{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T07:00:21Z","timestamp":1764572421105,"version":"3.46.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002560","name":"Soonchunhyang University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002560","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10207-025-01142-9","type":"journal-article","created":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T19:11:11Z","timestamp":1762974671000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Semantic and structural fusion for malware detection: Leveraging CodeBERT, GraphCodeBERT, and AST-GCN"],"prefix":"10.1007","volume":"24","author":[{"given":"Hyojin","family":"Shin","sequence":"first","affiliation":[]},{"given":"JiYoung","family":"Woo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,12]]},"reference":[{"key":"1142_CR1","unstructured":"Malicious javascript dataset. https:\/\/github.com\/geeksonsecurity\/js-malicious-dataset, (2023)"},{"key":"1142_CR2","unstructured":"Macarious Abadeer, Behrad Moeini, Emma Sewell, Paula Branco, Felipe Ventura, and Wei Shi. Dynamic extraction of bert-based embeddings for the detection of malicious javascript. In Proceedings of the 32nd Annual International Conference on Computer Science and Software Engineering, pages 110\u2013119, (2022)"},{"issue":"8","key":"1142_CR3","doi-asserted-by":"publisher","first-page":"217","DOI":"10.3390\/fi14080217","volume":"14","author":"A Alazab","year":"2022","unstructured":"Alazab, A., Khraisat, A., Alazab, M., Singh, S.: Detection of obfuscated malicious javascript code. Future Internet 14(8), 217 (2022)","journal-title":"Future Internet"},{"issue":"1","key":"1142_CR4","first-page":"305","volume":"37","author":"D Ayg\u00f6r","year":"2022","unstructured":"Ayg\u00f6r, D., Aktan, E.: The limitations of signature-based and dynamic analysis methods in detecting malwares: A case study. Journal of the Faculty of Engineering and Architecture of Gazi University 37(1), 305\u2013315 (2022)","journal-title":"Journal of the Faculty of Engineering and Architecture of Gazi University"},{"key":"1142_CR5","doi-asserted-by":"crossref","unstructured":"Baxter, Ira\u00a0D., Yahin, A., Moura, L., Sant\u2019Anna, M., Bier, L.: Clone detection using abstract syntax trees. In: Proceedings. International Conference on Software Maintenance (Cat. No. 98CB36272), pages 368\u2013377. IEEE, (1998)","DOI":"10.1109\/ICSM.1998.738528"},{"key":"1142_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111543","volume":"290","author":"A Bensaoud","year":"2024","unstructured":"Bensaoud, A., Kalita, J.: Cnn-lstm and transfer learning models for malware classification based on opcodes and api calls. Knowl.-Based Syst. 290, 111543 (2024)","journal-title":"Knowl.-Based Syst."},{"key":"1142_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2024.100546","volume":"16","author":"A Bensaoud","year":"2024","unstructured":"Bensaoud, A., Kalita, J., Bensaoud, M.: A survey of malware detection using deep learning. Machine Learning With Applications 16, 100546 (2024)","journal-title":"Machine Learning With Applications"},{"issue":"4","key":"1142_CR8","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/312009.312023","volume":"34","author":"Brent W Benson Jr","year":"1999","unstructured":"Benson Jr, Brent W.: Javascript. ACM SIGPLAN Notices 34(4), 25\u201327 (1999)","journal-title":"ACM SIGPLAN Notices"},{"key":"1142_CR9","doi-asserted-by":"crossref","unstructured":"Bilot, T., El Madhoun, N., Al Agha, K., Zouaoui, A.: A survey on malware detection with graph representation learning. arXiv preprint arXiv:2303.16004, (2023)","DOI":"10.1145\/3664649"},{"key":"1142_CR10","unstructured":"Curtsinger, C., Livshits, B., Zorn, B., Seifert, C.: ZOZZLE: Fast and precise In-BrowserJavaScript malware detection. In: 20th USENIX Security Symposium (USENIX Security 11), (2011)"},{"key":"1142_CR11","doi-asserted-by":"crossref","unstructured":"Dobreva, J., Mitrovikj, A.\u00a0P., Dimitrova, V.: Maldewe: new malware website detector model based on natural language processing using balanced dataset. In: 2021 International Conference on Computational Science and Computational Intelligence (CSCI), pages 766\u2013770. IEEE, (2021)","DOI":"10.1109\/CSCI54926.2021.00043"},{"key":"1142_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102715","volume":"118","author":"Y Fang","year":"2022","unstructured":"Fang, Y., Huang, C., Zeng, M., Zhao, Z., Huang, C.: Jstrong: Malicious javascript detection based on code semantic representation and graph neural network. Computers & Security 118, 102715 (2022)","journal-title":"Computers & Security"},{"key":"1142_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101764","volume":"93","author":"Y Fang","year":"2020","unstructured":"Fang, Y., Cheng Huang, Y.S., Qiu, Y.: Detecting malicious javascript code based on semantic analysis. Computers & Security 93, 101764 (2020)","journal-title":"Computers & Security"},{"key":"1142_CR14","doi-asserted-by":"crossref","unstructured":"Feng, Z., Guo, D., Tang, D., Duan, N., Feng, X., Gong, M., Shou, L., Qin, B., Liu, T., Jiang, D. et\u00a0al.: Codebert: A pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155, (2020)","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"1142_CR15","doi-asserted-by":"crossref","unstructured":"Gu, J., Kong, R., Sun, H., Zhuang, H., Pan, F., Lin, Z.: A novel detection technique based on benign samples and one-class algorithm for malicious pdf documents containing javascript. In: International Conference on Computer Application and Information Security (ICCAIS 2021), volume 12260, pages 599\u2013607. SPIE, (2022)","DOI":"10.1117\/12.2637518"},{"key":"1142_CR16","unstructured":"Guo, D., Ren, S., Lu, S., Feng, Z., Tang, D., Liu, S., Zhou, L., Duan, N., Svyatkovskiy, A., Fu, S., et\u00a0al. Graphcodebert: Pre-training code representations with data flow. arXiv preprint arXiv:2009.08366, (2020)"},{"key":"1142_CR17","doi-asserted-by":"crossref","unstructured":"Guo, Z.: Malicious javascript detection method based on multilayer perceptron. In: The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy: SPIoT-2020, Volume 1, pages 513\u2013520. Springer, (2021)","DOI":"10.1007\/978-3-030-62743-0_74"},{"key":"1142_CR18","doi-asserted-by":"crossref","unstructured":"Guo, Z., Kang, M., Venkatakrishnan, V.N., Gjomemo, R., Cao, Y.: Reactappscan: Mining react application vulnerabilities via component graph. In: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pages 585\u2013599, (2024)","DOI":"10.1145\/3658644.3670331"},{"key":"1142_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102218","volume":"104","author":"Y Huang","year":"2021","unstructured":"Huang, Y., Li, T., Zhang, L., Li, B., Liu, X.: Jscontana: Malicious javascript detection using adaptable context analysis and key feature extraction. Computers & Security 104, 102218 (2021)","journal-title":"Computers & Security"},{"key":"1142_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110138","volume":"137","author":"M Ishida","year":"2023","unstructured":"Ishida, M., Kaneko, N., Sumi, K.: Moji: Character-level convolutional neural networks for malicious obfuscated javascript inspection. Appl. Soft Comput. 137, 110138 (2023)","journal-title":"Appl. Soft Comput."},{"key":"1142_CR21","doi-asserted-by":"crossref","unstructured":"Issakhani, M., Victor, P., Tekeoglu, A., Lashkari, A.\u00a0H.: Pdf malware detection based on stacking learning. In: ICISSP, pages 562\u2013570, (2022)","DOI":"10.5220\/0010908400003120"},{"key":"1142_CR22","doi-asserted-by":"crossref","unstructured":"Jeong, Y.-S., Woo, J., Kang, A.h.\u00a0R. et\u00a0al.: Malware detection on byte streams of pdf files using convolutional neural networks. Security and Communication Networks, 2019, (2019)","DOI":"10.1155\/2019\/8485365"},{"key":"1142_CR23","unstructured":"Kapravelos, A., Shoshitaishvili, Y., Cova, M., Kruegel, C., Vigna, G.: Revolver: An automated approach to the detection of evasive web-based malware. In 22nd USENIX Security Symposium (USENIX Security 13), pages 637\u2013652, (2013)"},{"key":"1142_CR24","first-page":"1","volume":"5","author":"Bilal Khan","year":"2023","unstructured":"Khan, Bilal, Arshad, Muhammad, Khan, Sarwar Shah: Comparative analysis of machine learning models for pdf malware detection. Journal of Cybersecurity. Evaluating different training and testing criteria 5, 1\u201311 (2023)","journal-title":"Journal of Cybersecurity. Evaluating different training and testing criteria"},{"key":"1142_CR25","unstructured":"Kipf, T.\u00a0N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907, (2016)"},{"issue":"1","key":"1142_CR26","first-page":"249","volume":"39","author":"Yi-Nan Lin","year":"2020","unstructured":"Lin, Yi-Nan., Wang, Sheng-Kuan., Yang, Cheng-Ying., Shen, Victor RL., Juang, Tony Tong-Ying., Wei, Chin-Shan.: Novel javascript malware detection based on fuzzy petri nets. Journal of Intelligent & Fuzzy Systems 39(1), 249\u2013261 (2020)","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"1142_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111991","volume":"299","author":"C Liu","year":"2024","unstructured":"Liu, C., Li, B., Liu, X., Li, C., Bao, J.: Evolving malware detection through instant dynamic graph inverse reinforcement learning. Knowl.-Based Syst. 299, 111991 (2024)","journal-title":"Knowl.-Based Syst."},{"key":"1142_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110850","volume":"278","author":"C Liu","year":"2023","unstructured":"Liu, C., Li, B., Zhao, J., Zhen, Z., Feng, W., Liu, X.: Ti-mvd: a temporal interaction-enhanced model for malware variants detection. Knowl.-Based Syst. 278, 110850 (2023)","journal-title":"Knowl.-Based Syst."},{"key":"1142_CR29","doi-asserted-by":"crossref","unstructured":"Manan, W. N.\u00a0W., Kahar, M. N.\u00a0M., Ali, N.