{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:13:21Z","timestamp":1743009201782,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813368347"},{"type":"electronic","value":"9789813368354"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-33-6835-4_24","type":"book-chapter","created":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T09:20:32Z","timestamp":1612430432000},"page":"354-370","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0595-2214","authenticated-orcid":false,"given":"Collins Uchenna","family":"Chimeleze","sequence":"first","affiliation":[]},{"given":"Norziana","family":"Jamil","sequence":"additional","affiliation":[]},{"given":"Roslan","family":"Ismail","sequence":"additional","affiliation":[]},{"given":"Kwok-Yan","family":"Lam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,5]]},"reference":[{"issue":"4","key":"24_CR1","first-page":"291","volume":"6","author":"G Liang","year":"2016","unstructured":"Liang, G., Pang, J., Dai, C.: A behavior-based malware variant classification technique. Int. J. Inf. Educ. Technol. 6(4), 291 (2016)","journal-title":"Int. J. Inf. Educ. Technol."},{"unstructured":"Av test: Facts and figures - security report 2016\/2017 (2017). https:\/\/www.av-test.org\/fileadmin\/pdf\/security_report\/AV-TEST_Security_Report_2016-2017.pdf","key":"24_CR2"},{"unstructured":"Internet SecurityThreat Report (ISTR) (2018). https:\/\/www.symantec.com\/security-center\/threat-report.","key":"24_CR3"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.compeleceng.2019.03.015","volume":"76","author":"H Naeem","year":"2019","unstructured":"Naeem, H., Guo, B., Naeem, M.R., Ullah, F., Aldabbas, H., Javed, M.S.: Identification of malicious code variants based on image visualization. Comput. Electr. Eng. 76, 225\u2013237 (2019)","journal-title":"Comput. Electr. Eng."},{"doi-asserted-by":"crossref","unstructured":"Han, K., Lim, J.H., Im, E.G.: Malware analysis method using visualization of binary files. In: Proceedings of the 2013 Research in Adaptive and Convergent Systems, pp. 317\u2013321 (2013)","key":"24_CR5","DOI":"10.1145\/2513228.2513294"},{"doi-asserted-by":"crossref","unstructured":"Awad, R.A., Sayre, K.D.: Automatic clustering of malware variants. In: 2016 IEEE Conference on Intelligence and Security Informatics (ISI), pp. 298\u2013303. IEEE, September 2016","key":"24_CR6","DOI":"10.1109\/ISI.2016.7745494"},{"issue":"3","key":"24_CR7","first-page":"194","volume":"2","author":"P Beaucamps","year":"2007","unstructured":"Beaucamps, P.: Advanced polymorphic techniques. Int. J. Comput. Sci. 2(3), 194\u2013205 (2007)","journal-title":"Int. J. Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Han, K.S., Kang, B., Im, E.G.: Malware classification using instruction frequencies. In: Proceedings of the 2011 ACM Symposium on Research in Applied Computation, pp. 298\u2013300, November 2011","key":"24_CR8","DOI":"10.1145\/2103380.2103441"},{"unstructured":"Hu, X.: Large Scale Malware Analysis, Detection and Signature Generation (Doctoral dissertation) (2011)","key":"24_CR9"},{"key":"24_CR10","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ins.2011.08.020","volume":"231","author":"I Santos","year":"2013","unstructured":"Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf. Sci. 231, 64\u201382 (2013)","journal-title":"Inf. Sci."},{"issue":"4","key":"24_CR11","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1109\/TDSC.2013.40","volume":"11","author":"S Cesare","year":"2013","unstructured":"Cesare, S., Xiang, Y., Zhou, W.: Control flow-based malware variantdetection. IEEE Trans. Dependable Secure Comput. 11(4), 307\u2013317 (2013)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"doi-asserted-by":"crossref","unstructured":"Nataraj, L., Yegneswaran, V., Porras, P., Zhang, J.: A comparative assessment of malware classification using binary texture analysis and dynamic analysis. In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, pp. 21\u201330, October 2011","key":"24_CR12","DOI":"10.1145\/2046684.2046689"},{"doi-asserted-by":"crossref","unstructured":"Zhang, J., Qin, Z., Yin, H., Ou, L., Xiao, S., Hu, Y.: Malware variant detection using opcode image recognition with small training sets. In: 2016 25th International Conference on Computer Communication and Networks (ICCCN), pp. 1\u20139. IEEE, August 