{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:21:18Z","timestamp":1725877278708},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319519654"},{"type":"electronic","value":"9783319519661"}],"license":[{"start":{"date-parts":[[2016,12,29]],"date-time":"2016-12-29T00:00:00Z","timestamp":1482969600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-51966-1_18","type":"book-chapter","created":{"date-parts":[[2016,12,28]],"date-time":"2016-12-28T11:11:08Z","timestamp":1482923468000},"page":"273-281","source":"Crossref","is-referenced-by-count":1,"title":["Semantically Non-preserving Transformations for Antivirus Evaluation"],"prefix":"10.1007","author":[{"given":"Erkan","family":"Ersan","sequence":"first","affiliation":[]},{"given":"Lior","family":"Malka","sequence":"additional","affiliation":[]},{"given":"Bruce M.","family":"Kapron","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,29]]},"reference":[{"key":"18_CR1","unstructured":"jsoup: Java HTML parser. http:\/\/jsoup.org\/apidocs\/"},{"key":"18_CR2","unstructured":"Rhino. http:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Projects\/Rhino"},{"key":"18_CR3","unstructured":"Abrams, R., Ghimiri, D., Smith, J.: Corporate AV\/EPP comparative analysis - exploit evasion defenses. Technical report, NSS Labs (2013)"},{"key":"18_CR4","unstructured":"CERT UK. An introduction to malware (2014). www.cert.gov.uk\/resources\/best-practices\/an-introduction-to-malware\/"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S.: Testing malware detectors. In: Avrunin, G.S., Rothermel, G. (eds.) ISSTA 2004, ACM (2004)","DOI":"10.1145\/1007512.1007518"},{"key":"18_CR6","unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical report 148, University of Auckland, New Zealand, July 1997"},{"issue":"1","key":"18_CR7","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s11416-006-0026-9","volume":"3","author":"E Filiol","year":"2007","unstructured":"Filiol, E., Jacob, G., Liard, M.: Evaluation methodology and theoretical model for antiviral behavioural detection strategies. J. Comput. Virol. 3(1), 23\u201337 (2007)","journal-title":"J. Comput. Virol."},{"key":"18_CR8","unstructured":"Granville, K.: 9 Recent Cyberattacks Against Big Business. New York Times, 5 February 2015"},{"key":"18_CR9","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1016\/j.cose.2012.09.009","volume":"32","author":"M Kandias","year":"2013","unstructured":"Kandias, M., Gritzalis, D.: Metasploit the penetration tester\u2019s guide. Comput. Secur. 32, 268\u2013269 (2013)","journal-title":"Comput. Secur."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Kwon, J., Lee, H.: Bingraph: discovering mutant malware using hierarchical semantic signatures. In: MALWARE 2012, pp. 104\u2013111. IEEE Computer Society (2012)","DOI":"10.1109\/MALWARE.2012.6461015"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Maggi, F., Valdi, A., Zanero, S.: Andrototal: a flexible, scalable toolbox and service for testing mobile malware detectors. In: Enck, W., Felt, A.P., Asokan, N. (eds.) SPSM@CCS 2013, pp. 49\u201354. ACM (2013)","DOI":"10.1145\/2516760.2516768"},{"issue":"5","key":"18_CR12","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/1387673.1387674","volume":"30","author":"MD Preda","year":"2008","unstructured":"Preda, M.D., Christodorescu, M., Jha, S., Debray, S.K.: A semantics-based approach to malware detection. ACM Trans. Program. Lang. Syst. 30(5), 25 (2008)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Jiang, X.: Droidchameleon: evaluating android anti-malware against transformation attacks. In: Chen, K., Xie, Q., Qiu, W., Li, N., Tzeng, W.-G. (eds.) ASIACCS 2013, pp. 329\u2013334. ACM (2013)","DOI":"10.1145\/2484313.2484355"},{"issue":"1","key":"18_CR14","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/TIFS.2013.2290431","volume":"9","author":"V Rastogi","year":"2014","unstructured":"Rastogi, V., Chen, Y., Jiang, X.: Catch me if you can: evaluating android anti-malware against transformation attacks. IEEE Trans. Inf. Forensics Secur. 9(1), 99\u2013108 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR15","unstructured":"Xu, W., Zhang, F., Zhu, S.: In: MALWARE 2012, pp. 9\u201316. IEEE Computer Society (2012)"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-37300-8_5","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M Zheng","year":"2013","unstructured":"Zheng, M., Lee, P.P.C., Lui, J.C.S.: ADAM: an automatic and extensible platform to stress test android anti-virus systems. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 82\u2013101. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-37300-8_5"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-51966-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T06:55:34Z","timestamp":1498373734000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-51966-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,29]]},"ISBN":["9783319519654","9783319519661"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-51966-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016,12,29]]}}}