{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:11:48Z","timestamp":1751602308454,"version":"3.41.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031877711"},{"type":"electronic","value":"9783031877728"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87772-8_26","type":"book-chapter","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T07:32:50Z","timestamp":1745307170000},"page":"308-323","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessing the\u00a0Threat of\u00a0Neural Network Enhanced Obfuscation in\u00a0Malware"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Brodzik","sequence":"first","affiliation":[]},{"given":"Wojciech","family":"Mazurczyk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"key":"26_CR1","unstructured":"Appendix. https:\/\/gist.github.com\/brodzik\/2342331deea44de18e17bb675d292997"},{"issue":"6","key":"26_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3365001","volume":"52","author":"A Afianian","year":"2019","unstructured":"Afianian, A., Niksefat, S., Sadeghiyan, B., Baptiste, D.: Malware dynamic analysis evasion techniques: a survey. ACM Comput. Surv. (CSUR) 52(6), 1\u201328 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Al-Anezi, M.M.K.: Generic packing detection using several complexity analysis for accurate malware detection. Int. J. Adv. Comput. Sci. Appl. 5(1) (2014)","DOI":"10.14569\/IJACSA.2014.050102"},{"key":"26_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-023-00504-y","volume-title":"Use of Cryptography in Malware Obfuscation","author":"HJ Asghar","year":"2023","unstructured":"Asghar, H.J., et al.: Use of Cryptography in Malware Obfuscation. J of Comp, Virology and Hacking Techniques (2023)"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"von\u00a0der Assen, J., et\u00a0al.: RansomAI: AI-powered ransomware for stealthy encryption. arXiv preprint arXiv:2306.15559 (2023)","DOI":"10.1109\/GLOBECOM54140.2023.10437393"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Blackthorne, J., Kaiser, B., Fuller, B., Yener, B.: Environmental authentication in malware. In: 5th International Conference on Cryptology and Information Security in Latin America, Cuba, 2017 (2019)","DOI":"10.1007\/978-3-030-25283-0_20"},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"77110","DOI":"10.1109\/ACCESS.2022.3191790","volume":"10","author":"TF Blauth","year":"2022","unstructured":"Blauth, T.F., Gstrein, O.J., Zwitter, A.: Artificial intelligence crime: an overview of malicious use and abuse of AI. IEEE Access 10, 77110\u201377122 (2022)","journal-title":"IEEE Access"},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"5371","DOI":"10.1109\/ACCESS.2020.3048319","volume":"9","author":"L Caviglione","year":"2021","unstructured":"Caviglione, L., et al.: Tight arms race: overview of current malware threats and trends in their detection. IEEE Access 9, 5371\u20135396 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2020.3048319","journal-title":"IEEE Access"},{"issue":"5","key":"26_CR9","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/MSEC.2022.3178205","volume":"20","author":"L Caviglione","year":"2022","unstructured":"Caviglione, L., Mazurczyk, W.: Never mind the malware, here\u2019s the stegomalware. IEEE Secur. Priva. 20(5), 101\u2013106 (2022). https:\/\/doi.org\/10.1109\/MSEC.2022.3178205","journal-title":"IEEE Secur. Priva."},{"key":"26_CR10","doi-asserted-by":"publisher","unstructured":"Fritsch, L., Jaber, A., Yazidi, A.: An overview of\u00a0artificial intelligence used in\u00a0malware. In: Zouganeli, E., Yazidi, A., Mello, G., Lind, P. (eds.) Nordic Artificial Intelligence Research and Development: 4th Symposium of the Norwegian AI Society, NAIS 2022, Oslo, 2022, Revised Selected Papers, pp. 41\u201351. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17030-0_4","DOI":"10.1007\/978-3-031-17030-0_4"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Gao, Y., Lu, Z., Luo, Y.: Survey on malware anti-analysis. In: Fifth International Conference on Intelligent Control and Information Processing, pp. 270\u2013275. IEEE (2014)","DOI":"10.1109\/ICICIP.2014.7010353"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Guembe, B., Azeta, A., Misra, S., Osamor, V.C., Fernandez-Sanz, L., Pospelova, V.: The emerging threat of AI-driven cyber attacks: a review. Appl. Artif. Int. 36(1) (2022)","DOI":"10.1080\/08839514.2022.2037254"},{"key":"26_CR13","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.infsof.2018.07.007","volume":"104","author":"S Hosseinzadeh","year":"2018","unstructured":"Hosseinzadeh, S., et al.: Diversification and obfuscation techniques for software security: a systematic literature review. Inf. Softw. Technol. 