{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:24:41Z","timestamp":1761812681697,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032081230","type":"print"},{"value":"9783032081247","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08124-7_21","type":"book-chapter","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:22:43Z","timestamp":1761812563000},"page":"367-387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Architecture-Independent Function Call Analysis for\u00a0IoT Malware"],"prefix":"10.1007","author":[{"given":"Kensei","family":"Ma","sequence":"first","affiliation":[]},{"given":"Chansu","family":"Han","sequence":"additional","affiliation":[]},{"given":"Akira","family":"Tanaka","sequence":"additional","affiliation":[]},{"given":"Takeshi","family":"Takahashi","sequence":"additional","affiliation":[]},{"given":"Jun\u2019ichi","family":"Takeuchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,31]]},"reference":[{"key":"21_CR1","unstructured":"Akabane, S., Han, C., Iwamoto, K., Isawa, R., Takahashi, T., Inoue, D., et al.: Identification of user-defined functions based on function call transition. In: Report of the Workshop on Multimedia Communications and Distributed Processing (DPS), vol. 2024, no. 24, pp. 1\u20138 (2024). (In Japanese)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Akabane, S., Okamoto, T.: Identification of toolchains used to build IoT malware with statically linked libraries. In: CSEC-93, pp.\u00a01\u20138 (2021). (In Japanese)","DOI":"10.1016\/j.procs.2021.09.291"},{"key":"21_CR3","doi-asserted-by":"publisher","unstructured":"Alasmary, H., et al.: Analyzing and detecting emerging internet of things malware: a graph-based approach. IEEE Internet Things J. 6(5), 8977\u20138988 (2019). https:\/\/doi.org\/10.1109\/JIOT.2019.2925929","DOI":"10.1109\/JIOT.2019.2925929"},{"key":"21_CR4","unstructured":"Bktero\u00a0-\u00a0: Potentially useful pieces of code. https:\/\/github.com\/Bktero\/DummyCodes. Accessed 13 May 2025"},{"key":"21_CR5","unstructured":"Bootlin\u00a0-\u00a0: Cross-compilation toolchains for Linux. https:\/\/toolchains.bootlin.com\/. Accessed 13 May 2025"},{"key":"21_CR6","doi-asserted-by":"publisher","unstructured":"Broder, A.: On the resemblance and containment of documents. In: Proceedings of the Compression and Complexity of SEQUENCES 1997 (Cat. No.97TB100171), pp. 21\u201329 (1997). https:\/\/doi.org\/10.1109\/SEQUEN.1997.666900","DOI":"10.1109\/SEQUEN.1997.666900"},{"key":"21_CR7","unstructured":"Buildroot\u00a0-\u00a0: Buildroot. https:\/\/buildroot.org\/. Accessed 13 May 2025"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Duan, Y., Li, X., Wang, J., Yin, H., et\u00a0al.: DeepBinDiff: learning program-wide code representations for binary diffing (2020)","DOI":"10.14722\/ndss.2020.24311"},{"key":"21_CR9","unstructured":"hammerzeit\u00a0-\u00a0: An archive of bashlite source code. https:\/\/github.com\/hammerzeit\/BASHLITE. Accessed 13 May 2025"},{"key":"21_CR10","doi-asserted-by":"publisher","unstructured":"Hassen, M., Chan, P.K.: Scalable function call graph-based malware classification. In: CODASPY 2017, pp. 239\u2013248. Association for Computing Machinery, New York (2017) https:\/\/doi.org\/10.1145\/3029806.3029824","DOI":"10.1145\/3029806.3029824"},{"key":"21_CR11","unstructured":"He, H., et al.: Code is not natural language: unlock the power of semantics-oriented graph representation for binary code similarity detection. In: 33rd USENIX Security Symposium (USENIX Security 2024), pp. 1759\u20131776. USENIX Association, Philadelphia (2024). https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/he-haojie"},{"key":"21_CR12","unstructured":"Hex-Rays\u00a0-\u00a0: Ida pro. https:\/\/hex-rays.com\/ida-pro\/. Accessed 13 May 