{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:12:09Z","timestamp":1750997529448,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319694559"},{"type":"electronic","value":"9783319694566"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69456-6_8","type":"book-chapter","created":{"date-parts":[[2017,10,18]],"date-time":"2017-10-18T14:04:34Z","timestamp":1508335474000},"page":"92-105","source":"Crossref","is-referenced-by-count":0,"title":["Packer Identification Using Hidden Markov\u00a0Model"],"prefix":"10.1007","author":[{"given":"Nguyen Minh","family":"Hai","sequence":"first","affiliation":[]},{"given":"Quan Thanh","family":"Tho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,19]]},"reference":[{"key":"8_CR1","unstructured":"McAfee: The good, the bad, and the unknown. http:\/\/www.techdata.com\/mcafee\/files\/MCAFEE_wp_appcontrol-good-bad-unknown.pdf . Accessed 21 May 2017"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Santos, I., Ugarte-Pedrero, X., Sanz, B., Laorden, C., Bringas, P.G.: Collective classification for packed executable identification. In: Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, Australia, pp. 23\u201330 (2011)","DOI":"10.1145\/2030376.2030379"},{"key":"8_CR3","first-page":"32","volume":"3","author":"MMK Al-Anezi","year":"2016","unstructured":"Al-Anezi, M.M.K.: Generic packing detection using several complexity analysis for accurate malware detection int. J. Adv. Comput. Sci. 3, 32\u201339 (2016)","journal-title":"J. Adv. Comput. Sci."},{"key":"8_CR4","first-page":"22","volume":"5","author":"EO Osaghae","year":"2016","unstructured":"Osaghae, E.O.: Classifying packed programs as malicious software detected. Int. J. Inf. Technol. Electr. Eng. 5, 22\u201325 (2016)","journal-title":"Int. J. Inf. Technol. Electr. Eng."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Nguyen, M.H., Nguyen, T.B., Quan, T.T., Ogawa, M.: A hybrid approach for control flow graph construction from binary code. In: IEEE APSEC, pp. 159\u2013164 (2013)","DOI":"10.1109\/APSEC.2013.132"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-319-30303-1_14","volume-title":"Foundations and Practice of Security","author":"NM Hai","year":"2016","unstructured":"Hai, N.M., Ogawa, M., Tho, Q.T.: Obfuscation code localization based on CFG generation of malware. In: Garcia-Alfaro, J., Kranakis, E., Bonfante, G. (eds.) FPS 2015. LNCS, vol. 9482, pp. 229\u2013247. Springer, Cham (2016). doi: 10.1007\/978-3-319-30303-1_14"},{"key":"8_CR7","unstructured":"Morgenstern, M., Marx, A.: Runtime packer testing experiences. In: CARO. LNCS, vol. 6174, pp. 288\u2013305 (2008)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Kang, M.G., Poosankam, P., Yin, H.: Renovo: a hidden code extractor for packed executables. In: ACM WORM, pp. 46\u201353 (2007)","DOI":"10.1145\/1314389.1314399"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Bonfante, G., Fernez, J., Marion, J.-Y., Rouxel, B., Sabatier, F., Thierry, A.: CoDisasm: medium scale concatic disassembly of self-modifying binaries with overlapping instructions. In: ACM SIGSAC CCS, pp. 46\u201353 (2015)","DOI":"10.1145\/2810103.2813627"},{"key":"8_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2522968.2522972","volume":"46","author":"KA Roundy","year":"2013","unstructured":"Roundy, K.A., Miller, B.P.: Binary-code obfuscations in prevalent packer tools. ACM Comput. Surv. 46, 1\u201332 (2013)","journal-title":"ACM Comput. Surv."},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-89862-7_1","volume-title":"Information Systems Security","author":"D Song","year":"2008","unstructured":"Song, D., et al.: BitBlaze: a new approach to computer security via binary analysis. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol. 5352, pp. 1\u201325. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-89862-7_1"},{"key":"8_CR12","unstructured":"Anti-virus technology whitepaper. Technical report, BitDefender (2007)"},{"key":"8_CR13","unstructured":"Nguyen, M.H., Tho, Q.T.: An experimental study on identifying obfuscation techniques in packer. In: 5th World Conference on Applied Sciences, Engineering and Technology (WCSET), 02\u201304 June 2016, HCMUT, Vietnam (2016). ISBN 978-81-930222-2-1"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-642-14295-6_27","volume-title":"Computer Aided Verification","author":"A Thakur","year":"2010","unstructured":"Thakur, A., Lim, J., Lal, A., Burton, A., Driscoll, E., Elder, M., Andersen, T., Reps, T.: Directed proof generation for machine code. