{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:54:39Z","timestamp":1729662879723,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883425","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T10:10:33Z","timestamp":1409739033000},"page":"847-852","source":"Crossref","is-referenced-by-count":1,"title":["Towards the automated detection of unknown malware on live systems"],"prefix":"10.1109","author":[{"given":"Gabor","family":"Pek","sequence":"first","affiliation":[]},{"given":"Levente","family":"Buttyan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Passmark Software","article-title":"Passmark performance test","year":"2014","key":"17"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.3390\/fi4040971"},{"journal-title":"Windwos Driver Kit","year":"2014","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.24"},{"journal-title":"Offensive Computing","year":"2012","key":"14"},{"key":"11","article-title":"A virtual machine introspection based architecture for intrusion detection","author":"garfinkel","year":"2003","journal-title":"NDSS"},{"journal-title":"AMD64 Architecture Programmer's Manual","year":"2011","key":"12"},{"journal-title":"Mcafee Deepsafe","year":"0","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"1","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1007\/978-3-642-25141-2_7","article-title":"Nitro: Hardware-based system call tracing for virtual machines","volume":"7038","author":"pfoh","year":"2011","journal-title":"Advances in Information and Computer Security Ser Lecture Notes in Computer Science"},{"journal-title":"Subverting Vista Kernel for Fun and Profit","year":"2006","author":"rutkowska","key":"10"},{"key":"7","first-page":"2","article-title":"A fistful of redpills: How to automatically generate procedures to detect cpu emulators","author":"paleari","year":"2009","journal-title":"Proceedings of the 3rd USENIX Conference on Offensive Technologies Ser WOOT'09"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972554"},{"key":"5","first-page":"97","article-title":"Automatic discovery of parasitic malware","author":"srivastava","year":"2010","journal-title":"RAID"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859085"},{"journal-title":"IsGameOver() Anyone","year":"2007","author":"rutkowska","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866353"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883425.pdf?arnumber=6883425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T15:50:20Z","timestamp":1498146620000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883425\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883425","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}