{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T11:30:25Z","timestamp":1766748625139,"version":"3.28.0"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,18]]},"DOI":"10.1109\/ijcnn52387.2021.9534115","type":"proceedings-article","created":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T20:40:52Z","timestamp":1632256852000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["An Effective Approach for Malware Detection and Explanation via Deep Learning Analysis"],"prefix":"10.1109","author":[{"given":"Huozhu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ziyuan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zhongkai","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Yusi","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Meng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Tensorflow: a system for large-scale machine learning","author":"abadi","year":"0","journal-title":"OSDI"},{"journal-title":"Keras","year":"0","author":"chollet","key":"ref38"},{"journal-title":"Angr","year":"0","key":"ref33"},{"key":"ref32","article-title":"QEMU, a Fast and Portable Dynamic Translator","author":"bellard","year":"0","journal-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference"},{"journal-title":"Vxheavens","year":"0","key":"ref31"},{"journal-title":"VirusShare","year":"0","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-5221"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref35","first-page":"1724","article-title":"Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation","author":"kyunghyun","year":"0","journal-title":"EMNLP"},{"journal-title":"Linux 64-bit system call numbers and entry vectors","year":"0","key":"ref34"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465828"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7926977"},{"journal-title":"Pin 3 7 User Guide","year":"0","key":"ref29"},{"key":"ref2","first-page":"95","article-title":"A Large-Scale Analysis of the Security of Embedded Firmwares","author":"costin","year":"2014","journal-title":"Proceedings of the 23rd USENIX Security Symposium"},{"key":"ref1","first-page":"1183","article-title":"Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation","author":"yuan","year":"2020","journal-title":"29th USENIX Security Symposium USENIX Security 2020"},{"key":"ref20","first-page":"3145","article-title":"Learning important features through propagating activation differences","author":"shrikumar","year":"0","journal-title":"ICML"},{"key":"ref22","first-page":"818","article-title":"Visualizing and understanding convolutional networks","author":"zeiler","year":"0","journal-title":"ECCV 2014"},{"key":"ref21","first-page":"4765","article-title":"A unified approach to interpreting model predictions","author":"lundberg","year":"0","journal-title":"NIPS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"ref25","first-page":"3319","article-title":"Axiomatic Attribution for Deep Networks","volume":"70","author":"sundararajan","year":"2017","journal-title":"Proceedings of the 34th International Conference on Machine Learning ICML 2017"},{"journal-title":"Valgrind Documentation","year":"0","key":"ref50"},{"journal-title":"PowerPC system call table","year":"0","key":"ref51"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2540634"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22744-9_17"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852066"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6282"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.04.007"},{"key":"ref11","first-page":"82","article-title":"Malware detection in the cloud under ensemble empirical model decomposition","author":"marnerides","year":"0","journal-title":"Proc 6th IEEE Int Conf Netw Comput"},{"key":"ref40","article-title":"IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies","author":"costin","year":"2018","journal-title":"BlackHat"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813642"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"ref15","first-page":"7","article-title":"A fistful of red-pills: How to automatically generate procedures to detect CPU emulators","author":"paleari","year":"0","journal-title":"WOOT'09 Proceedings of the 3rd USENIX Workshop on Offensive Technologies"},{"key":"ref16","first-page":"287","article-title":"BareCloud: Bare-metal Analysis-based Evasive Malware Detection","author":"kirat","year":"2014","journal-title":"Proceedings of the 23rd USENIX Security Symposium"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056070"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2945767"},{"key":"ref19","first-page":"3319","article-title":"Axiomatic attribution for deep networks","author":"sundararajan","year":"0","journal-title":"ICML"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134099"},{"journal-title":"AV - Test The Independent IT- Security Institute","year":"0","key":"ref3"},{"key":"ref6","first-page":"11","article-title":"Superman Powered by Kryptonite: Turn the Adversarial Attack into Your Defense Weapon","author":"ying","year":"2020","journal-title":"BlackHat"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3150376.3150378"},{"key":"ref8","first-page":"11","article-title":"Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers","author":"alasmary","year":"0","journal-title":"ICDCS"},{"key":"ref7","article-title":"Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning","volume":"abs 1801 8917","author":"anderson","year":"2018","journal-title":"CoRR"},{"journal-title":"Strace(1)&#x2014;Linux Manual Page","year":"0","key":"ref49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101760"},{"journal-title":"VirusTotal","year":"0","key":"ref46"},{"journal-title":"MIPS system call table","year":"0","key":"ref45"},{"key":"ref48","first-page":"48","article-title":"The Unix Philosophy in One Lesson","author":"raymond","year":"2009","journal-title":"The Art of Unix Programming"},{"key":"ref47","first-page":"94","author":"o'neill","year":"2016","journal-title":"Learning Linux binary analysis uncover the secrets of Linux binary analysis with this handy guide"},{"journal-title":"Dynamorio","year":"0","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"journal-title":"ARM system call table","year":"0","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2013.6731344"}],"event":{"name":"2021 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2021,7,18]]},"location":"Shenzhen, China","end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9533266\/9533267\/09534115.pdf?arnumber=9534115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:45:57Z","timestamp":1652197557000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9534115\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9534115","relation":{},"subject":[],"published":{"date-parts":[[2021,7,18]]}}}