{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:21:26Z","timestamp":1740097286035,"version":"3.37.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319457185"},{"type":"electronic","value":"9783319457192"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45719-2_15","type":"book-chapter","created":{"date-parts":[[2016,9,5]],"date-time":"2016-09-05T22:11:24Z","timestamp":1473113484000},"page":"325-345","source":"Crossref","is-referenced-by-count":19,"title":["A Look into 30 Years of Malware Development from a Software Metrics Perspective"],"prefix":"10.1007","author":[{"given":"Alejandro","family":"Calleja","sequence":"first","affiliation":[]},{"given":"Juan","family":"Tapiador","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Caballero","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,7]]},"reference":[{"key":"15_CR1","unstructured":"CLOC - count lines of code. http:\/\/github.com\/AlDanial\/cloc . Accessed 22 Sep 2015"},{"key":"15_CR2","unstructured":"Eclipse metrics plugin. https:\/\/marketplace.eclipse.org\/content\/eclipse-metrics . Accessed 4 Apr 2016"},{"key":"15_CR3","unstructured":"Jhawk. http:\/\/www.virtualmachinery.com\/jhawkprod.htm . Accessed 4 Apr 2016"},{"key":"15_CR4","unstructured":"Radon. https:\/\/pypi.python.org\/pypi\/radon . Accessed 4 Apr 2016"},{"key":"15_CR5","unstructured":"Symantec\u2019s 2015 internet security threat report. https:\/\/www.symantec.com\/security_response\/publications\/threatreport.jsp . Accessed 6 Apr 2016"},{"key":"15_CR6","unstructured":"Unified code counter. http:\/\/csse.usc.edu\/ucc_wp\/ . Accessed 4 Apr 2016"},{"key":"15_CR7","unstructured":"Albrecht, A.J.: Measuring Application Development Productivity. In: IBM Application Development Symposium, pp. 83\u201392. IBM Press, October 1979"},{"issue":"6","key":"15_CR8","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1109\/TSE.1983.235271","volume":"9","author":"AJ Albrecht","year":"1983","unstructured":"Albrecht, A.J., Gaffney, J.E.: Software function, source lines of code, and development effort prediction: a software science validation. IEEE Trans. Softw. Eng. 9(6), 639\u2013648 (1983)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR9","unstructured":"Allodi, L., Kotov, V., Massacci, F.: MalwareLab: experimentation with cybercrime attack tools. In: USENIX Workshop on Cyber Security Experimentation and Test, Washington D.C., August 2013"},{"issue":"1","key":"15_CR10","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MSECP.2003.1177002","volume":"1","author":"I Arce","year":"2003","unstructured":"Arce, I., Levy, E.: An analysis of the slapper worm. IEEE Secur. Priv. 1(1), 82\u201387 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"15_CR11","series-title":"Advances in Information Security","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/978-0-387-44599-1_8","volume-title":"Malware Detection","author":"P Barford","year":"2007","unstructured":"Barford, P., Yegneswaran, V.: An Inside Look at Botnets. In: Christodorescu, M., Jha, S., Maughan, D., Song, D., Wang, C. (eds.) Malware Detection. Advances in Information Security, vol. 27, pp. 171\u2013191. Springer, Heidelberg (2007)"},{"key":"15_CR12","volume-title":"Software Engineering Economics","author":"BW Boehm","year":"1981","unstructured":"Boehm, B.W.: Software Engineering Economics. Prentice-Hall, Upper Saddle River (1981)"},{"key":"15_CR13","unstructured":"Caballero, J., Grier, C., Kreibich, C., Paxson, V.: Measuring pay-per-install: the commoditization of malware distribution. In: Proceedings of the 20th USENIX Conference on Security, p. 13, SEC 2011. USENIX Association, Berkeley (2011)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Caballero, J., Poosankam, P., McCamant, S., Babic, D., Song, D.: Input generation via decomposition and re-stitching: finding bugs in malware. In: ACM Conference on Computer and Communications Security, Chicago, IL, October 2010","DOI":"10.1145\/1866307.1866354"},{"key":"15_CR15","unstructured":"Caliskan-Islam, A., Harang, R., Liu, A., Narayanan, A., Voss, C., Yamaguchi, F., Greenstadt, R.: De-anonymizing programmers via code stylometry. In: USENIX Security Symposium (2015)"},{"key":"15_CR16","series-title":"Graduate Texts in Mathematics","volume-title":"Graph Theory","author":"R Diestel","year":"2012","unstructured":"Diestel, R.: Graph Theory. Graduate Texts in Mathematics, vol. 173, 4th edn. Springer, New York (2012)","edition":"4"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Eshete, B., Alhuzali, A., Monshizadeh, M., Porras, P., Venkatakrishnan, V., Yegneswaran, V.: EKHunter: a counter-offensive toolkit for exploit kit infiltration. In: Network and Distributed System Security Symposium, February 2015","DOI":"10.14722\/ndss.2015.23237"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Eshete, B., Venkatakrishnan, V.N.: WebWinnow: leveraging exploit kit workflows to detect malicious urls. In: ACM Conference on Data and Application Security and Privacy (2014)","DOI":"10.1145\/2557547.2557575"},{"issue":"3","key":"15_CR19","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/j.jss.2007.03.004","volume":"81","author":"G Frantzeskou","year":"2008","unstructured":"Frantzeskou, G., MacDonell, S., Stamatatos, E., Gritzalis, S.: Examining the significance of high-level programming features in source code author classification. J. Syst. Softw. 81(3), 447\u2013460 (2008). http:\/\/dx.doi.org\/10.1016\/j.jss.2007.03.004","journal-title":"J. Syst. Softw."