{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:31:07Z","timestamp":1742981467810,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031383328"},{"type":"electronic","value":"9783031383335"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-38333-5_7","type":"book-chapter","created":{"date-parts":[[2023,7,20]],"date-time":"2023-07-20T11:02:28Z","timestamp":1689850948000},"page":"65-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detection of\u00a0Infostealer Variants Through Graph Neural Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4215-8933","authenticated-orcid":false,"given":"\u00c1lvaro","family":"Bustos-Tabernero","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2224-4957","authenticated-orcid":false,"given":"Daniel","family":"L\u00f3pez-S\u00e1nchez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4726-7103","authenticated-orcid":false,"given":"Ang\u00e9lica","family":"Gonz\u00e1lez Arrieta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,7,21]]},"reference":[{"key":"7_CR1","unstructured":"Bazaar, M.: MalwareBazaar $$|$$ SHA256 (2023). https:\/\/rb.gy\/6hyai"},{"key":"7_CR2","doi-asserted-by":"publisher","unstructured":"Chen, Y.H., Chen, J.L., Deng, R.F.: Similarity-based malware classification using graph neural networks. Appl. Sci. 12(21) (2022). https:\/\/doi.org\/10.3390\/app122110837. https:\/\/www.mdpi.com\/2076-3417\/12\/21\/10837","DOI":"10.3390\/app122110837"},{"key":"7_CR3","unstructured":"CSIRO: Stellargraph - machine learning on graphs (2020). https:\/\/www.stellargraph.io\/"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Ding, S.H., Fung, B.C., Charland, P.: Asm2vec: boosting static representation robustness for binary clone search against code obfuscation and compiler optimization. In: Proceedings of the IEEE Symposium on Security and Privacy, May 2019, pp. 472\u2013489 (2019). https:\/\/doi.org\/10.1109\/SP.2019.00003","DOI":"10.1109\/SP.2019.00003"},{"key":"7_CR5","unstructured":"Hamilton, W.L., Ying, R., Leskovec, J.: Inductive representation learning on large graphs. In: Advances in Neural Information Processing Systems, December 2017 (2017). https:\/\/arxiv.org\/pdf\/1706.02216.pdf"},{"key":"7_CR6","unstructured":"Kingma, D.P., Ba, J.L.: Adam: a method for stochastic optimization. In: 3rd International Conference on Learning Representations, ICLR 2015, Conference Track Proceedings (2015)"},{"key":"7_CR7","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. In: 5th International Conference on Learning Representations, ICLR 2017, Conference Track Proceedings (2016). http:\/\/arxiv.org\/abs\/1609.02907"},{"key":"7_CR8","unstructured":"Lancern: Github - lancern\/asm2vec: an unofficial implementation of asm2vec as a standalone python package (2020). https:\/\/github.com\/Lancern\/asm2vec"},{"key":"7_CR9","unstructured":"MalwareBazaar: Malwarebazaar (2023). https:\/\/bazaar.abuse.ch"},{"key":"7_CR10","unstructured":"McMillan, R.: Definition: threat intelligence (2013). https:\/\/www.gartner.com\/en\/documents\/2487216"},{"key":"7_CR11","unstructured":"Micro, T.: Yara rules parent topic (2019). https:\/\/docs.trendmicro.com\/all\/ent\/ddi\/v5.5\/en-us\/ddi_5.5_olh\/YARA-Rules.html"},{"key":"7_CR12","unstructured":"NetworkX: Networkx - network analysis in python (2014). https:\/\/networkx.org\/"},{"key":"7_CR13","unstructured":"Niepert, M., Ahmad, M., Kutzkov, K.: Learning convolutional neural networks for graphs. In: 33rd International Conference on Machine Learning, ICML 2016 (2016)"},{"key":"7_CR14","unstructured":"Olyniychuk, D.: Rhadamanthys malware detection: new infostealer spread via google ads & spam emails to target crypto wallets and dump sensitive information. https:\/\/socprime.com\/blog\/rhadamanthys-malware-detection-new-infostealer-spread-via-google-ads-spam-emails-to-target-crypto-wallets-and-dump-sensitive-information\/"},{"key":"7_CR15","unstructured":"Radare2: Radare2 (2023). https:\/\/rada.re\/n\/radare2.html"},{"key":"7_CR16","unstructured":"Run, AA: Any.run: Interactive MISC malware analysis sandbox (2023). https:\/\/app.any.run\/"},{"key":"7_CR17","unstructured":"Sandbox, J.: Automated malware analysis - joe sandbox cloud basic (2023). https:\/\/joesandbox.com\/"},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"1972","DOI":"10.35940\/ijeat.F7941.088619","volume":"8","author":"S Sarojini","year":"2019","unstructured":"Sarojini, S., Asha, S.: Botnet detection on the analysis of Zeus panda financial botnet. Int. J. Eng. Adv. Technol. 8, 1972\u20131976 (2019). https:\/\/doi.org\/10.35940\/ijeat.F7941.088619","journal-title":"Int. J. Eng. Adv. Technol."},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Scarselli, F., Gori, M., Tsoi, A.C., Hagenbuchner, M., Monfardini, G.: The graph neural network model. IEEE Trans. Neural Netw. 20 (2009). https:\/\/doi.org\/10.1109\/TNN.2008.2005605","DOI":"10.1109\/TNN.2008.2005605"},{"issue":"2","key":"7_CR20","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/MSP.2012.39","volume":"10","author":"B Schneier","year":"2012","unstructured":"Schneier, B.: How changing technology affects security. IEEE Secur. Priv. 10(2), 104\u2013104 (2012). https:\/\/doi.org\/10.1109\/MSP.2012.39","journal-title":"IEEE Secur. Priv."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, M., Cui, Z., Neumann, M., Chen, Y.: An end-to-end deep learning architecture for graph classification. In: The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI 2018) (2018)","DOI":"10.1609\/aaai.v32i1.11782"}],"container-title":["Lecture Notes in Networks and Systems","Distributed Computing and Artificial Intelligence, 20th International Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-38333-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,20]],"date-time":"2023-07-20T11:05:02Z","timestamp":1689851102000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-38333-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031383328","9783031383335"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-38333-5_7","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Distributed Computing and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guimaraes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dcai2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dcai-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}