2025"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Hex-Rays docs: Flirt. https:\/\/docs.hex-rays.com\/user-guide\/signatures\/flirt. Accessed 16 July 2025","DOI":"10.1215\/00265667-11858837"},{"key":"21_CR14","unstructured":"jgamblin\u00a0-\u00a0: Leaked mirai source code for research\/IOC development purposes. https:\/\/github.com\/jgamblin\/Mirai-Source-Code\/. Accessed 13 May 2025"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Kawasoe, R., Han, C., Isawa, R., Takahashi, T., Takeuchi, J.: Investigating behavioral differences between IoT malware via function call sequence graphs. In: SAC 2021: The 36th ACM\/SIGAPP Symposium on Applied Computing, Virtual Event, Republic of Korea, 22\u201326 March 2021, pp. 1674\u20131682. ACM (2021)","DOI":"10.1145\/3412841.3442041"},{"key":"21_CR16","unstructured":"KCreate\u00a0-\u00a0: Repository to dump information and small code snippets. https:\/\/github.com\/KCreate\/dump. Accessed 13 May 2025"},{"key":"21_CR17","unstructured":"lab313ru-\u00a0: dumpsym.exe source code. https:\/\/github.com\/lab313ru\/dumpsym_src. Accessed 13 May 2025"},{"key":"21_CR18","unstructured":"landley\u00a0-\u00a0: Aboriginal Linux. http:\/\/landley.net\/aboriginal\/downloads\/binaries\/. Accessed 13 May 2025"},{"key":"21_CR19","unstructured":"LFSMx\u00a0-\u00a0: Select pieces of work... https:\/\/github.com\/LFSMx\/MyCodeProfile. Accessed 13 May 2025"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Li, M., Chen, X., Li, X., Ma, B., Vitanyi, P.: The similarity metric (2004). https:\/\/arxiv.org\/abs\/cs\/0111054","DOI":"10.1109\/TIT.2004.838101"},{"key":"21_CR21","unstructured":"mahmednabil109\u00a0-\u00a0: code dump. https:\/\/github.com\/mahmednabil109\/dump. Accessed 13 May 2025"},{"key":"21_CR22","unstructured":"malicialab\u00a0-\u00a0: Avclass malware labeling tool. https:\/\/github.com\/malicialab\/avclass. Accessed 13 May 2025"},{"key":"21_CR23","unstructured":"Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: analysing the rise of IoT compromises. In: 9th USENIX Workshop on Offensive Technologies (WOOT 15). USENIX Association, Washington, D.C. (2015)"},{"key":"21_CR24","unstructured":"remedi\u00a0-\u00a0: Just random pieces of code. https:\/\/github.com\/remedi\/hackdump (Not Available)"},{"key":"21_CR25","unstructured":"shuakabane: cross-architecture static library detector for IoT malware. https:\/\/github.com\/shuakabane\/stelftools. Accessed 16 July 2025"},{"key":"21_CR26","unstructured":"SimonLight001\u00a0-\u00a0: Just dumping code from my laptop, don\u2019t expect much. https:\/\/github.com\/SimonLight001\/Code\/. Accessed 13 May 2025"},{"key":"21_CR27","unstructured":"Takada, S., Kawasoe, R., He, T., Han, C., Tanaka, A., Takeuchi, J.: Study on improvement of function estimation method of IoT malware using graph embedding. In: Proceedings of Computer Security Symposium 2021 (CSS2021), pp. 705\u2013712 (2021). (In Japanese)"},{"key":"21_CR28","unstructured":"uClibc\u00a0-\u00a0: uClibc. https:\/\/uclibc.org\/downloads\/binaries\/0.9.30.1\/. Accessed 13 May 2025"},{"key":"21_CR29","unstructured":"Yang, C., Liu, Z., Zhao, D., Sun, M., Chang, E.Y.: Network representation learning with rich text information. In: IJCAI, vol.\u00a02015, pp. 2111\u20132117 (2015)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08124-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:22:51Z","timestamp":1761812571000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08124-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,31]]},"ISBN":["9783032081230","9783032081247"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08124-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,31]]},"assertion":[{"value":"31 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc25.skku.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}