{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T21:57:07Z","timestamp":1771019827072,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642117466","type":"print"},{"value":"9783642117473","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11747-3_3","type":"book-chapter","created":{"date-parts":[[2010,1,25]],"date-time":"2010-01-25T01:03:02Z","timestamp":1264381382000},"page":"35-43","source":"Crossref","is-referenced-by-count":127,"title":["Idea: Opcode-Sequence-Based Malware Detection"],"prefix":"10.1007","author":[{"given":"Igor","family":"Santos","sequence":"first","affiliation":[]},{"given":"Felix","family":"Brezo","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Nieves","sequence":"additional","affiliation":[]},{"given":"Yoseba K.","family":"Penya","sequence":"additional","affiliation":[]},{"given":"Borja","family":"Sanz","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Laorden","sequence":"additional","affiliation":[]},{"given":"Pablo G.","family":"Bringas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Karsperky-Labs: Kaspersky Security Bulletin: Statistics 2008 (2009)"},{"key":"3_CR2","unstructured":"Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium, February 2003, pp. 169\u2013186 (2003)"},{"key":"3_CR3","unstructured":"Morley, P.: Processing virus collections. In: Proceedings of the 2001 Virus Bulletin Conference (VB 2001), Virus Bulletin, pp. 129\u2013134 (2001)"},{"issue":"2","key":"3_CR4","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1504\/IJESDF.2007.016865","volume":"1","author":"D. Bilar","year":"2007","unstructured":"Bilar, D.: Opcodes as predictor for malware. International Journal of Electronic Security and Digital Forensics\u00a01(2), 156\u2013168 (2007)","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"key":"3_CR5","unstructured":"VX heavens (2009), http:\/\/vx.netlux.org\/ (Last accessed: September 29, 2009)"},{"key":"3_CR6","unstructured":"NewBasic - An x86 Assembler\/Disassembler for DOS, http:\/\/www.frontiernet.net\/~fys\/newbasic.htm (Last accessed: September 29, 2009)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Peng, H., Long, F., Ding, C.: Feature selection based on mutual information: criteria of max-dependency, max-relevance, and min-redundancy. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1226\u20131238 (2005)","DOI":"10.1109\/TPAMI.2005.159"},{"key":"3_CR8","volume-title":"Introduction to modern information retrieval","author":"M. McGill","year":"1983","unstructured":"McGill, M., Salton, G.: Introduction to modern information retrieval. McGraw-Hill, New York (1983)"},{"issue":"2","key":"3_CR9","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/1361348.1361351","volume":"36","author":"S. Tata","year":"2007","unstructured":"Tata, S., Patel, J.: Estimating the Selectivity of tf-idf based Cosine Similarity Predicates. SIGMOD Record\u00a036(2), 75\u201380 (2007)","journal-title":"SIGMOD Record"},{"key":"3_CR10","unstructured":"Carrera, E., Erd\u00e9lyi, G.: Digital genome mapping\u2013advanced binary malware analysis. In: Virus Bulletin Conference, pp. 187\u2013197 (2004)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Ashcraft, K., Engler, D.: Using programmer-written compiler extensions to catch security holes. In: Proceedings of the 23rd IEEE Symposium on Security and Privacy, pp. 143\u2013159 (2002)","DOI":"10.1109\/SECPRI.2002.1004368"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Schultz, M., Eskin, E., Zadok, F., Stolfo, S.: Data mining methods for detection of new malicious executables. In: Proceedings of the 22nd IEEE Symposium on Security and Privacy, pp. 38\u201349 (2001)","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1145\/1014052.1014105","volume-title":"Proceedings of the 10th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD)","author":"J.Z. Kolter","year":"2004","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect malicious executables in the wild. In: Proceedings of the 10th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD), pp. 470\u2013478. ACM, New York (2004)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Santos, I., Penya, Y., Devesa, J., Bringas, P.: N-Grams-based file signatures for malware detection. In: Proceedings of the 11 th International Conference on Enterprise Information Systems (ICEIS), Volume AIDSS, pp. 317\u2013320 (2009)","DOI":"10.5220\/0001863603170320"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S., Song, D., Bryant, R.: Semantics-aware malware detection. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 32\u201346 (2005)","DOI":"10.1109\/SP.2005.20"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-540-70542-0_8","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"L. Cavallaro","year":"2008","unstructured":"Cavallaro, L., Saxena, P., Sekar, R.: On the limits of information flow techniques for malware analysis and containment. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol.\u00a05137, pp. 143\u2013163. Springer, Heidelberg (2008)"},{"issue":"1","key":"3_CR17","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s11416-006-0012-2","volume":"2","author":"U. Bayer","year":"2006","unstructured":"Bayer, U., Moser, A., Kruegel, C., Kirda, E.: Dynamic analysis of malicious code. Journal in Computer Virology\u00a02(1), 67\u201377 (2006)","journal-title":"Journal in Computer Virology"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"King, S., Chen, P.: SubVirt: Implementing malware with virtual machines. In: 2006 IEEE Symposium on Security and Privacy, pp. 314\u2013327 (2006)","DOI":"10.1109\/SP.2006.38"},{"issue":"2","key":"3_CR19","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSP.2007.45","volume":"5","author":"C. Willems","year":"2007","unstructured":"Willems, C., Holz, T., Freiling, F.: Toward automated dynamic malware analysis using cwsandbox. IEEE Security & Privacy\u00a05(2), 32\u201339 (2007)","journal-title":"IEEE Security & Privacy"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11747-3_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:43:29Z","timestamp":1606185809000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11747-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117466","9783642117473"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11747-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}