{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:10:12Z","timestamp":1742955012459,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031157769"},{"type":"electronic","value":"9783031157776"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15777-6_29","type":"book-chapter","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:24:33Z","timestamp":1661268273000},"page":"525-545","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Peekaboo: Hide and\u00a0Seek with\u00a0Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach"],"prefix":"10.1007","author":[{"given":"Mingchang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Vinay","family":"Sachidananda","sequence":"additional","affiliation":[]},{"given":"Hongyi","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Rajendra","family":"Patil","sequence":"additional","affiliation":[]},{"given":"Sivaanandh","family":"Muneeswaran","sequence":"additional","affiliation":[]},{"given":"Mohan","family":"Gurusamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"David, O., Netanyahu, N.S.: DeepSign: deep learning for automatic malware signature generation and classification. In: International Joint Conference on Neural Networks (IJCNN), vol. 2015, pp. 1\u20138 (2015)","DOI":"10.1109\/IJCNN.2015.7280815"},{"issue":"2","key":"29_CR2","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s10115-017-1058-9","volume":"54","author":"Y Ye","year":"2017","unstructured":"Ye, Y., Chen, L., Hou, S., Hardy, W., Li, X.: DeepAM: a heterogeneous deep learning framework for intelligent malware detection. Knowl. Inf. Syst. 54(2), 265\u2013285 (2017). https:\/\/doi.org\/10.1007\/s10115-017-1058-9","journal-title":"Knowl. Inf. Syst."},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Imran, M., Afzal, M.T., Qadir, M.A.: Using hidden Markov model for dynamic malware analysis: first impressions. In: 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), pp. 816\u2013821 (2015)","DOI":"10.1109\/FSKD.2015.7382048"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Pranamulia, R., Asnar, Y.D., Perdana, R.S.: Profile hidden Markov model for malware classification: usage of system call sequence for malware classification. In: International Conference on Data and Software Engineering (ICoDSE), vol. 2017, pp. 1\u20135 (2017)","DOI":"10.1109\/ICODSE.2017.8285885"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Cordonsky, I., Rosenberg, I., Sicard, G., David, E.: DeepOrigin: end-to-end deep learning for detection of new malware families. In: International Joint Conference on Neural Networks (IJCNN), vol. 2018, pp. 1\u20137 (2018)","DOI":"10.1109\/IJCNN.2018.8489667"},{"key":"29_CR6","first-page":"460","volume":"460","author":"J Kim","year":"2018","unstructured":"Kim, J., Bu, S., Cho, S.: Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders. Inf. Sci. 460, 460\u2013461 (2018)","journal-title":"Inf. Sci."},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Kancherla, K., Mukkamala, S.: Image visualization based malware detection. In: 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp. 40\u201344 (2013)","DOI":"10.1109\/CICYBS.2013.6597204"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Zolotukhin, M., H\u00e4m\u00e4l\u00e4inen, T.: Detection of zero-day malware based on the analysis of opcode sequences. In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 386\u2013391 (2014)","DOI":"10.1109\/CCNC.2014.6866599"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Manavi, F., Hamzeh, A.: A new method for malware detection using opcode visualization. In: Artificial Intelligence and Signal Processing Conference (AISP), vol. 2017, pp. 96\u2013102 (2017)","DOI":"10.1109\/AISP.2017.8324117"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Yewale, A., Singh, M.: Malware detection based on opcode frequency. In: International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), vol. 2016, pp. 646\u2013649 (2016)","DOI":"10.1109\/ICACCCT.2016.7831719"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Masabo, E., Kaawaase, K.S., Sansa-Otim, J., Ngubiri, J., Hanyurwimfura, D.: Improvement