{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:51:34Z","timestamp":1725742294264},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642400988"},{"type":"electronic","value":"9783642400995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40099-5_6","type":"book-chapter","created":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T16:32:17Z","timestamp":1374683537000},"page":"54-68","source":"Crossref","is-referenced-by-count":3,"title":["LSB Replacement Steganography Software Detection Based on Model Checking"],"prefix":"10.1007","author":[{"given":"Zheng","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Fenlin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Steganography tools (2009), \n                      \n                        http:\/\/www.jjtc.com\/Security\/stegtools.htm","key":"6_CR1"},{"unstructured":"Moon, K.K.B.-R.: Malware Detection based on Dependency Graph using Hybrid Genetic Algorithm. In: Proceedings of GECCO 2010, Oregon, P-orland, pp. 1211\u20131218 (2010)","key":"6_CR2"},{"doi-asserted-by":"crossref","unstructured":"Walenstein, A., Mathur, R., Chouchane, M.R., Lakhotia, A.: Normalizing Metamorphic Malware Using Term Rewriting. In: Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), Philadelphia, USA, pp. 75\u201384 (2006)","key":"6_CR3","DOI":"10.1109\/SCAM.2006.20"},{"unstructured":"Schmall, M.: Classification and identification of malicious code based on heuristic techniques utilizing meta-languages. Ph.D. thesis, University of Hamburg (2003)","key":"6_CR4"},{"key":"6_CR5","first-page":"38","volume-title":"Proc. of the IEEE Symposium on Security and Privacy","author":"M.G. Schultz","year":"2001","unstructured":"Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data Mining Methods for Detection of New Malicious Executables. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 38\u201349. IEEE Press, Oakland (2001)"},{"doi-asserted-by":"crossref","unstructured":"Myles, G., Collberg, C.: K-gram Based Software Birthmarks. In: Proceeding of ACM Symposium on Applied Computing, pp. 314\u2013318. ACM (2005)","key":"6_CR6","DOI":"10.1145\/1066677.1066753"},{"unstructured":"Tamada, H., Okamoto, K.: Dynamic Software Birthmarks to Detect the Theft of Windows Applications. In: Proceedings of the International Symposium on Future Software Technology (2004)","key":"6_CR7"},{"doi-asserted-by":"crossref","unstructured":"Schuler, D., Dallmeier, V., Lindig, C.: A Dynamic Birthmark for Java. In: Proceedings of the 22nd IEEE\/ACM International Conference on Automated Software Engineering, pp. 274\u2013283 (2007)","key":"6_CR8","DOI":"10.1145\/1321631.1321672"},{"doi-asserted-by":"crossref","unstructured":"Zhou, X., Sun, X., Sun, G., Yang, Y.: A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph. In: Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Prcessing, pp. 1416\u20131421 (2008)","key":"6_CR9","DOI":"10.1109\/IIH-MSP.2008.145"},{"unstructured":"Mu\u00f1oz, A.: StegSecret (2007), \n                      \n                        http:\/\/stegsecret.sourceforge.net","key":"6_CR10"},{"unstructured":"Zheng, D., Liu, F., Yang, C., Luo, X.: Identify Information Hiding Software Based on Software Birthmarking. In: International Conference on Infomation Security and Artificial Intelligence, vol.\u00a03, pp. 530\u2013534 (2010)","key":"6_CR11"},{"doi-asserted-by":"crossref","unstructured":"Zheng, Y., Liu, F., Yang, C., Luo, X.: Identification of stganography software Based on Core Insructions Tempate Matching. In: Proceedings of IEEE International Conference on Multimedia Information Networking and Security 2011, Special Session, vol.\u00a01, pp. 494\u2013498 (2011)","key":"6_CR12","DOI":"10.1109\/MINES.2011.37"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-642-36373-3_3","volume-title":"Information Hiding","author":"J. Fridrich","year":"2013","unstructured":"Fridrich, J., Kodovsk\u00fd, J.: Steganalysis of LSB Replacement Using Parity-Aware Features. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol.\u00a07692, pp. 31\u201345. Springer, Heidelberg (2013)"},{"unstructured":"Christodorescu, M., Jha, S.: Static Analysis of Executablesto Detect Malicious Patterns. In: Proc. 12th Usenix Security Symp., pp. 169\u2013186 (2003)","key":"6_CR14"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermaking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40099-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T03:28:28Z","timestamp":1557977308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40099-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642400988","9783642400995"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40099-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}