{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:06:17Z","timestamp":1773194777746,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsacw69556.2025.00049","type":"proceedings-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:56:13Z","timestamp":1773086173000},"page":"397-404","source":"Crossref","is-referenced-by-count":0,"title":["SCORE: Syntactic Code Representations for Static Script Malware Detection"],"prefix":"10.1109","author":[{"given":"Ecenaz","family":"Erdemir","sequence":"first","affiliation":[{"name":"Amazon Web Services,New York,NY,USA"}]},{"given":"Kyuhong","family":"Park","sequence":"additional","affiliation":[{"name":"Amazon Web Services,New York,NY,USA"}]},{"given":"Yi","family":"Fan","sequence":"additional","affiliation":[{"name":"Amazon Web Services,New York,NY,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Legion: an aws credential harvester and smtp hijacker","author":"Muir","year":"2023"},{"key":"ref2","article-title":"Dissecting alienfox: The cloud spammer\u2019s swiss army knife","author":"Delamotte","year":"2023"},{"key":"ref3","article-title":"The third annual study on the state of endpoint security risk","year":"2020"},{"key":"ref4","article-title":"Using ai to detect malicious documents and scripts","year":"2024"},{"key":"ref5","article-title":"New python-based snake info stealer malware targeting cloud services","author":"Lakshmanan","year":"2024"},{"key":"ref6","article-title":"Outlaw hacking group\u2019s botnet observed spreading miner, perl-based backdoor","author":"Huang","year":"2019"},{"key":"ref7","article-title":"Malicious shell script steals cloud credentials","author":"Jennings","year":"2021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.21236\/ada449067"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.482"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527915"},{"key":"ref12","article-title":"Learning to map source code to software vulnerability using code-as-a-graph","author":"Suneja","year":"2020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.728"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICAwST.2019.8923568"},{"key":"ref16","first-page":"268","article-title":"Malware detection by eating a whole EXE","volume-title":"The Workshops of the The Thirty-Second AAAI Conf. on AI, New Orleans, Louisiana, USA, February 2-7, 2018, volume WS-18 of AAAI Technical Report","author":"Raff"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i11.17131"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref19","article-title":"Threat actor continues to plague the open-source ecosystem with sophisticated info-stealing malware","author":"Gelb","year":"2023"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3600162"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00052"},{"key":"ref22","article-title":"Tree-sitter: a new parsing system for programming tools","year":"2017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1527\/tjsai.D-I23"},{"key":"ref24","first-page":"4189","article-title":"Recurrent highway networks","volume-title":"Proceedings of the 34th Int. Conf. on Machine Learning, volume 70 of Proceedings of Machine Learning Research","author":"Zilly"},{"key":"ref25","first-page":"3835","article-title":"Graph matching networks for learning the similarity of graph structured objects","volume-title":"Proceedings of the Int. Conf. on Machine Learning","author":"Yujia"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC.2014.39"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020870"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_14"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62582-5_16"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3503047.3503081"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557533"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.005"},{"key":"ref33","article-title":"Towards building an intelligent anti-malware system: A deep learning approach using support vector machine (svm) for malware classification","author":"Agarap","year":"2017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427261"}],"event":{"name":"2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,9]]}},"container-title":["2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11417955\/11417996\/11418042.pdf?arnumber=11418042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:28:42Z","timestamp":1773120522000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11418042\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/acsacw69556.2025.00049","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}