{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T06:25:22Z","timestamp":1725690322064},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/icc.2011.5963469","type":"proceedings-article","created":{"date-parts":[[2011,8,3]],"date-time":"2011-08-03T21:44:20Z","timestamp":1312407860000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Towards Efficient Analysis for Malware in the Wild"],"prefix":"10.1109","author":[{"given":"Makoto","family":"Iwamura","sequence":"first","affiliation":[]},{"given":"Mitsutaka","family":"Itoh","sequence":"additional","affiliation":[]},{"given":"Yoichi","family":"Muraoka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPIRE.2001.989737"},{"journal-title":"Intel 64 and IA-32 architectures software developer's manual","year":"0","key":"ref11"},{"key":"ref12","first-page":"275","article-title":"Binary obfuscation using signals","author":"popov","year":"2007","journal-title":"Proc 16th USENIX Security Symp"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173063"},{"year":"0","key":"ref14"},{"journal-title":"Covert Debugging Circumventing Software Armoring Techniques","year":"2007","author":"quist","key":"ref15"},{"year":"0","key":"ref16","article-title":"VMware: Virtualization via Hypervisor, Virtual Machine & Server Consolidation - VMware"},{"year":"0","key":"ref17","article-title":"Tron: He Fights for the User Alan Bradley"},{"key":"ref18","first-page":"98","article-title":"A Study of the Packer Problem and Its Solutions","author":"guo","year":"2008","journal-title":"RAID 2008"},{"journal-title":"Tree of life","year":"0","author":"hillis","key":"ref19"},{"key":"ref4","first-page":"178","article-title":"Automated classification and analysis of internet malware","author":"bailey","year":"2007","journal-title":"RAID 2007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.48"},{"key":"ref6","first-page":"294","article-title":"An automated virus classification system","author":"gheorghescu","year":"2005","journal-title":"Proc Virus Bulletin Conf"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-005-0002-9"},{"key":"ref8","first-page":"187","article-title":"Digital Genome Mapping - Advanced Binary Malware Analysis","author":"carrera","year":"2004","journal-title":"Proc Virus Bulletin Conf"},{"key":"ref7","first-page":"225","article-title":"Static CFG analyzer for metamorphic Malware code","author":"vinod","year":"2009","journal-title":"SIN 2009"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1145\/1315245.1315312","article-title":"On the infeasibility of modeling polymorphic shellcode","author":"song","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"journal-title":"Automated Unpacking and Malware Classification","year":"2007","author":"flake","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/321796.321811"}],"event":{"name":"ICC 2011 - 2011 IEEE International Conference on Communications","start":{"date-parts":[[2011,6,5]]},"location":"Kyoto, Japan","end":{"date-parts":[[2011,6,9]]}},"container-title":["2011 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5962386\/5962409\/05963469.pdf?arnumber=5963469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T00:12:15Z","timestamp":1497917535000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5963469\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icc.2011.5963469","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}