{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:03:15Z","timestamp":1725512595875},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/ccst.2011.6095879","type":"proceedings-article","created":{"date-parts":[[2011,12,15]],"date-time":"2011-12-15T22:02:53Z","timestamp":1323986573000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["A theoretical implementation of Blended Program Analysis for virus signature extraction"],"prefix":"10.1109","author":[{"given":"Vishrut","family":"Sharma","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"A Dose of Reality on Automated Static-Dynamic Hybrid Analysis","year":"0","key":"13"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024597010150"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_17"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1496653.1496655"},{"key":"2","first-page":"118","article-title":"Blended analysis for performance understanding of frameworkbased applications","author":"dufour","year":"2007","journal-title":"Proc ACM SIGSoft ISSTA 95"},{"journal-title":"Practical Malware Analysis","year":"0","author":"kendall","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.20"},{"key":"7","first-page":"178","article-title":"Automatic extraction of computer virus signatures","author":"kephart","year":"1994","journal-title":"Proceedings of the Virus Bulletin International Conference"},{"key":"6","first-page":"162","article-title":"A comparative analysis of various exact string-matching algorithms for virus signature detection","author":"kumar","year":"0","journal-title":"Proc of SC 2011"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/258915.258924"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/506315.506316"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1007\/11506881_11","article-title":"Detecting malicious code by model checking","author":"kinder","year":"2005","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"}],"event":{"name":"2011 International Carnahan Conference on Security Technology (ICCST 2011)","start":{"date-parts":[[2011,10,18]]},"location":"Barcelona","end":{"date-parts":[[2011,10,21]]}},"container-title":["2011 Carnahan Conference on Security Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6088023\/6095872\/06095879.pdf?arnumber=6095879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T11:02:42Z","timestamp":1585306962000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6095879\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ccst.2011.6095879","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}