\u00a0M.: A survey on current malicious javascript behavior of infected web content in detection of malicious web pages. In: IOP Conference Series: Materials Science and Engineering, volume 769, page 012074. IOP Publishing, (2020)","DOI":"10.1088\/1757-899X\/769\/1\/012074"},{"key":"1142_CR30","unstructured":"Mou, L., Li, G., Jin, Z., Zhang, L., Wang, T.: Tbcnn: A tree-based convolutional neural network for programming language processing. arXiv preprint arXiv:1409.5718, (2014)"},{"key":"1142_CR31","unstructured":"Pengchant. Benign javascript dataset. https:\/\/github.com\/pengchant\/benign-javascript-dataset, (2020)"},{"key":"1142_CR32","unstructured":"Petrak, Hynek: Javascript malware collection. https:\/\/github.com\/HynekPetrak\/javascript-malware-collection, (2017)"},{"key":"1142_CR33","doi-asserted-by":"crossref","unstructured":"Qin, Y., Wang, W., Chen, Z., Song, H., Zhang, S.: Transast: A machine translation-based approach for obfuscated malicious javascript detection. In: 2023 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pages 327\u2013338. IEEE, (2023)","DOI":"10.1109\/DSN58367.2023.00040"},{"key":"1142_CR34","doi-asserted-by":"crossref","unstructured":"Ren, K., Qiang, W., Wu, Y., Zhou, Y., Zou, D., Jin, H.: Jsrevealer: A robust malicious javascript detector against obfuscation. In: 2023 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pages 339\u2013351. IEEE, (2023)","DOI":"10.1109\/DSN58367.2023.00041"},{"key":"1142_CR35","doi-asserted-by":"crossref","unstructured":"Rozi, M. F., Ban, T., Ozawa, S., Yamada, A., Takahashi, T., Kim, S., Inoue, D.: Detecting malicious javascript using structure-based analysis of graph representation, IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3317266"},{"key":"1142_CR36","doi-asserted-by":"crossref","unstructured":"Rozi, M.\u00a0F., Kim, S., Ozawa, S.: Deep neural networks for malicious javascript detection using bytecode sequences. In: 2020 International Joint Conference on Neural Networks (IJCNN), pages 1\u20138. IEEE, (2020)","DOI":"10.1109\/IJCNN48605.2020.9207134"},{"key":"1142_CR37","doi-asserted-by":"crossref","unstructured":"Shaw, P., Uszkoreit, J., Vaswani, A.: Self-attention with relative position representations. arXiv preprint arXiv:1803.02155, (2018)","DOI":"10.18653\/v1\/N18-2074"},{"issue":"1","key":"1142_CR38","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s10207-023-00736-5","volume":"23","author":"Silviu Vi\u0163el","year":"2024","unstructured":"Vi\u0163el, Silviu, Lupa\u015fcu, Marilena, Gavrilu\u0163, Drago\u015f Teodor., Luchian, Henri: Short-versus long-term performance of detection models for obfuscated msoffice-embedded malware. International Journal of Information Security 23(1), 271\u2013297 (2024)","journal-title":"International Journal of Information Security"},{"key":"1142_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111531","volume":"289","author":"Z Wang","year":"2024","unstructured":"Wang, Z., Zeng, K., Wang, J., Li, D.: Fagnet: Family-aware-based android malware analysis using graph neural network. Knowl.-Based Syst. 289, 111531 (2024)","journal-title":"Knowl.-Based Syst."},{"key":"1142_CR40","doi-asserted-by":"crossref","unstructured":"Yan, H., Zhang, J., Tang, Z., Long, H., Zhu, M., Zhang, T., Luo, L., Li, H.: Malware classification method based on feature fusion. Int. J. Inf. Secur. 24(2), 1\u201317 (2025)","DOI":"10.1007\/s10207-025-01013-3"},{"key":"1142_CR41","doi-asserted-by":"crossref","unstructured":"Zhang, D., Nayak, R., Bashar, M.d.\u00a0A.: Exploring fusion strategies in deep learning models for multi-modal classification. In: Australasian Conference on Data Mining, pages 102\u2013117. Springer, (2021)","DOI":"10.1007\/978-981-16-8531-6_8"},{"key":"1142_CR42","doi-asserted-by":"crossref","unstructured":"Zhang, J., Wang, X., Zhang, H., Sun, H., Wang, K., Liu, X.: A novel neural source code representation based on abstract syntax tree. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pages 783\u2013794. IEEE, (2019)","DOI":"10.1109\/ICSE.2019.00086"},{"key":"1142_CR43","doi-asserted-by":"crossref","unstructured":"Zheng, L., Zhang, D., Xie, X., Wang, C., Hou, B.: Detection approach of malicious javascript code based on deep learning. In: 2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA), volume\u00a03, pages 1075\u20131079. IEEE, (2023)","DOI":"10.1109\/ICIBA56860.2023.10165039"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01142-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01142-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01142-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T06:55:58Z","timestamp":1764572158000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01142-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":43,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["1142"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01142-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,11,12]]},"assertion":[{"value":"25 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"239"}}