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol. 6174, pp. 288\u2013305. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14295-6_27"},{"key":"8_CR15","unstructured":"Kinder, J.: Static analysis of x86 executables. Ph.D. thesis, Technische Universitat Darmstadt (2010)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-642-27940-9_18","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"J Kinder","year":"2012","unstructured":"Kinder, J., Kravchenko, D.: Alternating control flow reconstruction. In: Kuncak, V., Rybalchenko, A. (eds.) VMCAI 2012. LNCS, vol. 7148, pp. 267\u2013282. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-27940-9_18"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-540-93900-9_19","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"J Kinder","year":"2008","unstructured":"Kinder, J., Zuleger, F., Veith, H.: An abstract interpretation-based framework for control flow reconstruction from binaries. In: Jones, N.D., M\u00fcller-Olm, M. (eds.) VMCAI 2009. LNCS, vol. 5403, pp. 214\u2013228. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-93900-9_19"},{"key":"8_CR18","series-title":"NATO ASI Series (Series F: Computer and Systems Sciences)","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-76626-8_1","volume-title":"Speech Recognition and Understanding","author":"LR Rabiner","year":"1992","unstructured":"Rabiner, L.R., Juang, H.: Hidden Markov models for speech recognition - strengths and limitations. In: Laface, P., De Mori, R. (eds.) Speech Recognition and Understanding. NATO ASI Series, vol. 75, pp. 3\u201329. Springer, Heidelberg (1992). doi: 10.1007\/978-3-642-76626-8_1"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Kunda, A., He, Y., Bahl, P.: Handwritten word recognition: a hidden Markov model based approach. In: pattern recognition, pp. 283\u2013297, May 1989","DOI":"10.1016\/0031-3203(89)90076-9"},{"key":"8_CR20","unstructured":"Rimey, R.D., Brown, C.M.: Selective attention as sequential behavior: modeling eye movements with an augmented hidden Markov model. In: Proceedings of the DARPA Image Understanding Workshop, pp. 840\u2013649 (1990)"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Bakis, R.: Continuous speech word recognition via centisecond acoustic states. In: Proceedings of ASA Meeting, Washington, D.C., April 1976","DOI":"10.1121\/1.2003011"},{"key":"8_CR22","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1109\/PROC.1973.9030","volume":"61","author":"GD Forney","year":"1973","unstructured":"Forney, G.D.: The Viterbi algorithm. Proc. IEEE 61, 268\u2013278 (1973)","journal-title":"Proc. IEEE"},{"key":"8_CR23","first-page":"35","volume":"24","author":"A Singhal","year":"2001","unstructured":"Singhal, A.: Modern information retrieval a brief overview. Bull. IEEE Comput. Soc. Techn. Comm. Data Eng. 24, 35\u201343 (2001)","journal-title":"Bull. IEEE Comput. Soc. Techn. Comm. Data Eng."},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-319-47846-3_11","volume-title":"Formal Methods and Software Engineering","author":"NM Hai","year":"2016","unstructured":"Hai, N.M., Tho, Q.T., Anh, L.D.: Multi-threaded on-the-fly model generation of malware with hash compaction. In: Ogata, K., Lawford, M., Liu, S. (eds.) ICFEM 2016. LNCS, vol. 10009, pp. 159\u2013174. Springer, Cham (2016). doi: 10.1007\/978-3-319-47846-3_11"}],"container-title":["Lecture Notes in Computer Science","Multi-disciplinary Trends in Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69456-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T15:14:01Z","timestamp":1750950841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69456-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319694559","9783319694566"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69456-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}