{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:56:55Z","timestamp":1770220615866,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/malware.2015.7413682","type":"proceedings-article","created":{"date-parts":[[2016,2,26]],"date-time":"2016-02-26T11:26:08Z","timestamp":1456485968000},"page":"31-39","source":"Crossref","is-referenced-by-count":19,"title":["Variant: a malware similarity testing framework"],"prefix":"10.1109","author":[{"given":"Jason","family":"Upchurch","sequence":"first","affiliation":[]},{"given":"Xiaobo","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Scalable, behavior-based malware clustering","author":"bayer","year":"2009","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"ref11","article-title":"Virus total","year":"2015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.06.006"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WKDD.2008.80"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35515-8_12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15506-2_15"},{"key":"ref16","first-page":"28","article-title":"Bitshred: Fast, scalable code reuse detection in binary code (cmu-cylab-10&#x2013;006)","author":"jang","year":"2009","journal-title":"CyLab"},{"key":"ref17","article-title":"Bitshred: Fast, scalable malware triage","author":"jang","year":"2010","journal-title":"Technical Report CMU-Cylab-10&#x2013;022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572287"},{"key":"ref19","article-title":"Ida pro disassembler","year":"0","journal-title":"Hex-Rays"},{"key":"ref4","article-title":"Automated malware similarity analysis","author":"raygoza","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2013.6703680"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2013.9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2012.6320445"},{"key":"ref7","article-title":"Security and implementation analysis of the similarity digest sdhash","author":"breitinger","year":"2012","journal-title":"First International Baltic Conference on Network Security &amp Forensics (NeSeFo)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2013.6703687"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046742"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.015"}],"event":{"name":"2015 10th International Conference on Malicious and Unwanted Software (MALWARE)","location":"Fajardo, PR, USA","start":{"date-parts":[[2015,10,20]]},"end":{"date-parts":[[2015,10,22]]}},"container-title":["2015 10th International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7405773\/7413673\/07413682.pdf?arnumber=7413682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T09:27:39Z","timestamp":1490088459000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7413682\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/malware.2015.7413682","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}