{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:26:42Z","timestamp":1770226002927,"version":"3.49.0"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"IITP South Korea","award":["2019-0-01601"],"award-info":[{"award-number":["2019-0-01601"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3030559","type":"journal-article","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T19:37:21Z","timestamp":1602617841000},"page":"191602-191616","source":"Crossref","is-referenced-by-count":5,"title":["Rethinking the Weakness of Stream Ciphers and Its Application to Encrypted Malware Detection"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2452-5544","authenticated-orcid":false,"given":"William","family":"Stone","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4297-3834","authenticated-orcid":false,"given":"Daeyoung","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1887-6396","authenticated-orcid":false,"given":"Victor Youdom","family":"Kemmoe","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9565-9523","authenticated-orcid":false,"given":"Mingon","family":"Kang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6206-083X","authenticated-orcid":false,"given":"Junggab","family":"Son","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","article-title":"Malware analysis-dark comet rat","author":"aylward","year":"2011"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14257\/astl.2014.64.14"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593240"},{"key":"ref31","first-page":"511","article-title":"When governments hack opponents: A look at actors and technology","author":"marczak","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp (USENIX Secur )"},{"key":"ref30","article-title":"How the FBI found miss teen USA&#x2019;s Webcam spy","author":"anderson","year":"2013"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/EWDTS.2019.8884472"},{"key":"ref36","article-title":"Discovering encrypted bot and ransomware payloads through memory inspection without a priori knowledge","author":"mclaren","year":"2019","journal-title":"arXiv 1907 11954"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12942-2_20"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMAPP.2017.8079775"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181962"},{"key":"ref11","article-title":"Algebraic attacks on stream ciphers","author":"armknecht","year":"2004","journal-title":"Proc ECCOMAS-Eur Congr Comput Methods Appl Sci Eng"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.03.010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927155"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2015.07.05"},{"key":"ref15","article-title":"A class of weak keys in the RC4 stream cipher","author":"roos","year":"1995"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45537-X_1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21518-6_5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9138-1"},{"key":"ref19","first-page":"97","article-title":"All your biases belong to us: Breaking RC4 in WPA-TKIP and TLS","author":"vanhoef","year":"2015","journal-title":"Proc Usenix Secur Symp"},{"key":"ref28","first-page":"116","article-title":"A comprehensive survey: Ransomware attacks prevention, monitoring and damage control","volume":"4","author":"tailor","year":"2017","journal-title":"International Journal of Innovative Research in Science"},{"key":"ref4","article-title":"A related-key cryptanalysis of RC4","author":"grosul","year":"2000"},{"key":"ref27","first-page":"802","article-title":"A survey on ransomeware: Evolution, growth, and impact","volume":"9","author":"sultan","year":"2018","journal-title":"Int J Adv Res Comput Sci"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1983.10010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"ref5","first-page":"152","article-title":"A practical attack on broadcast RC4","author":"mantin","year":"2001","journal-title":"Fast Software Encryption Third International Workshop Proceedings"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.48"},{"key":"ref7","author":"brim","year":"2002","journal-title":"Middleboxes Taxonomy and Issues"},{"key":"ref2","author":"verdult","year":"2015","journal-title":"introduction to cryptanalysis and attacking stream ciphers"},{"key":"ref9","year":"2012","journal-title":"DarkComet Analysis-Understanding the Trojan Used in Syrian Uprising"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685644"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0306-6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12087-4_7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2017.8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178272"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930717"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09222070.pdf?arnumber=9222070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T01:08:59Z","timestamp":1641949739000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9222070\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3030559","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}