{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:38:48Z","timestamp":1725878328380},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319519623"},{"type":"electronic","value":"9783319519630"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-51963-0_37","type":"book-chapter","created":{"date-parts":[[2017,1,10]],"date-time":"2017-01-10T01:17:39Z","timestamp":1484011059000},"page":"473-484","source":"Crossref","is-referenced-by-count":0,"title":["Characterising Malicious Software with\u00a0High-Level Behavioural Patterns"],"prefix":"10.1007","author":[{"given":"Jana","family":"\u0160t\u2019astn\u00e1","sequence":"first","affiliation":[]},{"given":"Martin","family":"Tom\u00e1\u0161ek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,11]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Alam, S., Horspool, R., Traore, I.: MARD: A framework for metamorphic malware analysis and real-time detection. In: IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), pp. 480\u2013489 (2014)","DOI":"10.1109\/AINA.2014.59"},{"key":"37_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-540-74320-0_10","volume-title":"Recent Advances in Intrusion Detection","author":"M Bailey","year":"2007","unstructured":"Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 178\u2013197. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74320-0_10"},{"key":"37_CR3","unstructured":"Bayer, U., Habibi, I., Balzarotti, D., Kirda, E., Kruegel, C.: A view on current malware behaviors. In: Proceedings of the 2Nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET\u201909, p. 8. USENIX Association, Berkeley (2009)"},{"key":"37_CR4","unstructured":"Cymru: totalhash (2016). https:\/\/totalhash.cymru.com\/"},{"key":"37_CR5","unstructured":"Ding, Y., Yuan, X., Tang, K., Xiao, X., Zhang, Y.: A fast malware detection algorithm based on objective-oriented association mining. Comput. Secur. 39, 315\u2013324 (2013). Part B(0)"},{"issue":"2","key":"37_CR6","first-page":"6:1","volume":"44","author":"M Egele","year":"2008","unstructured":"Egele, M., Scholte, T., Kirda, E., Kruegel, C.: A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44(2), 6:1\u20136:42 (2008)","journal-title":"ACM Comput. Surv."},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Gregio, A., Bonacin, R., Nabuco, O., Monte Afonso, V., Licio De Geus, P., Jino, M.: Ontology for malware behavior: A core model proposal. In: IEEE 23rd International WETICE Conference (WETICE) 2014, pp. 453\u2013458, June 2014","DOI":"10.1109\/WETICE.2014.72"},{"issue":"5\u20136","key":"37_CR8","doi-asserted-by":"crossref","first-page":"1140","DOI":"10.1016\/j.mcm.2013.03.008","volume":"58","author":"H Lu","year":"2013","unstructured":"Lu, H., Wang, X., Zhao, B., Wang, F., Su, J.: Endmal: an anti-obfuscation and collaborative malware detection system using syscall sequences. Math. Comput. Model. 58(5\u20136), 1140\u20131154 (2013)","journal-title":"Math. Comput. Model."},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Mohd Shaid, S., Maarof, M.: Malware behavior image for malware variant identification. In: International Symposium on Biometrics and Security Technologies (ISBAST) 2014, pp. 238\u2013243 (2014)","DOI":"10.1109\/ISBAST.2014.7013128"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: IEEE Symposium on Security and Privacy 2007, pp. 231\u2013245 (2007)","DOI":"10.1109\/SP.2007.17"},{"key":"37_CR11","unstructured":"Obrst, L., Chase, P., Markeloff, R.: Developing an ontology of the cyber security domain. In: Semantic Technologies for Intelligence, Defense, and Security (STIDS), CEUR Workshop Proceedings, vol. 96, pp. 49\u201356 (2012)"},{"key":"37_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-70542-0_6","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"K Rieck","year":"2008","unstructured":"Rieck, K., Holz, T., Willems, C., D\u00fcssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 108\u2013125. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-70542-0_6"},{"issue":"2","key":"37_CR13","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/s10009-013-0290-1","volume":"16","author":"F Song","year":"2014","unstructured":"Song, F., Touili, T.: Pushdown model checking for malware detection. STTT 16(2), 147\u2013173 (2014)","journal-title":"STTT"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Stastna, J., Tomasek, M.: Exploring malware behaviour for improvement of malware signatures. In: IEEE 13th International Scientific Conference on Informatics 2015, pp. 275\u2013280 (2015)","DOI":"10.1109\/Informatics.2015.7377846"},{"issue":"4","key":"37_CR15","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/s11416-007-0074-9","volume":"4","author":"G Wagener","year":"2008","unstructured":"Wagener, G., State, R., Dulaunoy, A.: Malware behaviour analysis. J. Comput. Virol. 4(4), 279\u2013287 (2008)","journal-title":"J. Comput. Virol."},{"key":"37_CR16","unstructured":"Wu, L., Ping, R., Ke, L., Hai-xin, D.: Behavior-based malware analysis and detection. In: First International Workshop on Complexity and Data Mining (IWCDM) 2011, pp. 39\u201342. IEEE (2011)"},{"issue":"6\u20137","key":"37_CR17","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.cose.2011.05.007","volume":"30","author":"D Yuxin","year":"2011","unstructured":"Yuxin, D., Xuebing, Y., Di, Z., Li, D., Zhanchao, A.: Feature representation and selection in malicious code detection methods based on static system calls. Comput. Secur. 30(6\u20137), 514\u2013524 (2011)","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","SOFSEM 2017: Theory and Practice of Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-51963-0_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T03:46:26Z","timestamp":1498362386000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-51963-0_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319519623","9783319519630"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-51963-0_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}