{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:52:29Z","timestamp":1771699949481,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/malware.2014.6999417","type":"proceedings-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T02:44:39Z","timestamp":1421721879000},"page":"68-75","source":"Crossref","is-referenced-by-count":6,"title":["CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model"],"prefix":"10.1109","author":[{"given":"Joshua","family":"Saxe","sequence":"first","affiliation":[]},{"given":"Rafael","family":"Turner","sequence":"additional","affiliation":[]},{"given":"Kristina","family":"Blokhin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529734"},{"key":"18","year":"0","journal-title":"Invincea"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339665"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2011.6083845"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37119-6_14"},{"key":"14","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.infsof.2006.10.017","article-title":"Semantic clustering: Identifying topics in source code","volume":"49","author":"kuhn","year":"2007","journal-title":"Inf Softw Technol"},{"key":"11","year":"0","journal-title":"MD Pro Malware Feed"},{"key":"12","author":"leder","year":"2013","journal-title":"RE-Google"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379695"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2013.55"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_20"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-4832-1451-1.50030-5"},{"key":"7","author":"alvarez","year":"2013","journal-title":"Yara"},{"key":"6","article-title":"Mining Web Technical Discussions to Identify Malware Capabilities (forthcoming)","author":"saxe","year":"2013","journal-title":"Distributed Computing Systems Workshops (ICDCS)"},{"key":"5","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/978-3-540-74320-0_10","article-title":"Automated classification and analysis of internet malware","author":"bailey","year":"2007","journal-title":"Recent Advances in Intrusion Detection"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0151-y"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.2307\/2529131"},{"key":"8","author":"gruber","year":"0","journal-title":"Markdown Syntax"}],"event":{"name":"2014 9th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","location":"Fajardo, PR, USA","start":{"date-parts":[[2014,10,28]]},"end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6987537\/6999400\/06999417.pdf?arnumber=6999417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T03:54:53Z","timestamp":1498190093000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6999417\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/malware.2014.6999417","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}