{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:32:28Z","timestamp":1772645548105,"version":"3.50.1"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030372279","type":"print"},{"value":"9783030372286","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37228-6_9","type":"book-chapter","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T10:00:05Z","timestamp":1576490405000},"page":"171-190","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["DeepCG: Classifying Metamorphic Malware Through Deep Learning of Call Graphs"],"prefix":"10.1007","author":[{"given":"Shuang","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Xiaobo","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Bai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,13]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.cose.2014.10.011","volume":"48","author":"S Alam","year":"2015","unstructured":"Alam, S., Horspool, R., Traore, I., Sogukpinar, I.: A framework for metamorphic malware analysis and real-time detection. Comput. Secur. 48, 212\u2013233 (2015)","journal-title":"Comput. Secur."},{"issue":"4","key":"9_CR2","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s11416-011-0152-x","volume":"7","author":"B Anderson","year":"2011","unstructured":"Anderson, B., Quist, D., Neil, J., Storlie, C., Lane, T.: Graph-based malware detection using dynamic analysis. J. Comput. Virol. 7(4), 247\u2013258 (2011)","journal-title":"J. Comput. Virol."},{"issue":"3","key":"9_CR3","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11416-008-0084-2","volume":"4","author":"JM Borello","year":"2008","unstructured":"Borello, J.M., M\u00e9, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 211\u2013220 (2008)","journal-title":"J. Comput. Virol."},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.procs.2015.06.031","volume":"54","author":"S Choudhary","year":"2015","unstructured":"Choudhary, S., Vidyarthi, M.D.: A simple method for detection of metamorphic malware using dynamic analysis and text mining. Procedia Comput. Sci. 54, 265\u2013270 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Dahl, G.E., Stokes, J.W., Deng, L., Yu, D.: Large-scale malware classification using random projections and neural networks. In: Proceedings of the IEEE ICASSP (2013)","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"David, O.E., Netanyahu, N.S.: DeepSign: deep learning for automatic malware signature generation and classification. In: Proceedings of the IEEE IJCNN (2015)","DOI":"10.1109\/IJCNN.2015.7280815"},{"key":"9_CR7","unstructured":"Eagle, C.: The IDA Pro Book. No Starch Press (2011)"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.cose.2014.07.004","volume":"46","author":"AAE Elhadi","year":"2014","unstructured":"Elhadi, A.A.E., Maarof, M.A., Barry, B.I., Hamza, H.: Enhancing the detection of metamorphic malware using call graphs. Comput. Secur. 46, 62\u201378 (2014)","journal-title":"Comput. Secur."},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/3-540-45848-4_57","volume-title":"Graph Drawing","author":"J Ellson","year":"2002","unstructured":"Ellson, J., Gansner, E., Koutsofios, L., North, S.C., Woodhull, G.: Graphviz\u2014open source graph drawing tools. In: Mutzel, P., J\u00fcnger, M., Leipert, S. (eds.) GD 2001. LNCS, vol. 2265, pp. 483\u2013484. Springer, Heidelberg (2002). \nhttps:\/\/doi.org\/10.1007\/3-540-45848-4_57"},{"issue":"12","key":"9_CR10","first-page":"1","volume":"11","author":"M Eskandari","year":"2011","unstructured":"Eskandari, M., Hashemi, S.: Metamorphic malware detection using control flow graph mining. Int. J. Comput. Sci. Netw. Secur. 11(12), 1\u20136 (2011)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"9_CR11","unstructured":"Gibert Llaurad\u00f3, D.: Convolutional neural networks for malware classification. Master\u2019s thesis, Universitat Polit\u00e8cnica de Catalunya (2016)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Graves, A., Mohamed, A., Hinton, G.: Speech recognition with deep recurrent neural networks. In: Proceedings of the IEEE ICASSP (2013)","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"9_CR13","unstructured":"Hardy, W., Chen, L., Hou, S., Ye, Y., Li, X.: DL4MD: a deep learning framework for intelligent malware detection. In: Proceedings of the DMIN (2016)"},{"key":"9_CR14","unstructured":"Hietaniemi, J., et al.: Comprehensive Perl Archive Network. Helsinki, Finland: CPAN 6 (2008)"},{"issue":"5","key":"9_CR15","doi-asserted-by":"publisher","first-page":"5947","DOI":"10.4249\/scholarpedia.5947","volume":"4","author":"GE Hinton","year":"2009","unstructured":"Hinton, G.E.: Deep belief networks. Scholarpedia 4(5), 5947 (2009)","journal-title":"Scholarpedia"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-319-40667-1_20","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"W Huang","year":"2016","unstructured":"Huang, W., Stokes, J.W.: MtNet: a multi-task neural network for dynamic malware classification. In: Caballero, J., Zurutuza, U., Rodr\u00edguez, R.J. (eds.) DIMVA 2016. LNCS, vol. 9721, pp. 399\u2013418. