{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T04:11:19Z","timestamp":1744949479714,"version":"3.40.4"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1109\/icstw64639.2025.10962511","type":"proceedings-article","created":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T17:47:42Z","timestamp":1744825662000},"page":"400-409","source":"Crossref","is-referenced-by-count":0,"title":["Structural Backdoor Attack on IoT Malware Detectors via Graph Explainability"],"prefix":"10.1109","author":[{"given":"Yu-Cheng","family":"Chiu","sequence":"first","affiliation":[{"name":"National Taiwan University of Science and Technology,Department of Computer Science and Information Engineering,Taipei,Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maina Bernard","family":"Mwangi","sequence":"additional","affiliation":[{"name":"National Taiwan University of Science and Technology,Department of Computer Science and Information Engineering,Taipei,Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shin-Ming","family":"Cheng","sequence":"additional","affiliation":[{"name":"National Taiwan University of Science and Technology,Department of Computer Science and Information Engineering,Taipei,Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hahn-Ming","family":"Lee","sequence":"additional","affiliation":[{"name":"National Taiwan University of Science and Technology,Department of Computer Science and Information Engineering,Taipei,Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3091427"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2020.04.005"},{"article-title":"Malware detection by eating a whole EXE","volume-title":"Proc. AAAI 2018","author":"Raff","key":"ref3"},{"article-title":"EMBER: An open dataset for training static PE malware machine learning models","year":"2018","author":"Anderson","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.3033974"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3435362"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00106"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2925929"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00084"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PST52912.2021.9647806"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06808-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103060"},{"key":"ref16","first-page":"1487","article-title":"Explanation-Guided backdoor poisoning attacks against malware classifiers","volume-title":"Proc. USENIX 2021","author":"Severi"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179347"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3513713"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2024.3482700"},{"key":"ref20","article-title":"Virustotal"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3367788"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3386058"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/554"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17140-6_22"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3468218.3469046"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3450569.3463560"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110389"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3094824"},{"article-title":"Executable and linking format (ELF) specification version 1.2","volume-title":"Tool Interface Standard (TIS)","year":"1995","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00028"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.04.001"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00028"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3409937"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0393-5"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3247344"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101300"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3403458"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2019.8905120"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23020"},{"article-title":"Efficient estimation of word representations in vector space","year":"2013","author":"Mikolov","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/DSC54232.2022.9888878"},{"key":"ref42","article-title":"GNNExplainer: Generating explanations for graph neural networks","volume-title":"Proc. NeurIPS 2019","volume":"32","author":"Ying"},{"key":"ref43","first-page":"12 241","article-title":"On explainability of graph neural networks via subgraph explorations","volume-title":"Proc. ICML 2021","volume":"139","author":"Yuan"},{"key":"ref44","first-page":"19 620","article-title":"Parameterized explainer for graph neural network","volume-title":"Proc. NeurIPS 2020","volume":"33","author":"Luo"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"year":"2024","key":"ref46","article-title":"Radare2 github repository"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.25080\/tcwv9851"}],"event":{"name":"2025 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","start":{"date-parts":[[2025,3,31]]},"location":"Naples, Italy","end":{"date-parts":[[2025,4,4]]}},"container-title":["2025 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10962452\/10962453\/10962511.pdf?arnumber=10962511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T05:27:09Z","timestamp":1744867629000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10962511\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/icstw64639.2025.10962511","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]}}}