of malware classification using hybrid feature engineering. SN Comput. Sci. 1, 17:1\u201317:14 (2020)","DOI":"10.1007\/s42979-019-0017-9"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Rong, C., Huang, Q., Wu, Y., Yang, Z., Jiang, J.: Based on multi-features and clustering ensemble method for automatic malware categorization. In: IEEE Trustcom\/BigDataSE\/ICESS, vol. 2017, pp. 73\u201382 (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.222"},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.cose.2019.04.005","volume":"84","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Qin, Z., Yin, H.B., Ou, L., Zhang, K.: A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding. Comput. Secur. 84, 376\u2013392 (2019)","journal-title":"Comput. Secur."},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Duarte-Garcia, H.L., et al.: A semi-supervised learning methodology for malware categorization using weighted word embeddings. In: 2019 IEEE European Symposium on Security and Privacy Workshops, pp. 238\u2013246 (2019)","DOI":"10.1109\/EuroSPW.2019.00033"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Pascanu, R., Stokes, J.W., Sanossian, H., Marinescu, M., Thomas, A.: Malware classification with recurrent networks. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1916\u20131920 (2015)","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Athiwaratkun, B., Stokes, J.W.: Malware classification with LSTM and GRU language models and a character-level CNN. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2017)","DOI":"10.1109\/ICASSP.2017.7952603"},{"key":"29_CR17","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.cose.2014.07.004","volume":"46","author":"AA Elhadi","year":"2014","unstructured":"Elhadi, A.A., Maarof, M.A., Barry, B.I., Hentabli, H.: Enhancing the detection of metamorphic malware using call graphs. Comput. Secur. 46, 62\u201378 (2014)","journal-title":"Comput. Secur."},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Ki, Y., Kim, E., Kim, H.K.: A novel approach to detect malware based on API call sequence analysis. Int. J. Distrib. Sens. Networks 11, 659101 (2015)","DOI":"10.1155\/2015\/659101"},{"key":"29_CR19","unstructured":"The cost of cybercrime. (2019). https:\/\/www.accenture.com\/_acnmedia\/PDF-96\/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf#zoom=50"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Sebasti\u00e1n, S., Caballero, J.: AVclass2: massive malware tag extraction from AV labels. In: Annual Computer Security Applications Conference (2020)","DOI":"10.1145\/3427228.3427261"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Wei, J., Zou, K.: EDA: easy data augmentation techniques for boosting performance on text classification tasks. ArXiv, abs\/1901.11196 (2019)","DOI":"10.18653\/v1\/D19-1670"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Yuan, L., Wang, Y., Thompson, P., Narayan, V., Ye, J.: Multi-source learning for joint analysis of incomplete multi-modality neuroimaging data. In: International Conference on Knowledge Discovery & Data Mining, pp. 1149\u20131157 (2012)","DOI":"10.1145\/2339530.2339710"},{"issue":"6","key":"29_CR23","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1093\/bioinformatics\/17.6.520","volume":"17","author":"O Troyanskaya","year":"2001","unstructured":"Troyanskaya, O., et al.: Missing value estimation methods for DNA microarrays. Bioinformatics 17(6), 520\u2013525 (2001)","journal-title":"Bioinformatics"},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Rabadi, D., Teo, S.: Advanced windows methods on malware detection and classification. In: Annual Computer Security Applications Conference (2020)","DOI":"10.1145\/3427228.3427242"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Jindal, C., Salls, C., Aghakhani, H., Long, K., Kruegel, C., Vigna, G.: Neurlux: dynamic malware analysis without feature engineering. In: Proceedings of the 35th Annual Computer Security Applications Conference (2019)","DOI":"10.1145\/3359789.3359835"},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Subedi, K.P., Budhathoki, D.R., Dasgupta, D.: Forensic analysis of ransomware families using static and dynamic analysis. In: IEEE Security and Privacy Workshops (SPW), vol. 2018, pp. 180\u2013185 (2018)","DOI":"10.1109\/SPW.2018.00033"},{"key":"29_CR27","doi-asserted-by":"crossref","unstructured":"Aghakhani, H., et al.: When malware is packin\u2019 heat. limits of machine learning classifiers based on static analysis features. In: NDSS (2020)","DOI":"10.14722\/ndss.2020.24310"},{"key":"29_CR28","doi-asserted-by":"crossref","unstructured":"Kumar, N., Mukhopadhyay, S., Gupta, M., Handa, A., Shukla, S.: Malware classification using early stage behavioral analysis. In: 2019 14th Asia Joint Conference on Information Security (AsiaJCIS), pp. 16\u201323","DOI":"10.1109\/AsiaJCIS.2019.00-10"},{"key":"29_CR29","doi-asserted-by":"crossref","unstructured":"Kang, B., Kim, T., Kwon, H., Choi, Y., Im, E.: Malware classification method via binary content comparison. In: RACS (2012)","DOI":"10.1145\/2401603.2401672"},{"key":"29_CR30","doi-asserted-by":"crossref","unstructured":"Shalaginov, A., Banin, S., Dehghantanha, A., Franke, K.: Machine learning aided static malware analysis: a survey and tutorial. ArXiv, abs\/1808.01201 (2018)","DOI":"10.1007\/978-3-319-73951-9_2"},{"key":"29_CR31","doi-asserted-by":"crossref","unstructured":"Egele, M., Scholte, T., Kirda, E., Kr\u00fcgel, C.: A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44, 6:1\u20136:42 (2008)","DOI":"10.1145\/2089125.2089126"},{"key":"29_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3329786","volume":"52","author":"O Or-Meir","year":"2019","unstructured":"Or-Meir, O., Nissim, N., Elovici, Y., Rokach, L.: Dynamic malware analysis in the modern era\u2014A state of the art survey. ACM Comput. Surv. (CSUR) 52, 1\u201348 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"29_CR33","doi-asserted-by":"crossref","unstructured":"Sihwail, R., Omar, K., Ariffin, K.A.: A survey on malware analysis techniques: static, dynamic, p. 8. hybrid and memory analysis, Int. J. Adv. Sci. Eng. Inf. Technol. 8(4-2), 1662\u20131671 (2018)","DOI":"10.18517\/ijaseit.8.4-2.6827"},{"key":"29_CR34","first-page":"56","volume":"5","author":"E Gandotra","year":"2014","unstructured":"Gandotra, E., Bansal, D., Sofat, S.: Malware analysis and classification: a survey. J. Inf. Secur. 5, 56\u201364 (2014)","journal-title":"J. Inf. Secur."},{"key":"29_CR35","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1016\/j.procs.2015.02.149","volume":"46","author":"PV Shijo","year":"2015","unstructured":"Shijo, P.V., Salim, A.: Integrated static and dynamic analysis for malware detection. Procedia Comput. Sci. 46, 804\u2013811 (2015)","journal-title":"Procedia Comput. Sci."},{"issue":"2","key":"29_CR36","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.jnca.2012.10.004","volume":"36","author":"M Islam","year":"2013","unstructured":"Islam, M., Tian, R., Batten, L., Versteeg, S.: Classification of malware based on integrated static and dynamic features. J. Network Comput. Appl. 36(2), 646\u2013656 (2013)","journal-title":"J. Network Comput. Appl."},{"key":"29_CR37","doi-asserted-by":"publisher","first-page":"46717","DOI":"10.1109\/ACCESS.2019.2906934","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Venkatraman, S.: Robust intelligent malware detection using deep learning. IEEE Access 7, 46717\u201346738 (2019)","journal-title":"IEEE Access"},{"key":"29_CR38","first-page":"377","volume":"47","author":"S Venkatraman","year":"2019","unstructured":"Venkatraman, S., Alazab, M., Vinayakumar, R.: A hybrid deep learning image-based analysis for effective malware detection. J. Inf. Secur. Appl. 47, 377\u2013389 (2019)","journal-title":"J. Inf. Secur. Appl."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15777-6_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T16:39:21Z","timestamp":1709829561000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15777-6_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031157769","9783031157776"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15777-6_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}