{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:54:10Z","timestamp":1772042050465,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,12,9]],"date-time":"2016-12-09T00:00:00Z","timestamp":1481241600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s11227-016-1941-2","type":"journal-article","created":{"date-parts":[[2016,12,9]],"date-time":"2016-12-09T15:10:31Z","timestamp":1481296231000},"page":"607-622","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Binary executable file similarity calculation using function matching"],"prefix":"10.1007","volume":"75","author":[{"given":"TaeGuen","family":"Kim","sequence":"first","affiliation":[]},{"given":"Yeo Reum","family":"Lee","sequence":"additional","affiliation":[]},{"given":"BooJoong","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Eul Gyu","family":"Im","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,9]]},"reference":[{"key":"1941_CR1","unstructured":"Internet security threat report. \n                    https:\/\/resource.elq.symantec.com\/LP=2899\n                    \n                  . Accessed 31 Aug 2016"},{"key":"1941_CR2","unstructured":"Statista report. \n                    http:\/\/www.statista.com\/statistics\/203428\/totalenterprise-software-revenue-forecast\/\n                    \n                  . Accessed 31 Aug 2016"},{"issue":"1","key":"1941_CR3","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/s11227-013-0924-9","volume":"66","author":"K Slagter","year":"2016","unstructured":"Slagter K, Hsu CH, Chung YC, Zhang D (2016) An improved partitioning mechanism for optimizing massive data analysis using mapreduce. J Supercomput 66(1):539\u2013555","journal-title":"J Supercomput"},{"issue":"3","key":"1941_CR4","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1504\/IJBDI.2016.078399","volume":"3","author":"V Viswanathan","year":"2016","unstructured":"Viswanathan V (2016) Discovery of semantic associations in an rdf graph using bi-directional bfs on massively parallel hardware. Int J Big Data Intell 3(3):176\u2013181","journal-title":"Int J Big Data Intell"},{"issue":"3","key":"1941_CR5","doi-asserted-by":"publisher","first-page":"72","DOI":"10.4018\/IJGHPC.2016070105","volume":"8","author":"S Kunfang","year":"2016","unstructured":"Kunfang S, Lu H (2016) Efficient querying dristributed big-xml data using mapreduce. Int J Grid High Perform Comput 8(3):72\u201382","journal-title":"Int J Grid High Perform Comput"},{"key":"1941_CR6","unstructured":"Ahmadi M, Ulyanov D, Semenov S, Tromov M, Giacinto G (2016) Novel feature extraction, selection and fusion for effective malware family classication. In: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, ACM, pp 183\u2013194"},{"issue":"2","key":"1941_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCC.2015.2481378","volume":"3","author":"J Abawajy","year":"2015","unstructured":"Abawajy J, Chowdhury M, Kelarev A (2015) Hybrid consensus pruning of ensemble classfiers for big data malware detection. IEEE Trans Cloud Comput 3(2):1\u201311","journal-title":"IEEE Trans Cloud Comput"},{"key":"1941_CR8","unstructured":"Ida pro disassembler. \n                    http:\/\/www.datarescue.com\/idabase\n                    \n                  . Accessed 31 Aug 2016"},{"key":"1941_CR9","unstructured":"Pin user manual. \n                    http:\/\/rogue.colorado.edu\/\n                    \n                  . Accessed 31 Aug 2016"},{"issue":"7","key":"1941_CR10","first-page":"1","volume":"5","author":"FE Allen","year":"1970","unstructured":"Allen FE (1970) Control flow analysis. Proc Symp Compil Optim 5(7):1\u201319","journal-title":"Proc Symp Compil Optim"},{"key":"1941_CR11","unstructured":"Measure of software similarity. \n                    http:\/\/theory.stanford.edu\/aiken\/moss\/\n                    \n                  . Accessed 31 Aug 2016"},{"issue":"2","key":"1941_CR12","first-page":"161","volume":"48113","author":"WB Cavnar","year":"1994","unstructured":"Cavnar WB, Trenkle JM et al (1994) N-gram based text categorization. Ann Arbor MI 48113(2):161\u2013175","journal-title":"Ann Arbor MI"},{"issue":"4","key":"1941_CR13","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1109\/TDSC.2013.40","volume":"11","author":"S Cesare","year":"2014","unstructured":"Cesare S, Xiang Y, Zhou W (2014) Control flow-based malware variant detection. IEEE Trans Depend Secure Comput 