{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T20:06:23Z","timestamp":1778789183527,"version":"3.51.4"},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"To be provided later"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3513713","type":"journal-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T19:02:37Z","timestamp":1733770957000},"page":"1-1","source":"Crossref","is-referenced-by-count":7,"title":["An Adversarial Attack on ML-Based IoT Malware Detection Using Binary Diversification Techniques"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7576-692X","authenticated-orcid":false,"given":"Maina Bernard","family":"Mwangi","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9796-0643","authenticated-orcid":false,"given":"Shin-Ming","family":"Cheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00106"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3324053"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101300"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3244656"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3409937"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109139"},{"key":"ref7","first-page":"1","article-title":"Malware detection by eating a whole EXE","volume-title":"Proc. AAAI","author":"Raff"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103060"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2925929"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PST52912.2021.9647806"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2020.04.005"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533500"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00130"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34980-6_30"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3298663"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3586209.3591401"},{"key":"ref17","article-title":"ML-based IoT malware detection under adversarial settings: A systematic evaluation","author":"Abusnaina","year":"2021","journal-title":"arXiv:2108.13373"},{"key":"ref18","article-title":"COPYCAT: Practical adversarial attacks on visualization-based malware detection","author":"Khormali","year":"2019","journal-title":"arXiv:1909.09735"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCE52056.2021.9514255"},{"key":"ref20","first-page":"4768","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Lundberg"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3379530"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3403458"},{"key":"ref23","volume-title":"VirusTotal","year":"2024"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3091427"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.3033974"},{"key":"ref26","article-title":"EMBER: An open dataset for training static PE malware machine learning models","author":"Anderson","year":"2018","journal-title":"arXiv:1804.04637"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0393-5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3247344"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3435362"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.04.001"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00028"},{"key":"ref32","article-title":"Deceiving end-to-end deep learning malware detectors using adversarial examples","author":"Kreuk","year":"2018","journal-title":"arXiv:1802.04528"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00015"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3411508.3421374"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00020"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00210"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329073"},{"key":"ref38","article-title":"Explaining vulnerabilities of deep learning to adversarial malware binaries","author":"Demetrio","year":"2019","journal-title":"arXiv:1901.03583"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553214"},{"key":"ref40","article-title":"Intra-section code cave injection for adversarial evasion attacks on windows PE malware file","author":"Aryal","year":"2024","journal-title":"arXiv:2403.06428"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3473039"},{"key":"ref42","article-title":"Malware makeover: Breaking ML-based static analysis by modifying executable bytes","author":"Lucas","year":"2019","journal-title":"arXiv:1912.09064"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485387"},{"key":"ref44","article-title":"Generating adversarial malware examples for black-box attacks based on GAN","author":"Hu","year":"2017","journal-title":"arXiv:1702.05983"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC.2019.8669079"},{"key":"ref46","first-page":"1","article-title":"Black-box attacks against RNN based malware detection algorithms","volume-title":"Proc. 32nd AAAI Workshops","author":"Hu"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_23"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427230"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3153844"},{"key":"ref50","first-page":"1","article-title":"Evading machine learning malware detection","volume-title":"Proc. Black Hat","author":"Anderson"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3290480.3290494"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2932228"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00040"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CEC48606.2020.9185810"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/INFOMAN.2019.8714698"},{"key":"ref56","first-page":"2536","article-title":"Black-box adversarial attacks against deep learning-based malware binaries detection with GAN","volume-title":"Proc. ECAI","author":"Yuan"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3236901"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453086"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3313391"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103676"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908033"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1575\/1\/012011"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913439"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2854065.2854082"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3041655"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"ref69","volume-title":"Radare2 Github Repository","author":"Team","year":"2024"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.25080\/tcwv9851"},{"key":"ref71","first-page":"627","article-title":"Reassembleable disassembling","volume-title":"Proc. USENIX Secur.","author":"Wang"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/6514899\/10786223.pdf?arnumber=10786223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T06:30:07Z","timestamp":1734157807000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10786223\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":71,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3513713","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}