},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Grier, C., Ballard, L., Caballero, J., Chachra, N., Dietrich, C.J., Levchenko, K., Mavrommatis, P., McCoy, D., Nappa, A., Pitsillidis, A., Provos, N., Rafique, M.Z., Rajab, M.A., Rossow, C., Thomas, K., Paxson, V., Savage, S., Voelker, G.M.: Manufacturing compromise: the emergence of exploit-as-a-service. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 821\u2013832, CCS 2012. ACM, New York (2012)","DOI":"10.1145\/2382196.2382283"},{"key":"15_CR21","volume-title":"Elements of Software Science (Operating and Programming Systems Series)","author":"MH Halstead","year":"1977","unstructured":"Halstead, M.H.: Elements of Software Science (Operating and Programming Systems Series). Elsevier Science Inc., New York (1977)"},{"issue":"3","key":"15_CR22","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MSP.2005.58","volume":"3","author":"T Holz","year":"2005","unstructured":"Holz, T.: A short visit to the bot zoo. IEEE Secur. Priv. 3(3), 76\u201379 (2005)","journal-title":"IEEE Secur. Priv."},{"key":"15_CR23","unstructured":"IEEE: IEEE standard for software productivity metrics (IEEE std. 1045\u20131992). Technical report (1992)"},{"key":"15_CR24","volume-title":"Programming Languages Table, Version 8.2","author":"C Jones","year":"1996","unstructured":"Jones, C.: Programming Languages Table, Version 8.2. Software Productivity Research, Burlington (1996)"},{"issue":"11","key":"15_CR25","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/2.471193","volume":"28","author":"C Jones","year":"1995","unstructured":"Jones, C.: Backfiring: converting lines-of-code to function points. Computer 28(11), 87\u201388 (1995)","journal-title":"Computer"},{"key":"15_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-642-36563-8_13","volume-title":"Engineering Secure Software and Systems","author":"V Kotov","year":"2013","unstructured":"Kotov, V., Massacci, F.: Anatomy of exploit kits. In: J\u00fcrjens, J., Livshits, B., Scandariato, R. (eds.) ESSoS 2013. LNCS, vol. 7781, pp. 181\u2013196. Springer, Heidelberg (2013)"},{"key":"15_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/BFb0017737","volume-title":"Software Process Technology","author":"MM Lehman","year":"1996","unstructured":"Lehman, M.M.: Laws of software evolution revisited. In: Montangero, C. (ed.) EWSPT 1996. LNCS, vol. 1149, pp. 108\u2013124. Springer, Heidelberg (1996)"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"McCabe, T.J.: A complexity measure. In: Proceedings of the 2nd International Conference on Software Engineering, ICSE 1976, CA, USA, p. 407. IEEE Computer Society Press, Los Alamitos (1976)","DOI":"10.1109\/TSE.1976.233837"},{"key":"15_CR29","unstructured":"Nguyen, V., Deeds-rubin, S., Tan, T., Boehm, B.: A SLOC counting standard. In: COCOMO II Forum 2007 (2007)"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Oman, P., Hagemeister, J.: Metrics for assessing a software system\u2019s maintainability. In: Proceedings of Conference on Software Maintenance, pp. 337\u2013344 (1992)","DOI":"10.1109\/ICSM.1992.242525"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Park, R.E.: Software size measurement: a framework for counting source statements. Technical report CMU\/SEI-92-TR- 20, ESC-TR-92-20, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania 15213, September 1992","DOI":"10.21236\/ADA258304"},{"key":"15_CR32","unstructured":"Security, P.: 27\u00a0% of all recorded malware appeared in 2015. http:\/\/www.pandasecurity.com\/mediacenter\/press-releases\/all-recorded-malware-appeared-in-2015 . Accessed 6 Apr 2016"},{"key":"15_CR33","unstructured":"Software Engineering Institute: C4 Software Technology Reference Guide - A Prototype. Technical report CMU\/SEI-97-HB-001, January 1997"},{"key":"15_CR34","volume-title":"Software Engineering: (Update) (8th Edn.) (International Computer Science)","author":"I Sommerville","year":"2006","unstructured":"Sommerville, I.: Software Engineering: (Update) (8th Edn.) (International Computer Science). Addison-Wesley Longman Publishing Co. Inc., Boston (2006)"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Hohlfeld, O., Kruegel, C., Vigna, G.: The harvester, the botmaster, and the spammer: n the relations between the different actors in the spam landscape. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 353\u2013364. ASIA CCS 2014, NY, USA. ACM, New York (2014)","DOI":"10.1145\/2590296.2590302"},{"issue":"2","key":"15_CR36","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1109\/SURV.2013.101613.00077","volume":"16","author":"G Suarez-Tangil","year":"2014","unstructured":"Suarez-Tangil, G., Tapiador, J.E., Peris-Lopez, P., Ribagorda, A.: Evolution, detection and analysis of malware for smart devices. IEEE Commun. Surv. Tutorials 16(2), 961\u2013987 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"15_CR37","unstructured":"Thomas, K., Huang, D., Wang, D., Bursztein, E., Grier, C., Holt, T.J., Kruegel, C., McCoy, D., Savage, S., Vigna, G.: Framing dependencies introduced by underground commoditization. In: Workshop on the Economics of Information Security (2015)"},{"key":"15_CR38","unstructured":"Watson, A.H., Mccabe, T.J., Wallace, D.R.: Special publication 500\u2013235, structured testing: a software testing methodology using the cyclomatic complexity metric. In: U.S. Department of Commerce\/National Institute of Standards and Technology (1996)"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45719-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T02:25:25Z","timestamp":1568341525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45719-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319457185","9783319457192"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45719-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}