104, 72\u201393 (2018)","journal-title":"Inf. Softw. Technol."},{"issue":"1","key":"26_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3372823","volume":"53","author":"N Kaloudi","year":"2020","unstructured":"Kaloudi, N., Li, J.: The AI-based cyber threat landscape: a survey. ACM Comput. Surv. (CSUR) 53(1), 1\u201334 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"26_CR15","unstructured":"Kaspersky: Shadowy innovation: how cybercriminals experiment with AI on the dark web (2024). https:\/\/dfi.kaspersky.com\/blog\/ai-in-darknet"},{"key":"26_CR16","first-page":"1","volume":"1","author":"D Kirat","year":"2018","unstructured":"Kirat, D., Jang, J., Stoecklin, M.: Deeplocker-concealing targeted attacks with AI locksmithing. Blackhat USA 1, 1\u201329 (2018)","journal-title":"Blackhat USA"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Malware, B.: Obfuscation: the hidden malware. IEEE Secur. Priv. 9(5) 41\u201347 (2011)","DOI":"10.1109\/MSP.2011.98"},{"key":"26_CR18","unstructured":"Marpaung, J.A., Sain, M., Lee, H.J.: Survey on malware evasion techniques: state of the art and challenges. In: 14th International Conference on Advanced Communication Technology, pp. 744\u2013749 (2012)"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Mirsky, Y., et\u00a0al.: The threat of offensive AI to organizations. Comput. Secur. 124, 103,006 (2023)","DOI":"10.1016\/j.cose.2022.103006"},{"issue":"5","key":"26_CR20","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2011.98","volume":"9","author":"P O\u2019Kane","year":"2011","unstructured":"O\u2019Kane, P., Sezer, S., McLaughlin, K.: Obfuscation: the hidden malware. IEEE Secur. Priv. 9(5), 41\u201347 (2011)","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"26_CR21","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s42979-021-00557-0","volume":"2","author":"IH Sarker","year":"2021","unstructured":"Sarker, I.H., Furhad, M.H., Nowrozy, R.: AI-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Comput. Sci. 2(3), 173 (2021)","journal-title":"SN Comput. Sci."},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Schrittwieser, S., et\u00a0al.: Covert computation: hiding code in code for obfuscation purposes. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 529\u2013534 (2013)","DOI":"10.1145\/2484313.2484384"},{"key":"26_CR23","unstructured":"Sharif, M.I., Lanzi, A., Giffin, J.T., Lee, W.: Impeding malware analysis using conditional code obfuscation. In: NDSS (2008)"},{"key":"26_CR24","volume-title":"Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software","author":"M Sikorski","year":"2012","unstructured":"Sikorski, M., Honig, A.: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, 1st edn. No Starch Press, USA (2012)","edition":"1"},{"key":"26_CR25","unstructured":"Sims, J.: BlackMamba: lsing AI to generate polymorphic malware. HYAS (2023). https:\/\/www.hyas.com\/blog\/blackmamba-using-ai-to-generate-polymorphic-malware"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Thanh, C.T., Zelinka, I.: A survey on artificial intelligence in malware as next-generation threats. MENDEL 25(2), 27\u201334 (2019)","DOI":"10.13164\/mendel.2019.2.027"},{"issue":"4","key":"26_CR27","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1007\/s13347-021-00477-0","volume":"34","author":"WJ Von Eschenbach","year":"2021","unstructured":"Von Eschenbach, W.J.: Transparency and the black box problem: why we do not trust AI. Philos. Technol. 34(4), 1607\u20131622 (2021)","journal-title":"Philos. Technol."},{"issue":"5","key":"26_CR28","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MSP.2008.126","volume":"6","author":"W Yan","year":"2008","unstructured":"Yan, W., Zhang, Z., Ansari, N.: Revealing packed malware. IEEE Secur. Priv. 6(5), 65\u201369 (2008)","journal-title":"IEEE Secur. Priv."},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 297\u2013300. IEEE (2010)","DOI":"10.1109\/BWCCA.2010.85"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87772-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:38:13Z","timestamp":1751567893000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87772-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877711","9783031877728"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87772-8_26","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}