{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:37:28Z","timestamp":1776083848277,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642238215","type":"print"},{"value":"9783642238222","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23822-2_10","type":"book-chapter","created":{"date-parts":[[2011,9,7]],"date-time":"2011-09-07T14:38:34Z","timestamp":1315406314000},"page":"172-189","source":"Crossref","is-referenced-by-count":62,"title":["Who Wrote This Code? Identifying the Authors of Program Binaries"],"prefix":"10.1007","author":[{"given":"Nathan","family":"Rosenblum","sequence":"first","affiliation":[]},{"given":"Xiaojin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Barton P.","family":"Miller","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","volume-title":"Pattern Recognition and Machine Learning","author":"C.M. Bishop","year":"2006","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-aware malware detection. In: IEEE Symposium on Security and Privacy (S&P 2005), Oakland, CA (May 2005)","DOI":"10.1109\/SP.2005.20"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Machine Learning\u00a020 (1995)","DOI":"10.1007\/BF00994018"},{"key":"10_CR4","first-page":"1871","volume":"9","author":"R.-E. Fan","year":"2008","unstructured":"Fan, R.-E., Chang, K.-W., Hsieh, C.-J., Wang, X.-R., Lin, C.-J.: LIBLINEAR: A library for large linear classification. Journal of Machine Learning Research\u00a09, 1871\u20131874 (2008)","journal-title":"Journal of Machine Learning Research"},{"key":"10_CR5","unstructured":"Gray, A., Sallis, P., MacDonell, S.: Software forensics: Extending authorship analysis techniques to computer programs. In: 3rd Biennial Conference of the International Association of Forensic Linguists, Durham, NC (September 1997)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Hayes, J.H., Offutt, J.: Recognizing authors: an examination of the consistent programmer hypothesis. Software Testing, Verification and Reliability (2009)","DOI":"10.1002\/stvr.412"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Juola, P.: Authorship attribution. Foundations and Trends in Information Retrieval (December 2006)","DOI":"10.1561\/1500000005"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s11416-005-0002-9","volume":"1","author":"M. Karim","year":"2005","unstructured":"Karim, M., Walenstein, A., Lakhotia, A., Parida, L.: Malware phylogeny generation using permutations of code. Journal in Computer Virology\u00a01, 13\u201323 (2005)","journal-title":"Journal in Computer Virology"},{"key":"10_CR9","first-page":"2721","volume":"7","author":"J.Z. Kolter","year":"2006","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research\u00a07, 2721\u20132744 (2006)","journal-title":"Journal of Machine Learning Research"},{"issue":"3","key":"10_CR10","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/S0167-4048(97)00005-9","volume":"16","author":"I. Krsul","year":"1997","unstructured":"Krsul, I., Spafford, E.H.: Authorship analysis: identifying the author of a program. Computers & Security\u00a016(3), 233\u2013257 (1997)","journal-title":"Computers & Security"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11663812_11","volume-title":"Recent Advances in Intrusion Detection","author":"C. Kr\u00fcgel","year":"2006","unstructured":"Kr\u00fcgel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Polymorphic worm detection using structural information of executables. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, pp. 207\u2013226. Springer, Heidelberg (2006)"},{"key":"10_CR12","unstructured":"Mahalanobis, P.C.: On the generalised distance in statistics. In: Proceedings National Institute of Sciences of India, vol.\u00a02 (1936)"},{"key":"10_CR13","unstructured":"Palmer, G.: A road map for digital forensic research. Technical Report DTR-T001-01 FINAL, Digital Forensics Research Workshop, DFRWS (2001)"},{"key":"10_CR14","unstructured":"Paradyn Project. ParseAPI: An application program interface for binary parsing (2011), http:\/\/paradyn.org\/html\/parse0.9-features.html"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Rosenblum, N.E., Miller, B.P., Zhu, X.: Extracting compiler provenance from program binaries. In: 9th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE 2010), Toronto, Ontario, Canada (June 2010)","DOI":"10.1145\/1806672.1806678"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Rosenblum, N.E., Miller, B.P., Zhu, X.: Recovering the toolchain provenance of binary code (2011). In: 20th International Symposium on Software Testing and Analysis (ISSTA), Toronto, Ontario, Canada (July 2011)","DOI":"10.1145\/2001420.2001433"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Schleimer, S., Wilkerson, D.S., Aiken, A.: Winnowing: local algorithms for document fingerprinting. In: ACM SIGMOD International Conference on Management of Data, San Diego, CA (June 2003)","DOI":"10.1145\/872757.872770"},{"key":"10_CR18","unstructured":"Spafford, E.H., Weeber, S.A.: Software forensics: Can we track code to its authors? Technical Report CSD-TR-92-010, Purdue University (February 1992)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Vinh, N.X., Epps, J., Bailey, J.: Information theoretic measures for clusterings comparison: is a correction for chance necessary? In: 26th Annual International Conference on Machine Learning, ICML 2009, Montreal, Quebec, Canada (June 2009)","DOI":"10.1145\/1553374.1553511"},{"key":"10_CR20","unstructured":"Weinberger, K.Q., Saul, L.K.: Distance metric learning for large margin nearest neighbor classification. Journal of Machine Learning Research (February 2009)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2011"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23822-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T08:46:35Z","timestamp":1592901995000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23822-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642238215","9783642238222"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23822-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}