2016","key":"24_CR13","DOI":"10.1109\/ICCCN.2016.7568542"},{"doi-asserted-by":"crossref","unstructured":"Zhang, J., Qin, Z., Yin, H., Ou, L., Hu, Y.: IRMD: malware variant detection using opcode image recognition. In: 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS), pp. 1175\u20131180. IEEE, December 2016","key":"24_CR14","DOI":"10.1109\/ICPADS.2016.0155"},{"doi-asserted-by":"crossref","unstructured":"Yang, W., Xiao, X., Andow, B., Li, S., Xie, T., Enck, W.: AppContext: differentiating malicious and benign mobile app behaviors using context. In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, vol. 1, pp. 303\u2013313. IEEE, May 2015","key":"24_CR15","DOI":"10.1109\/ICSE.2015.50"},{"issue":"1","key":"24_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-018-0010-y","volume":"1","author":"J Zhang","year":"2018","unstructured":"Zhang, J., Zhang, K., Qin, Z., Yin, H., Wu, Q.: Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks. Cybersecurity 1(1), 1\u201313 (2018). https:\/\/doi.org\/10.1186\/s42400-018-0010-y","journal-title":"Cybersecurity"},{"doi-asserted-by":"crossref","unstructured":"Huang, J., Zhang, X., Tan, L., Wang, P., Liang, B.: AsDroid: detecting stealthy behaviors in android applications by user interface and program behavior contradiction. In: Proceedings of the 36th International Conference on Software Engineering, pp. 1036\u20131046, May 2014","key":"24_CR17","DOI":"10.1145\/2568225.2568301"},{"doi-asserted-by":"crossref","unstructured":"Patanaik, C.K., Barbhuiya, F.A., Nandi, S.: Obfuscated malware detection using API call dependency. In: Proceedings of the First International Conference on Security of Internet of Things, pp. 185\u2013193, August 2012.","key":"24_CR18","DOI":"10.1145\/2490428.2490454"},{"doi-asserted-by":"crossref","unstructured":"Xu, L., Zhang, D., Alvarez, M.A., Morales, J.A., Ma, X., Cavazos, J.: Dynamic android malware classification using graph-based representations. In: 2016 IEEE 3rd international conference on cyber security and cloud computing (CSCloud), pp. 220\u2013231. IEEE, June 2016","key":"24_CR19","DOI":"10.1109\/CSCloud.2016.27"},{"issue":"2","key":"24_CR20","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1049\/iet-ifs.2012.0343","volume":"8","author":"H Bai","year":"2013","unstructured":"Bai, H., Hu, C.Z., Jing, X.C., Li, N., Wang, X.Y.: Approach for malware identification using dynamic behaviour and outcome triggering. IET Inf. Secur. 8(2), 140\u2013151 (2013)","journal-title":"IET Inf. Secur."},{"issue":"4","key":"24_CR21","doi-asserted-by":"publisher","first-page":"639","DOI":"10.3233\/JCS-2010-0410","volume":"19","author":"K Rieck","year":"2011","unstructured":"Rieck, K., Trinius, P., Willems, C., Holz, T.: Automatic analysis of malware behavior using machine learning. J. Comput. Secur. 19(4), 639\u2013668 (2011)","journal-title":"J. Comput. Secur."},{"unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical report, University of Auckland (1997)","key":"24_CR22"},{"key":"24_CR23","first-page":"1","volume":"2019","author":"Y Zhao","year":"2019","unstructured":"Zhao, Y., Xu, C., Bo, B., Feng, Y.: MalDeep: a deep learning classification framework against malware variants based on texture visualization. Secur. Commun. Netw. 2019, 1\u201311 (2019)","journal-title":"Secur. Commun. Netw."},{"doi-asserted-by":"crossref","unstructured":"Alam, S., Riley, R., Sogukpinar, I., Carkaci, N.: DroidClone: detecting android malware variants by exposing code clones. In: 2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), pp. 79\u201384. IEEE, July 2016","key":"24_CR24","DOI":"10.1109\/DICTAP.2016.7544005"},{"issue":"7","key":"24_CR25","doi-asserted-by":"publisher","first-page":"3187","DOI":"10.1109\/TII.2018.2822680","volume":"14","author":"Z Cui","year":"2018","unstructured":"Cui, Z., Xue, F., Cai, X., Cao, Y., Wang, G.G., Chen, J.: Detection of malicious code variants based on deep learning. IEEE Trans. Industr. Inf. 14(7), 3187\u20133196 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"24_CR26","doi-asserted-by":"publisher","first-page":"81770","DOI":"10.1109\/ACCESS.2019.2924331","volume":"7","author":"D Du","year":"2019","unstructured":"Du, D., Sun, Y., Ma, Y., Xiao, F.: A novel approach to detect malware variants based on classified behaviors. IEEE Access 7, 81770\u201381782 (2019)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Howard, M., Pfeffer, A., Dalai, M., Reposa, M.: