{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:42:52Z","timestamp":1765960972472},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319598697"},{"type":"electronic","value":"9783319598703"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59870-3_9","type":"book-chapter","created":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:14:17Z","timestamp":1496096057000},"page":"153-172","source":"Crossref","is-referenced-by-count":6,"title":["PriMal: Cloud-Based Privacy-Preserving Malware Detection"],"prefix":"10.1007","author":[{"given":"Hao","family":"Sun","sequence":"first","affiliation":[]},{"given":"Jinshu","family":"Su","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Rongmao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yujing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qiaolin","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"9_CR1","unstructured":"Internet security threat report. https:\/\/www.symantec.com\/about\/newsroom"},{"key":"9_CR2","unstructured":"Radioshack sells customer data after settling with states. http:\/\/www.bloomberg.com\/news\/articles\/2015-05-20\/radioshack-receives-approval-to-sell-name-to-standard-general"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Asharov, G., Lindell, Y., Schneider, T., Zohner, M.: More efficient oblivious transfer and extensions for faster secure computation. In: Proceedings of CCS, Berlin, Germany, pp. 535\u2013548. ACM (2013)","DOI":"10.1145\/2508859.2516738"},{"key":"9_CR4","unstructured":"Cha, S.K., Moraru, I., Jang, J., Truelove, J., Brumley, D., Andersen, D.G.: Splitscreen: enabling efficient, distributed malware detection. In: Proceedings of NSDI, pp. 12\u201325. USENIX Association (2010)"},{"key":"9_CR5","unstructured":"Choi, B., Chae, J., Jamshed, M., Park, K.: DFC: accelerating string pattern matching for network applications. In: Proceedings of NSDI, pp. 551\u2013565. USENIX Association (2016)"},{"key":"9_CR6","unstructured":"ClamAV. Clamavnet (2016). http:\/\/www.clamav.net"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Fan, B., Andersen, D.G., Kaminsky, M., Mitzenmacher, M.D.: Cuckoo filter: practically better than bloom. In: Proceedings of CoNEXT, pp. 75\u201387 (2014)","DOI":"10.1145\/2674005.2674994"},{"key":"9_CR8","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"The Foundations of Cryptography - vol. 2, Basic Applications","author":"O Goldreich","year":"2004","unstructured":"Goldreich, O.: The Foundations of Cryptography - vol. 2, Basic Applications, vol. 2. Cambridge University Press, New York (2004)"},{"issue":"5","key":"9_CR9","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1109\/TIFS.2013.2252341","volume":"8","author":"MH Haghighat","year":"2013","unstructured":"Haghighat, M.H., Tavakoli, M., Kharrazi, M.: Payload attribution via character dependent multi-bloom filters. IEEE Trans. Inf. Forensics Secur. 8(5), 705\u2013716 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Henecka, W., Schneider, T.: Faster secure two-party computation with less memory. In: Proceedings of AsiaCCS, pp. 437\u2013446. ACM (2013)","DOI":"10.1145\/2484313.2484369"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-45146-4_9","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145\u2013161. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-45146-4_9"},{"key":"9_CR12","unstructured":"Lan, C., Sherry, J., Popa, R.A., Ratnasamy, S., Liu, Z.: Embark: Securely outsourcing middleboxes to the cloud. In: Proceedings of NSDI, pp. 255\u2013273. USENIX (2016)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Melis, L., Asghar, H.J., Cristofaro, E.D., Kaafar, M.A.: Private processing of outsourced network functions: feasibility and constructions. In: Proceedings of SDN-NFV Security, pp. 39\u201344. ACM (2016)","DOI":"10.1145\/2876019.2876021"},{"key":"9_CR14","unstructured":"Oberheide, J., Cooke, E., Jahanian, F.: Cloudav: N-version antivirus in the network cloud. In: Proceedings of USENIX Security Symposium, Berkeley, CA, USA, pp. 91\u2013106. USENIX Association (2008)"},{"key":"9_CR15","unstructured":"Pinkas, B., Schneider, T., Segev, G., Zohner, M.: Phashing: private set intersection using permutation-based hashing. In: Proceedings of USENIX Security Symposium, pp. 515\u2013530 (2015)"},{"key":"9_CR16","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.ins.2011.08.020","volume":"231","author":"I Santos","year":"2013","unstructured":"Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf. Sci. 231, 64\u201382 (2013)","journal-title":"Inf. Sci."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Sherry, J., Lan, C., Popa, R.A., Ratnasamy, S.: Blindbox: deep packet inspection over encrypted traffic. In: Proceedings of SIGCOMM, pp. 213\u2013226. ACM (2015)","DOI":"10.1145\/2785956.2787502"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Stevens, M., Bursztein, E., Karpman, P., Albertini, A., Markov, Y.: The first collision for full sha-1. Technical report, Shattered, February 2017","DOI":"10.1007\/978-3-319-63688-7_19"},{"key":"9_CR19","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-319-28865-9_9","volume-title":"Security and Privacy in Communication Networks","author":"H Sun","year":"2015","unstructured":"Sun, H., Wang, X., Su, J., Chen, P.: RScam: cloud-based anti-malware via reversible sketch. In: Thuraisingham, B., Wang, X.F., Yegneswaran, V. (eds.) SecureComm 2015. LNICSSITE, vol. 164, pp. 157\u2013174. Springer, Cham (2015). doi: 10.1007\/978-3-319-28865-9_9"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-01001-9_7","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"X Wang","year":"2009","unstructured":"Wang, X., Yu, H., Wang, W., Zhang, H., Zhan, T.: Cryptanalysis on HMAC\/NMAC-MD5 and MD5-MAC. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 121\u2013133. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-01001-9_7"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Yuan, X., Wang, X., Lin, J., Wang, C.: Privacy-preserving deep packet inspection in outsourced middleboxes. In: Proceedings of INFOCOM, pp. 1\u20139. IEEE (2016)","DOI":"10.1109\/INFOCOM.2016.7524526"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59870-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T02:50:17Z","timestamp":1569379817000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59870-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598697","9783319598703"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59870-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}