{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T00:12:35Z","timestamp":1772583155427,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319060880","type":"print"},{"value":"9783319060897","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06089-7_20","type":"book-chapter","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T01:55:10Z","timestamp":1396317310000},"page":"280-299","source":"Crossref","is-referenced-by-count":7,"title":["A Categorical Treatment of Malicious Behavioral Obfuscation"],"prefix":"10.1007","author":[{"given":"Romain","family":"P\u00e9choux","sequence":"first","affiliation":[]},{"given":"Thanh Dinh","family":"Ta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Gen: Variant.Barys.159 (2013), http:\/\/goo.gl\/YDC1o"},{"key":"20_CR2","unstructured":"Trace Transformation Tool (2013), http:\/\/goo.gl\/rqCSQ"},{"key":"20_CR3","unstructured":"Trojan-Dropper.Win32.Dorgam.un (2013), http:\/\/goo.gl\/3e1AR"},{"key":"20_CR4","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198568612.001.0001","volume-title":"Category Theory (Oxford Logic Guides)","author":"S. Awodey","year":"2006","unstructured":"Awodey, S.: Category Theory (Oxford Logic Guides), vol.\u00a049. Oxford University Press, USA (2006)"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-642-16612-9_14","volume-title":"Runtime Verification","author":"P. Beaucamps","year":"2010","unstructured":"Beaucamps, P., Gnaedig, I., Marion, J.-Y.: Behavior Abstraction in Malware Analysis. In: Barringer, H., et al. (eds.) RV 2010. LNCS, vol.\u00a06418, pp. 168\u2013182. Springer, Heidelberg (2010)"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S.A., Song, D.X., Bryant, R.E.: Semantics-aware malware detection. In: Symposium on Security and Privacy, pp. 32\u201346. IEEE Computer Society (2005)","DOI":"10.1109\/SP.2005.20"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Kruegel, C., Jha, S.: Mining Specifications of Malicious Behavior. In: ISEC, pp. 5\u201314. ACM (2008)","DOI":"10.1145\/1342211.1342215"},{"key":"20_CR8","unstructured":"Collberg, C., Nagra, J.: Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison-Wesley Professional (2009)"},{"key":"20_CR9","unstructured":"Erwig, M.: FGL\/Haskell - A Functional Graph Library for Haskell (2008), http:\/\/web.engr.oregonstate.edu\/~erwig\/fgl\/haskell\/"},{"issue":"2","key":"20_CR10","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s11416-007-0044-2","volume":"3","author":"E. Filiol","year":"2007","unstructured":"Filiol, E.: Formalisation and implementation aspects of k -ary (malicious) codes. Journal in Computer Virology\u00a03(2), 75\u201386 (2007)","journal-title":"Journal in Computer Virology"},{"key":"20_CR11","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for Unix Processes. In: Symposium on Security and Privacy, pp. 120\u2013128. IEEE (1996)"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Christodorescu, M., Sailer, R., Yan, X.: Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. In: Symposium on Security and Privacy, pp. 45\u201360. IEEE (2010)","DOI":"10.1109\/SP.2010.11"},{"key":"20_CR13","unstructured":"Intel. Pin - A Dynamic Binary Instrumentation Tool (2013), http:\/\/software.intel.com\/en-us\/articles\/pintool"},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/0001-8708(91)90003-P","volume":"88","author":"A. Joyal","year":"1991","unstructured":"Joyal, A., Street, R.: The Geometry of Tensor Calculus, I. Advances in Mathematics\u00a088, 55\u2013112 (1991)","journal-title":"Advances in Mathematics"},{"key":"20_CR15","unstructured":"Kolbitsch, C., Milani Comparetti, P., Kruegel, C., Kirda, E., Zhou, X., Wang, X.: Effective and Efficient Malware Detection at the End Host. In: USENIX Security, pp. 351\u2013366 (2009)"},{"issue":"1-2","key":"20_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-011-0157-5","volume":"8","author":"W. Ma","year":"2012","unstructured":"Ma, W., Duan, P., Liu, S., Gu, G., Liu, J.-C.: Shadow attacks: automatically evading system-call-behavior based malware detection. Journal in Computer Virology\u00a08(1-2), 1\u201313 (2012)","journal-title":"Journal in Computer Virology"},{"issue":"2","key":"20_CR17","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/0890-5401(90)90013-8","volume":"88","author":"J. Meseguer","year":"1990","unstructured":"Meseguer, J., Montanari, U.: Petri Nets are Monoids. Information and Computation\u00a088(2), 105\u2013155 (1990)","journal-title":"Information and Computation"},{"key":"20_CR18","unstructured":"Milner, R.: Action Structures. Technical report (1992), http:\/\/www.lfcs.inf.ed.ac.uk\/reports\/92\/ECS-LFCS-92-249\/"},{"key":"20_CR19","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/978-3-642-29166-1_42","volume-title":"Information Systems, Technology and Management","author":"M. Dalla Preda","year":"2012","unstructured":"Dalla Preda, M.: The grand challenge in metamorphic analysis. In: Dua, S., Gangopadhyay, A., Thulasiraman, P., Straccia, U., Shepherd, M., Stein, B. (eds.) ICISTM 2012. CCIS, vol.\u00a0285, pp. 439\u2013444. Springer, Heidelberg (2012)"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Dalla Preda, M., Christodorescu, M., Jha, S., Debray, S.K.: A semantics-based approach to malware detection. In: POPL, pp. 377\u2013388. ACM (2007)","DOI":"10.1145\/1190215.1190270"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Ramilli, M., Bishop, M.: Multi-Stage Delivery of Malware. In: MALWARE, pp. 91\u201397 (2010)","DOI":"10.1109\/MALWARE.2010.5665788"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Selinger, P.: A survey of graphical languages for monoidal categories. In: New Structures for Physics, pp. 289\u2013355. Springer (2011)","DOI":"10.1007\/978-3-642-12821-9_4"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Wagner, D., Soto, P.: Mimicry attacks on host-based intrusion detection systems. In: Conference on Computer and Communications Security, pp. 255\u2013264. ACM (2002)","DOI":"10.1145\/586110.586145"}],"container-title":["Lecture Notes in Computer Science","Theory and Applications of Models of Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06089-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T02:18:24Z","timestamp":1597630704000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06089-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319060880","9783319060897"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06089-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}