[19] Linux Kernel, Summary of changes from v2.6.7 to v2.6.8
https://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.8
[20] PAX
https://pax.grsecurity.net/docs/pax.txt
[21] CPI LLVM on github
https://github.com/cpi-llvm
[22] Flipping bits in memory without accessing them: An experimental study of DRAM
disturbance errors
[23] Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
[24] ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks
[25] A seccomp overview
https://lwn.net/Articles/656307/
[26] Frequently Asked Questions for FreeBSD 10.X and 11.X
https://www.freebsd.org/doc/en/books/faq/security.html
[27] pledge(2)
https://man.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/pledge.2