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-40667-1_20"},{"key":"9_CR17","unstructured":"Irsoy, O., Cardie, C.: Deep recursive neural networks for compositionality in language. In: Proceedings of the NIPS (2014)"},{"issue":"2","key":"9_CR18","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.jnca.2012.10.004","volume":"36","author":"R Islam","year":"2013","unstructured":"Islam, R., Tian, R., Batten, L.M., Versteeg, S.: Classification of malware based on integrated static and dynamic features. J. Netw. Comput. Appl. 36(2), 646\u2013656 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"9_CR19","unstructured":"Kojm, T.: ClamAV (2004)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect malicious executables in the wild. In: Proceedings of the ACM SIGKDD (2004)","DOI":"10.1145\/1014052.1014105"},{"key":"9_CR21","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Proceedings of the NIPS (2012)"},{"issue":"7553","key":"9_CR22","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436 (2015)","journal-title":"Nature"},{"key":"9_CR23","unstructured":"Mirzazadeh, R., Moattar, M.H., Jahan, M.V.: Metamorphic malware detection using linear discriminant analysis and graph similarity. CoRR abs\/1811.04304 (2018)"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.: Malware images: visualization and automatic classification. In: Proceedings of the ACM VizSec (2011)","DOI":"10.1145\/2016904.2016908"},{"key":"9_CR25","unstructured":"Oktavianto, D., Muhardianto, I.: Cuckoo Malware Analysis. Packt Publishing Ltd (2013)"},{"issue":"8","key":"9_CR26","first-page":"74","volume":"12","author":"BB Rad","year":"2012","unstructured":"Rad, B.B., Masrom, M., Ibrahim, S.: Camouflage in malware: from encryption to metamorphism. Int. J. Comput. Sci. Netw. Secur. 12(8), 74\u201383 (2012)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"9_CR27","unstructured":"Ronen, R., Radu, M., Feuerstein, C., Yom-Tov, E., Ahmadi, M.: Microsoft malware classification challenge. arXiv preprint \narXiv:1802.10135\n\n (2018)"},{"key":"9_CR28","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TSE.1979.234183","volume":"3","author":"BG Ryder","year":"1979","unstructured":"Ryder, B.G.: Constructing the call graph of a program. IEEE Trans. Softw. Eng. 3, 216\u2013226 (1979)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"4","key":"9_CR29","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1049\/iet-ifs.2010.0180","volume":"5","author":"I Santos","year":"2011","unstructured":"Santos, I., Brezo, F., Sanz, B., Laorden, C., Bringas, P.G.: Using opcode sequences in single-class learning to detect unknown malware. IET Inf. Secur. 5(4), 220\u2013227 (2011)","journal-title":"IET Inf. Secur."},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Saxe, J., Berlin, K.: Deep neural network based malware detection using two dimensional binary program features. In: Proceedings of the IEEE MALWARE (2015)","DOI":"10.1109\/MALWARE.2015.7413680"},{"issue":"1","key":"9_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2190-8532-1-1","volume":"1","author":"A Shabtai","year":"2012","unstructured":"Shabtai, A., Moskovitch, R., Feher, C., Dolev, S., Elovici, Y.: Detecting unknown malicious code by applying classification techniques on opcode patterns. Secur. Inform. 1(1), 1 (2012)","journal-title":"Secur. Inform."},{"issue":"1","key":"9_CR32","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Tian, R., Islam, R., Batten, L., Versteeg, S.: Differentiating malware from cleanware using behavioural analysis. In: Proceedings of the IEEE MALWARE (2010)","DOI":"10.1109\/MALWARE.2010.5665796"},{"key":"9_CR34","unstructured":"Yau, S.S., Tsai, J.P.: Graph description language for large-scale software specification in a maintenance environment. In: Proceedings of the IEEE COMPSAC (1984)"},{"issue":"3","key":"9_CR35","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/TSMCC.2009.2037978","volume":"40","author":"Y Ye","year":"2010","unstructured":"Ye, Y., Li, T., Jiang, Q., Wang, Y.: CIMDS: adapting postprocessing techniques of associative classification for malware detection. IEEE Trans. Syst. Man Cybern. (Part C Appl. Rev.) 40(3), 298\u2013307 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. (Part C Appl. Rev.)"},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: Proceedings of the IEEE BWCCA (2010)","DOI":"10.1109\/BWCCA.2010.85"},{"key":"9_CR37","unstructured":"Zhao, Z.: A virus detection scheme based on features of control flow graph. In: Proceedings of the IEEE AIMSEC (2011)"},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"\u00c7arkac\u0131, N., So\u011fukp\u0131nar, I: Frequency based metamorphic malware detection. In: Proceedings of the SIU (2016)","DOI":"10.1109\/SIU.2016.7495767"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37228-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T10:05:55Z","timestamp":1576490755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37228-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030372279","9783030372286"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37228-6_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"13 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}