11(4):307\u2013317","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"5","key":"1941_CR14","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.entcs.2009.09.040","volume":"238","author":"M Chilowicz","year":"2009","unstructured":"Chilowicz M, Duris E, Roussel G (2009) Finding similarities in source code through factorization. Electron Notes Theor Comput Sci 238(5):47\u201362","journal-title":"Electron Notes Theor Comput Sci"},{"key":"1941_CR15","unstructured":"Flake H (2004) Structural comparison of executable objects. In: Proceedings of the DIMVA, pp 161\u2013173"},{"key":"1941_CR16","unstructured":"Jaccard P (1901) Etude comparative de la distribution orale dans une portion des Alpes et du Jura. Impr, Corbaz"},{"key":"1941_CR17","doi-asserted-by":"crossref","unstructured":"Jang J, Brumley D, Venkataraman S (2011) Bitshred: feature hashing malware for scalable triage and semantic analysis. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, ACM, pp 309\u2013320","DOI":"10.1145\/2046707.2046742"},{"key":"1941_CR18","doi-asserted-by":"crossref","unstructured":"Kang B, Kim T, Kwon H, Choi Y, Im EG (2012) Malware classication method via binary content comparison. In: Proceedings of the 2012 ACM Research in Applied Computation Symposium, ACM, pp 316\u2013321","DOI":"10.1145\/2401603.2401672"},{"key":"1941_CR19","unstructured":"Kaufman L, Rousseeuw P (1987) Clustering by means of medoids. North-Holland Publishing Co, North-Holland"},{"issue":"4","key":"1941_CR20","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s11416-011-0151-y","volume":"7","author":"J Kinable","year":"2011","unstructured":"Kinable J, Kostakis O (2011) Malware classifcation based on call graph clustering. J Comput Virol 7(4):233\u2013245","journal-title":"J Comput Virol"},{"key":"1941_CR21","doi-asserted-by":"crossref","unstructured":"Lee YR, Kang B, Im EG (2013) Function matching based binary-level software similarity calculation. In: Proceedings of the 2013 Research in Adaptive and Convergent Systems, ACM, pp 322\u2013327","DOI":"10.1145\/2513228.2513300"},{"key":"1941_CR22","doi-asserted-by":"crossref","unstructured":"OKane, Sezer, McLaughlin, and Im] OKane P, Sezer S, McLaughlin K, Im EG, (2013) SVM training phase reduction using dataset feature filtering for malware detection. IEEE Trans Inf Forensics Secur 8(3):500\u2013509","DOI":"10.1109\/TIFS.2013.2242890"},{"key":"1941_CR23","unstructured":"Rad BB, Masrom M (2011) Metamorphic virus variants classifcation using opcode frequency histogram. arXiv preprint: \n                    arXiv:1104.3228"},{"key":"1941_CR24","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TSE.1979.234183","volume":"3","author":"BG Ryder","year":"1979","unstructured":"Ryder BG (1979) Constructing the call graph of a program. IEEE Trans Softw Eng 3:216\u2013226","journal-title":"IEEE Trans Softw Eng"},{"key":"1941_CR25","doi-asserted-by":"crossref","unstructured":"Santos I, Penya YK, Devesa J, Bringas PG (2009) N-grams-based file signatures for malware detection. Proc Int Conf Enterp Inf Syst (ICEIS) (2)9:317\u2013320","DOI":"10.5220\/0001863603170320"},{"key":"1941_CR26","doi-asserted-by":"crossref","unstructured":"Shang S, Zheng N, Xu J, Xu M, Zhang H (2010) Detecting malware variants via function-call graph similarity. In: Proceedings of 5th International Conference on the Malicious and Unwanted Software (MALWARE), IEEE, pp 113\u2013120","DOI":"10.1109\/MALWARE.2010.5665787"},{"key":"1941_CR27","unstructured":"Walenstein, Venable, Hayes, Thompson, and Lakhotia] Walenstein A, Venable M, Hayes M, Thompson C, Lakhotia A (2007) Exploiting similarity between variants to defeat malware. In: Proceedings of the BlackHat DC Conf"},{"key":"1941_CR28","unstructured":"Walters B (1999) Vmware virtual platform. Linux J 1999(63es):6"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-016-1941-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-016-1941-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-016-1941-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T06:34:39Z","timestamp":1551335679000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-016-1941-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,9]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["1941"],"URL":"https:\/\/doi.org\/10.1007\/s11227-016-1941-2","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,9]]},"assertion":[{"value":"9 December 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}