{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:37:24Z","timestamp":1772933844077,"version":"3.50.1"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11401016","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"7814-7824","source":"Crossref","is-referenced-by-count":0,"title":["MASCOT: Analyzing Malware Evolution Through a Well-Curated Source Code Dataset"],"prefix":"10.1109","author":[{"given":"Bojing","family":"Li","sequence":"first","affiliation":[{"name":"Department of Computer Science and Electrical Engineering,Baltimore,Maryland,USA"}]},{"given":"Duo","family":"Zhong","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering,Baltimore,Maryland,USA"}]},{"given":"Dharani","family":"Nadendla","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering,Baltimore,Maryland,USA"}]},{"given":"Gabriel","family":"Terceros","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering,Baltimore,Maryland,USA"}]},{"given":"Prajna","family":"Bhandary","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering,Baltimore,Maryland,USA"}]},{"given":"Raguvir","family":"S","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering,Baltimore,Maryland,USA"}]},{"given":"Charles","family":"Nicholas","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering,Baltimore,Maryland,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2885512"},{"key":"ref2","article-title":"Av-atlas malware portal","year":"2025","journal-title":"AV-Atlas"},{"key":"ref3","article-title":"+65 malware statistics for 2025","author":"Smith","year":"2025","journal-title":"2024"},{"key":"ref4","first-page":"149","article-title":"\\{SourceFinder\\}: Finding malware \\{SourceCode\\} from publicly available repositories in \\{GitHub\\}","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)","author":"Rokon","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36708-4_63"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427256"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3652144"},{"key":"ref8","volume-title":"Vx-underground","year":"2025"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.012"},{"key":"ref10","volume-title":"20 most popular programming languages in 2025","author":"Mojahar","year":"2025"},{"key":"ref11","article-title":"Virustotal homepage","year":"2025","journal-title":"VirusTotal"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427261"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3701716.3715212"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010193"},{"key":"ref15","volume-title":"Trojan source: Hiding malicious code in plain sight","author":"Stockley","year":"2021"},{"key":"ref16","article-title":"27% of all malware variants in history were created in 2015","author":"Korolov","year":"2025","journal-title":"2016"},{"key":"ref17","volume-title":"Common weakness enumeration","author":"Contributors","year":"2025"},{"key":"ref18","volume-title":"Emocrash: Exploiting a vulnerability in emotet malware for defense","author":"Quinn","year":"2020"},{"key":"ref19","volume-title":"Security guru gives hackers a taste of their own medicine","author":"Singel","year":"2008"},{"key":"ref20","article-title":"System call","year":"2025","journal-title":"W. contributors"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50127-7_11"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336768"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5104-0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357374"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/659101"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598054"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102686"},{"key":"ref28","volume-title":"Cppcheck: A tool for static c\/c++ code analysis","author":"Marjam\u00e4ki","year":"2025"},{"key":"ref29","volume-title":"Windows system call tables","author":"Jurczyk","year":"2025"},{"key":"ref30","article-title":"xlang: Tooling to enable windows app development across multiple languages","year":"2025","journal-title":"Microsoft"},{"key":"ref31","article-title":"win32metadata: Tooling to generate metadata for win32 apis in the windows sdk","year":"2025","journal-title":"Microsoft"},{"key":"ref32","article-title":"Microsoft.windows.sdk.win32metadata","year":"2024","journal-title":"Microsoft"},{"key":"ref33","volume-title":"Ntqueryinformationprocess","author":"Behling","year":"2025"},{"key":"ref34","volume-title":"Targeted ransomware: Proliferating menace threatens organizations","year":"2019"},{"key":"ref35","volume-title":"Ntprotectvirtualmemory","author":"Behling","year":"2025"},{"key":"ref36","article-title":"Ntraiseharderror-example","year":"2024","journal-title":"AgnivaMaity"},{"key":"ref37","article-title":"How does the windows bsod program work?","year":"2022","journal-title":"XiPingTing"},{"key":"ref38","volume-title":"Ntraiseharderror-ntdoc","author":"Nowak","year":"2025"},{"key":"ref39","volume-title":"Code injection via undocumented use of ntallocatevirtualmemory","year":"2025"},{"key":"ref40","volume-title":"Ntwritevirtualmemory","author":"Behling","year":"2025"},{"key":"ref41","article-title":"Anti-debugging techniques","year":"2025","journal-title":"Oscar404"},{"key":"ref42","volume-title":"Ntunmapviewofsection: Wipe, replace & execute","author":"Behling","year":"2025"},{"key":"ref43","article-title":"Integrity protection driver (ipd) ntcreatesymboliclinkobject subst command symlink attack","year":"2003","journal-title":"I. X.-F. Exchange"},{"key":"ref44","article-title":"Sleep function","year":"2021","journal-title":"MalAPI.io"},{"key":"ref45","article-title":"Malware av\/vm evasion-part 16: Winapi getprocaddress implementation. simple c++ example","year":"2023","journal-title":"cocomelonc"},{"key":"ref46","article-title":"Malapi.io, a mapping of windows apis to malwarerelated techniques","year":"2021","journal-title":"mrd0x"},{"key":"ref47","volume-title":"Common anti-debugging techniques in the malware landscape","author":"Guttman","year":"2017"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1002\/9780470689646.ch1"},{"key":"ref49","volume-title":"spacy: Industrial-strength natural language processing in python","author":"Company","year":"2024"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3115\/1225403.1225421"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"ref52","volume-title":"Mascot: Malware source code open treasury","author":"Li","year":"2025"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11401016.pdf?arnumber=11401016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:53:22Z","timestamp":1772866402000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11401016\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11401016","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}