Predicting signatures of future malware variants. In: 2017 12th International Conference on Malicious and Unwanted Software (MALWARE), pp. 126\u2013132. IEEE, October 2017","key":"24_CR27","DOI":"10.1109\/MALWARE.2017.8323965"},{"doi-asserted-by":"crossref","unstructured":"Naidu, V., Narayanan, A.: Needleman-Wunsch and Smith-Waterman algorithms for identifying viral polymorphic malware variants. In: 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, 14th International Conference on Pervasive Intelligence and Computing, 2nd International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech), pp. 326\u2013333. IEEE, August 2016","key":"24_CR28","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.73"},{"unstructured":"Bartos, K., Sofka, M., Franc, V.: Optimized invariant representation of network traffic for detecting unseen malware variants. In: 25th {USENIX} Security Symposium ({USENIX} Security 16), pp. 807\u2013822 (2016)","key":"24_CR29"},{"issue":"5","key":"24_CR30","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1109\/TIFS.2016.2646641","volume":"12","author":"M Sun","year":"2016","unstructured":"Sun, M., Li, X., Lui, J.C., Ma, R.T., Liang, Z.: Monet: A user-oriented behavior-based malware variants detection system for android. IEEE Trans. Inf. Forensics Secur. 12(5), 1103\u20131112 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"24_CR31","doi-asserted-by":"publisher","first-page":"51964","DOI":"10.1109\/ACCESS.2018.2870534","volume":"6","author":"J Zhang","year":"2018","unstructured":"Zhang, J., Qin, Z., Zhang, K., Yin, H., Zou, J.: Dalvik opcode graph based android malware variants detection using global topology features. IEEE Access 6, 51964\u201351974 (2018)","journal-title":"IEEE Access"},{"unstructured":"Wang, T., Xu, N.: Malware variants detection based on opcode image recognition in small training set. In: 2017 IEEE 2nd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 328\u2013332. IEEE, April 2017","key":"24_CR32"},{"doi-asserted-by":"crossref","unstructured":"Wang, C., Qin, Z., Zhang, J., Yin, H.: A malware variants detection methodology with an opcode based feature method and a fast density based clustering algorithm. In: 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), pp. 481\u2013487. IEEE, August 2016","key":"24_CR33","DOI":"10.1109\/FSKD.2016.7603221"},{"key":"24_CR34","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.cose.2019.04.005","volume":"84","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Qin, Z., Yin, H., Ou, L., Zhang, K.: A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding. Comput. Secur. 84, 376\u2013392 (2019)","journal-title":"Comput. Secur."},{"key":"24_CR35","first-page":"66","volume":"22","author":"P Faruki","year":"2015","unstructured":"Faruki, P., Laxmi, V., Bharmal, A., Gaur, M.S., Ganmoor, V.: AndroSimilar: robust signature for detecting variants of Android malware. J. Inf. Secur. Appl. 22, 66\u201380 (2015)","journal-title":"J. Inf. Secur. Appl."},{"doi-asserted-by":"crossref","unstructured":"Kim, H., Smith, J., Shin, K.G.: Detecting energy-greedy anomalies and mobile malware variants. In: Proceedings of the 6th International Conference On Mobile Systems, Applications, and Services, pp. 239\u2013252, June 2008","key":"24_CR36","DOI":"10.1145\/1378600.1378627"},{"doi-asserted-by":"crossref","unstructured":"Shen, T., Zhongyang, Y., Xin, Z., Mao, B., Huang, H.: Detect android malware variants using component based topology graph. In: 2014 IEEE 13th International Conference on Trust, security and Privacy in Computing and Communications, pp. 406\u2013413. IEEE, September 2014","key":"24_CR37","DOI":"10.1109\/TrustCom.2014.52"},{"issue":"4","key":"24_CR38","first-page":"63","volume":"6","author":"S Yu","year":"2011","unstructured":"Yu, S., Zhou, S., Liu, L., Yang, R., Luo, J.: Detecting malware variants by byte frequency. J. Netw. 6(4), 63 (2011)","journal-title":"J. Netw."}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-6835-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T01:57:08Z","timestamp":1619315828000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-33-6835-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789813368347","9789813368354"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-6835-4_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}