{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:14:22Z","timestamp":1766564062734,"version":"3.48.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,6]]},"DOI":"10.1109\/isc266238.2025.11293337","type":"proceedings-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T18:28:12Z","timestamp":1766514492000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["MAD-Agent: A Malware Analysis and Detection AI Agent"],"prefix":"10.1109","author":[{"given":"Georgios","family":"Xenos","sequence":"first","affiliation":[{"name":"Computer Technology Institute and Press DIOPHANTUS, University of Patras,Patras,Greece"}]},{"given":"Emmanouil","family":"Tzagakis","sequence":"additional","affiliation":[{"name":"Computer Technology Institute and Press DIOPHANTUS, University of Patras,Patras,Greece"}]},{"given":"Sotirios","family":"Giannopoulos","sequence":"additional","affiliation":[{"name":"Computer Technology Institute and Press DIOPHANTUS, University of Patras,Patras,Greece"}]},{"given":"Dimitrios","family":"Serpanos","sequence":"additional","affiliation":[{"name":"Computer Technology Institute and Press DIOPHANTUS, University of Patras,Patras,Greece"}]}],"member":"263","reference":[{"volume-title":"Large Language Model (LLM) for Software Security: Code Analysis, Malware Analysis, Reverse Engineering","year":"2025","author":"Jelodar","key":"ref1"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1109\/ACSAC.2007.21","article-title":"Limits of Static Analysis for Malware Detection","volume-title":"Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)","author":"Moser","year":"2007"},{"issue":"7","key":"ref3","first-page":"2980","article-title":"Sisyfos: A Modular and Extendable Open Malware Analysis Platform","volume-title":"Applied Sciences","volume":"11","author":"Serpanos","year":"2021"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1109\/DSN64029.2025.00072","volume-title":"Automatically Generating Rules of Malicious Software Packages via Large Language Model","author":"Zhang","year":"2025"},{"key":"ref5","first-page":"40158","article-title":"MAD-CTI: Cyber Threat Intelligence Analysis of the Dark Web Using a Multi-Agent Framework","volume-title":"IEEE Access","volume":"13","author":"Shah","year":"2025"},{"key":"ref6","first-page":"347","article-title":"LLM-MalDetect: A Large Language Model-Based Method for Android Malware Detection","volume-title":"IEEE Access","volume":"13","author":"Feng","year":"2025"},{"volume-title":"Feasibility Study for Supporting Static Malware Analysis Using LLM","year":"2024","author":"Fujii","key":"ref7"},{"volume-title":"Malware analysis assisted by AI with R2AI","year":"2025","author":"Apvrille","key":"ref8"},{"volume-title":"CTI-HAL: A Human-Annotated Dataset for Cyber Threat Intelligence Analysis","year":"2025","author":"Della Penna","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484759"},{"volume-title":"MITRE ATT&CK.","key":"ref11"},{"volume-title":"LLM With Tools: A Survey","year":"2024","author":"Shen","key":"ref12"},{"volume-title":"mandiant\/flare-floss","year":"2025","key":"ref13"},{"volume-title":"mandiant\/capa: The FLARE team\u2019s open-source tool to identify capabilities in executable files.","key":"ref14"},{"volume-title":"VirusTotal.","key":"ref15"},{"volume-title":"emeryray2002\/virustotal-mcp","year":"2025","author":"Ray","key":"ref16"},{"volume-title":"Free Automated Malware Analysis Service - powered by Falcon Sandbox.","key":"ref17"},{"volume-title":"stoyky\/mitre-attack-mcp","year":"2025","key":"ref18"},{"volume-title":"Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions","year":"2025","author":"Hou","key":"ref19"},{"volume-title":"Introducing the Model Context Protocol.","key":"ref20"},{"volume-title":"langchain-ai\/langgraph: Build resilient language agents as graphs.","key":"ref21"},{"volume-title":"ReAct: Synergizing Reasoning and Acting in Language Models","year":"2022","author":"Yao","key":"ref22"},{"volume-title":"Gemini 2.5: Pushing the Frontier with Advanced Reasoning, Multimodality, Long Context, and Next Generation Agentic Capabilities","year":"2025","author":"C.","key":"ref23"},{"volume-title":"CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence","year":"2024","author":"Alam","key":"ref24"},{"volume-title":"A Survey on LLM-as-a-Judge","year":"2024","author":"Gu","key":"ref25"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1145\/3711896.3737431","volume-title":"EMBER2024 - A Benchmark Dataset for Holistic Evaluation of Malware Classifiers","author":"Joyce","year":"2025"},{"volume-title":"SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection","year":"2020","author":"Harang","key":"ref27"},{"volume-title":"MOTIF: A Large Malware Reference Dataset with Ground Truth Family Labels","year":"2021","author":"Joyce","key":"ref28"}],"event":{"name":"2025 IEEE International Smart Cities Conference (ISC2)","start":{"date-parts":[[2025,10,6]]},"location":"Patras, Greece","end":{"date-parts":[[2025,10,9]]}},"container-title":["2025 IEEE International Smart Cities Conference (ISC2)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11293139\/11293247\/11293337.pdf?arnumber=11293337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T06:50:25Z","timestamp":1766559025000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11293337\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/isc266238.2025.11293337","relation":{},"subject":[],"published":{"date-parts":[[2025,10,6]]}}}