{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:34:08Z","timestamp":1725672848578},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/malware.2013.6703684","type":"proceedings-article","created":{"date-parts":[[2014,1,10]],"date-time":"2014-01-10T15:05:37Z","timestamp":1389366337000},"page":"41-50","source":"Crossref","is-referenced-by-count":4,"title":["Synthesizing near-optimal malware specifications from suspicious behaviors"],"prefix":"10.1109","author":[{"given":"Somesh","family":"Jha","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Fredrikson","sequence":"additional","affiliation":[]},{"given":"Mihai","family":"Christodoresu","sequence":"additional","affiliation":[]},{"given":"Reiner","family":"Sailer","sequence":"additional","affiliation":[]},{"given":"Xifeng","family":"Yan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807261"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924296"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22438-6_20"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.20"},{"key":"16","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/978-3-540-70542-0_6","article-title":"Learning and classification of malware behavior","author":"rieck","year":"2008","journal-title":"Proceedings of the 5th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA'08) Springer"},{"journal-title":"3% to 5% of Enterprise Assets Are Compromised by Bot-driven Targeted Attack Malware","year":"2008","key":"13"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1145\/1315245.1315261","article-title":"Panorama: Capturing system-wide information flow for malware detection and analysis","author":"yin","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07)"},{"key":"11","article-title":"Top internet security suites: Paying for protection","author":"larkin","year":"2009","journal-title":"PC Magazine"},{"key":"12","article-title":"Effective and efficient malware detection at the end host","author":"kolbitsch","year":"2009","journal-title":"Proceedings of the 18th USENIX Security Symposium (Security'09)"},{"key":"21","article-title":"Digging for data structures","author":"cozzie","year":"2008","journal-title":"Proceedings of the 8th USENIX Symposium on OS Design and Implementation (OSDI'08)"},{"key":"20","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/978-3-540-74320-0_10","article-title":"Automated classification and analysis of internet malware","author":"bailey","year":"2007","journal-title":"Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07) Springer"},{"key":"22","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/978-3-540-73614-1_6","article-title":"Characterizing bots' remote control behavior","author":"stinson","year":"2007","journal-title":"Proceedings of the 4th GI International Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA'07)"},{"key":"23","first-page":"233","article-title":"Dynamic spyware analysis","author":"egele","year":"2007","journal-title":"Proceedings of the 2007 USENIX Annual Technical Conference (USENIX'07) USENIX"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503275"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273487"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368107"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287628"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-7798-3_15"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.54"},{"key":"3","first-page":"319","article-title":"Precise dynamic slicing algorithms","author":"zhang","year":"2003","journal-title":"Proceedings of the 25th International Conference on Software Engineering (ICSE '03) Washington DC USA IEEE Computer Society"},{"journal-title":"MSDN Library","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.17"},{"journal-title":"Security Bulletin 2012 the Overall Statistics for 2012","year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/288195.288273"},{"journal-title":"Markov Chains Gibbs Fields Monte Carlo Simulation and Queues","year":"2001","author":"bremaud","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.11"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1205178"},{"journal-title":"Symantec Security Response","year":"0","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/32.917524"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376662"},{"journal-title":"BitScope Automatically Dissecting Malicious Binaries","year":"2007","author":"brumley","key":"9"},{"journal-title":"SRI Honeynet and Malware Analysis","year":"0","key":"8"}],"event":{"name":"2013 8th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","start":{"date-parts":[[2013,10,22]]},"location":"Fajardo, PR, USA","end":{"date-parts":[[2013,10,24]]}},"container-title":["2013 8th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6693154\/6703677\/06703684.pdf?arnumber=6703684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:50:23Z","timestamp":1498096223000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6703684\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/malware.2013.6703684","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}