{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:38:58Z","timestamp":1742949538875,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030227432"},{"type":"electronic","value":"9783030227449"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22744-9_17","type":"book-chapter","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T17:29:16Z","timestamp":1559928556000},"page":"221-235","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Deep Malware Detection Method Based on General-Purpose Register Features"],"prefix":"10.1007","author":[{"given":"Fang","family":"Li","sequence":"first","affiliation":[]},{"given":"Chao","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Ziyuan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,8]]},"reference":[{"key":"17_CR1","unstructured":"AV-TEST\u2014The Independent IT-Security Institute. https:\/\/www.av-test.org\/en\/statistics\/malware\/. Accessed Mar 2018"},{"key":"17_CR2","unstructured":"The Complete Open-Source and Business Software Platform. https:\/\/SourceForge.net. Accessed Sept 2018"},{"key":"17_CR3","unstructured":"Software Developer Manuals for Intel 64 and IA-32 Architectures. https:\/\/www.intel.com\/content\/www\/us\/en\/support\/articles\/000006715\/processors.html?wapkw=developer\/. Accessed Sept 2018"},{"key":"17_CR4","unstructured":"VirusShare. https:\/\/virusshare.com\/. Accessed Sept 2018"},{"key":"17_CR5","unstructured":"VirusTotal. https:\/\/www.virustotal.com\/en\/. Accessed Sept 2018"},{"key":"17_CR6","unstructured":"VX Heaven. http:\/\/vxheaven.org\/vl.php. Accessed Sept 2018"},{"key":"17_CR7","unstructured":"Abadi, M., et al.: TensorFlow: large-scale machine learning on heterogeneous distributed systems (2015)"},{"key":"17_CR8","first-page":"431","volume":"79","author":"MAA Kumara","year":"2017","unstructured":"Kumara, M.A.A., Jaidhar, C.D.: Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM. Future Gener. Comput. Syst. 79, 431\u2013446 (2017)","journal-title":"Future Gener. Comput. Syst."},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"S107","DOI":"10.1016\/j.diin.2018.04.019","volume":"26","author":"S Banin","year":"2018","unstructured":"Banin, S., Dyrkolbotn, G.O.: Multinomial malware classification via low-level features. Digit. Invest. 26, S107\u2013S117 (2018)","journal-title":"Digit. Invest."},{"key":"17_CR10","unstructured":"Bellard, F.: QEMU, a fast and portable dynamic translator. In: Conference on USENIX Technical Conference, p. 41 (2005)"},{"issue":"2","key":"17_CR11","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1504\/IJESDF.2007.016865","volume":"1","author":"D Bilar","year":"2007","unstructured":"Bilar, D.: Opcodes as predictor for malware. Int. J. Electron. Secur. Digit. Forensics 1(2), 156\u2013168 (2007)","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Cronin, P., Yang, C.: Lowering the barrier to online malware detection through low frequency sampling of HPCs. In: IEEE International Symposium on Hardware Oriented Security and Trust, pp. 177\u2013180 (2018)","DOI":"10.1109\/HST.2018.8383910"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Demme, J., et al.: On the feasibility of online malware detection with performance counters. In: International Symposium on Computer Architecture, pp. 559\u2013570 (2013)","DOI":"10.1145\/2508148.2485970"},{"issue":"2","key":"17_CR14","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.cose.2014.04.003","volume":"44","author":"Y Ding","year":"2014","unstructured":"Ding, Y., Dai, W., Yan, S., Zhang, Y.: Control flow-based opcode behavior analysis for malware detection. Comput. Secur. 44(2), 65\u201374 (2014)","journal-title":"Comput. Secur."},{"key":"17_CR15","doi-asserted-by":"publisher","unstructured":"Fern\u00e1ndez, A., Garc\u00eda, S., Galar, M., Prati, R.C., Krawczyk, B., Herrera, F.: Performance measures. In: Learning from Imbalanced Data Sets, pp. 47\u201361. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98074-4_3","DOI":"10.1007\/978-3-319-98074-4_3"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Christodorescu, M., Sailer, R., Yan, X.: Synthesizing near-optimal malware specifications from suspicious behaviors. In: Security and Privacy, pp. 45\u201360 (2010)","DOI":"10.1109\/SP.2010.11"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Ghiasi, M., Sami, A., Salehi, Z.: Dynamic malware detection using registers values set analysis. In: International ISC Conference on Information Security and Cryptology, pp. 54\u201359 (2012)","DOI":"10.1109\/ISCISC.2012.6408191"},{"key":"17_CR18","unstructured":"Hoffer, E., Banner, R., Golan, I., Soudry, D.: Norm matters: efficient and accurate normalization schemes in deep networks (2018)"},{"issue":"2","key":"17_CR19","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.jnca.2012.10.004","volume":"36","author":"R Islam","year":"2013","unstructured":"Islam, R., Tian, R., Versteeg, S., Versteeg, S.: Review: classification of malware based on integrated static and dynamic features. J. Netw. Comput. Appl. 36(2), 646\u2013656 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-26362-5_1","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"KN Khasawneh","year":"2015","unstructured":"Khasawneh, K.N., Ozsoy, M., Donovick, C., Abu-Ghazaleh, N., Ponomarev, D.: Ensemble learning for low-level hardware-supported malware detection. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 3\u201325. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26362-5_1"},{"issue":"8","key":"17_CR21","first-page":"42","volume":"8","author":"P Okane","year":"2016","unstructured":"Okane, P., Sezer, S., Mclaughlin, K., Im, E.G.: Malware detection: program run length against detection rate. IET Softw. 8(8), 42\u201351 (2016)","journal-title":"IET Softw."},{"issue":"3","key":"17_CR22","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1109\/TIFS.2013.2242890","volume":"8","author":"P O\u2019Kane","year":"2013","unstructured":"O\u2019Kane, P., Sezer, S., Mclaughlin, K., Im, E.G.: SVM training phase reduction using dataset feature filtering for malware detection. IEEE Trans. Inf. Forensics Secur. 8(3), 500\u2013509 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Ozsoy, M., Donovick, C., Gorelik, I., Abughazaleh, N., Ponomarev, D.: Malware-aware processors: a framework for efficient online malware detection. In: IEEE International Symposium on High Performance Computer Architecture, pp. 651\u2013661 (2015)","DOI":"10.1109\/HPCA.2015.7056070"},{"issue":"11","key":"17_CR24","doi-asserted-by":"publisher","first-page":"3332","DOI":"10.1109\/TC.2016.2540634","volume":"65","author":"M Ozsoy","year":"2016","unstructured":"Ozsoy, M., Khasawneh, K.N., Donovick, C., Gorelik, I., Abughazaleh, N., Ponomarev, D.V.: Hardware-based malware detection using low level architectural features. IEEE Trans. Comput. 65(11), 3332\u20133344 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Santos, I., Penya, Y.K., Devesa, J., Bringas, P.G.: N-grams-based file signatures for malware detection. In: International Conference on Enterprise Information Systems, pp. 317\u2013320 (2009)","DOI":"10.5220\/0001863603170320"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Sayadi, H., Makrani, H.M., Randive, O., Sai Manoj, P.D., Rafatirad, S., Homayoun, H.: Customized machine learning-based hardware-assisted malware detection in embedded devices. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 1685\u20131688 (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00251"},{"key":"17_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-319-11379-1_6","volume-title":"Research in Attacks, Intrusions and Defenses","author":"A Tang","year":"2014","unstructured":"Tang, A., Sethumadhavan, S., Stolfo, S.J.: Unsupervised anomaly-based malware detection using hardware features. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol. 8688, pp. 109\u2013129. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11379-1_6"},{"key":"17_CR28","first-page":"1","volume":"2018","author":"J Yan","year":"2018","unstructured":"Yan, J., Qi, Y., Rao, Q.: LSTM-based hierarchical denoising network for Android malware detection. Secur. Commun. Netw. 2018, 1\u201318 (2018)","journal-title":"Secur. Commun. Netw."}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22744-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T04:02:45Z","timestamp":1686110565000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22744-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030227432","9783030227449"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22744-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Faro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}