{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:51Z","timestamp":1750308051332,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811050404"},{"type":"electronic","value":"9789811050411"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-5041-1_89","type":"book-chapter","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T07:14:39Z","timestamp":1494659679000},"page":"560-565","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Analysis Bypassing Malware Detection Method Utilizing Malicious Behavior Visualization and Similarity"],"prefix":"10.1007","author":[{"given":"Jihun","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jonghee M.","family":"Youn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"issue":"2","key":"89_CR1","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSP.2007.45","volume":"5","author":"C Willems","year":"2007","unstructured":"Willems, C., Holz, T., Freiling, F.: Toward automated dynamic malware analysis using CWSandbox. IEEE Secur. Priv. 5(2), 32\u201339 (2007)","journal-title":"IEEE Secur. Priv."},{"key":"89_CR2","doi-asserted-by":"crossref","unstructured":"Wu, D.J., Mao, C.H.: Malware detection based on mining API calls. In: Proceedings of the ACM Symposium on Applied Computing, SAC 2010, pp. 1020\u20131025 (2010)","DOI":"10.1145\/1774088.1774303"},{"key":"89_CR3","doi-asserted-by":"crossref","unstructured":"Daryabar, F., Dehghantanha, A., Udzir, N.I.: Investigation of bypassing malware defences and malware detections. In: 7th International Conference on Information Assurance and Security (IAS) (2011)","DOI":"10.1109\/ISIAS.2011.6122815"},{"key":"89_CR4","doi-asserted-by":"crossref","unstructured":"Massacci, F., Wallach, D., Zannone, N.: Idea: opcode-sequence-based malware detection. In: Engineering Secure Software and Systems. LNCS, vol. 5965, pp. 35\u201343 (2010)","DOI":"10.1007\/978-3-642-11747-3_3"},{"issue":"1","key":"89_CR5","doi-asserted-by":"crossref","first-page":"85","DOI":"10.9708\/jksci.2014.19.1.085","volume":"19","author":"E-G Jang","year":"2014","unstructured":"Jang, E.-G., Lee, S.J., Le, J.I.: A study on similarity comparison for file DNA-based metamorphic malware detection. J. Korea Soc. Comput. Inf. 19(1), 85\u201394 (2014)","journal-title":"J. Korea Soc. Comput. Inf."},{"key":"89_CR6","doi-asserted-by":"crossref","unstructured":"Santos, I., Penya, Y., Devesa, J., Bringas, P.: N-Grams-based file signatures for malware detection. In: International Conference on Enterprise Information Systems (ICEIS), vol. AIDSS, pp. 317\u2013320 (2009)","DOI":"10.5220\/0001863603170320"},{"key":"89_CR7","doi-asserted-by":"crossref","unstructured":"Karnik, A., Goswami, S., Guha, R.: Detecting obfuscated viruses using cosine similarity analysis. In: The Proceeding of IEEE Symposium First International Conference on Modelling and Simulation (2007)","DOI":"10.1109\/AMS.2007.31"},{"key":"89_CR8","doi-asserted-by":"crossref","unstructured":"Jang, J., Brumley, D., Venkataraman, S.: BitShred feature hashing malware for scalable triage and semantic analysis. In: 18th ACM Conference on Computer and Communications Security, CCS 2011, pp. 309\u2013320 (2011)","DOI":"10.1145\/2046707.2046742"},{"key":"89_CR9","unstructured":"IDA. https:\/\/www.hex-rays.com\/products\/ida\/"},{"key":"89_CR10","unstructured":"MSDN. https:\/\/msdn.microsoft.com\/en-us\/"},{"issue":"4","key":"89_CR11","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2001","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2001). doi: 10.1109\/TIP.2003.819861 . ISSN 1057\u20137149","journal-title":"IEEE Trans. Image Process."}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Multimedia and Ubiquitous Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5041-1_89","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:17:08Z","timestamp":1750259828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5041-1_89"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811050404","9789811050411"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5041-1_89","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]}}}