{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:29:31Z","timestamp":1725550171913},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/malware.2013.6703695","type":"proceedings-article","created":{"date-parts":[[2014,1,10]],"date-time":"2014-01-10T20:05:37Z","timestamp":1389384337000},"page":"132-141","source":"Crossref","is-referenced-by-count":3,"title":["Static malware detection with Segmented Sandboxing"],"prefix":"10.1109","author":[{"given":"Hongyuan","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Fernando C. Colon","family":"Osorio","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/MALWARE.2010.5665799"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1504\/IJESDF.2007.016865"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1145\/1179542.1179558"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/SCAM.2006.20"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/SP.2005.20"},{"key":"13","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/11790754_8","article-title":"Detecting self-mutating malware using control flow graph matching","author":"bruschi","year":"2006","journal-title":"Detection of Intrusions and Malware and Vulneability Assessment"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/MALWARE.2008.4690851"},{"year":"2002","author":"flake","journal-title":"Graph-based Binary Analysis","key":"11"},{"key":"12","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/11663812_11","article-title":"Polymorphic worm detection using structural information of executables","author":"kruegel","year":"2006","journal-title":"Proc Int Conf Recent Adv Intrusion Detection"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1007\/s11416-006-0028-7"},{"key":"3","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/978-3-642-04342-0_6","article-title":"Automatic generation of string signatures for malware detection","author":"griffin","year":"2009","journal-title":"Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection"},{"key":"20","first-page":"172","article-title":"Who wrote this code? Identifying the authors of program binaries","author":"rosenblum","year":"2011","journal-title":"Proceedings of the 16th European Conference on Research in Computer Security"},{"key":"2","article-title":"An undetectable computer virus","author":"chess","year":"2000","journal-title":"Proceedings of Virus Bulletin Conference"},{"key":"10","article-title":"Honeycomb-creating intrusion detection signatures using honeypots","author":"kreibich","year":"2003","journal-title":"Proceedings of the Second Workshop on Hot Topics in Networks (HotNets-II)"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1016\/0167-4048(87)90122-2"},{"key":"7","article-title":"Hunting for metamorphic","author":"szor","year":"2001","journal-title":"Symantec Corporation"},{"year":"0","journal-title":"Creating Signatures for ClamAV","key":"6"},{"year":"0","journal-title":"Avg Technologies Malware Detection Methods","key":"5"},{"year":"0","journal-title":"Bitdefender Antivirus Technology","key":"4"},{"key":"9","first-page":"271","article-title":"Autograph: Toward automated, distributed worm signature detection","author":"ah kim","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"year":"2013","author":"osorio","journal-title":"A Randomized Morph Engine for Anti-malware Experiement","key":"8"}],"event":{"name":"2013 8th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","start":{"date-parts":[[2013,10,22]]},"location":"Fajardo, PR","end":{"date-parts":[[2013,10,24]]}},"container-title":["2013 8th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6693154\/6703677\/06703695.pdf?arnumber=6703695","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T04:45:19Z","timestamp":1580705119000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6703695\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/malware.2013.6703695","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}