{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T02:03:13Z","timestamp":1740103393151,"version":"3.37.3"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T00:00:00Z","timestamp":1728345600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T00:00:00Z","timestamp":1728345600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004837","name":"Spanish Ministry of Science and Innovation","doi-asserted-by":"publisher","award":["101093062"],"award-info":[{"award-number":["101093062"]}],"id":[{"id":"10.13039\/501100004837","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,8]]},"DOI":"10.1109\/dft63277.2024.10753555","type":"proceedings-article","created":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T18:56:38Z","timestamp":1732128998000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Malware Detection on Linux Using Runtime Opcode Tracing"],"prefix":"10.1109","author":[{"given":"Mart\u00ed","family":"Alonso","sequence":"first","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Catalunya - BarcelonaTech (UPC),Department of Computer Architecture,Barcelona,Spain"}]},{"given":"Juan Jos\u00e9","family":"Costa","sequence":"additional","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Catalunya - BarcelonaTech (UPC),Department of Computer Architecture,Barcelona,Spain"}]},{"given":"Enric","family":"Morancho","sequence":"additional","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Catalunya - BarcelonaTech (UPC),Department of Computer Architecture,Barcelona,Spain"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.4.24"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59439-2_4"},{"volume-title":"Design of the RISC-V Instruction Set Architecture","year":"2016","author":"Waterman","key":"ref4"},{"volume-title":"A Survey on RISC-V Security: Hardware and Architecture","year":"2021","author":"Lu","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3170479"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963012"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2018.00054"},{"volume-title":"VirusTotal.com","key":"ref9"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.future.2020.04.031","article-title":"Characterizing Linux-based Malware: Findings and Recent Trends","volume":"110","author":"Carrillo-Mond\u00e9jar","year":"2020","journal-title":"Future Generation Computer Systems"},{"volume-title":"U. of Michigan, Mibench version 1.0","year":"2024","key":"ref11"},{"volume-title":"Bzip2","year":"2024","key":"ref12"},{"volume-title":"Ffmpeg","year":"2024","key":"ref13"},{"volume-title":"Stream: Sustainable memory bandwidth in high performance computers","year":"2024","author":"McCalpin","key":"ref14"},{"volume-title":"Stress","key":"ref15"},{"volume-title":"VirusShare.com","key":"ref16"},{"volume-title":"Malware detection using op-codes and machine learning","year":"2024","author":"Alonso Garcia","key":"ref17"},{"volume-title":"QEMU","key":"ref18"},{"volume-title":"Capstone Engine","key":"ref19"},{"volume-title":"Introduction to data mining","year":"2005","author":"Pn","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0020166"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1995.598994"}],"event":{"name":"2024 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","start":{"date-parts":[[2024,10,8]]},"location":"Didcot, United Kingdom","end":{"date-parts":[[2024,10,10]]}},"container-title":["2024 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10753497\/10753498\/10753555.pdf?arnumber=10753555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T18:13:15Z","timestamp":1732731195000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10753555\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/dft63277.2024.10753555","relation":{},"subject":[],"published":{"date-parts":[[2024,10,8]]}}}