{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T20:37:44Z","timestamp":1768250264686,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/malware.2015.7413686","type":"proceedings-article","created":{"date-parts":[[2016,2,26]],"date-time":"2016-02-26T16:26:08Z","timestamp":1456503968000},"page":"69-73","source":"Crossref","is-referenced-by-count":2,"title":["Sandboxing and reasoning on malware infection trees"],"prefix":"10.1109","author":[{"given":"Krishnendu","family":"Ghosh","sequence":"first","affiliation":[]},{"given":"Jose Andre","family":"Morales","sequence":"additional","affiliation":[]},{"given":"William","family":"Casey","sequence":"additional","affiliation":[]},{"given":"Bud","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"351","article-title":"Effective and efficient malware detection at the end host","author":"kolbitsch","year":"2009","journal-title":"USENIX Security Symposium"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_47"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2003.1210075"},{"key":"ref13","year":"2010","journal-title":"Science of Cyber-Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0101-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2011.6112326"},{"key":"ref16","author":"parker","year":"2002","journal-title":"Implementation of Symbolic Model Checking for Probabilistic Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"273","DOI":"10.3233\/JCS-2007-15203","article-title":"Prevention of information attacks by run-time detection of self-replication in computer codes","volume":"15","author":"skormin","year":"2007","journal-title":"Journal of Computer Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544924"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36481-1_13"},{"key":"ref3","volume":"26202649","author":"baler","year":"2008","journal-title":"Principles of Model Checking"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-12896-4_358"},{"key":"ref5","author":"clarke","year":"1999","journal-title":"Orna Grumberg and Doron Peled Model Checking"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2007.58"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/BF01211866"},{"key":"ref2","first-page":"155","article-title":"It usually works: The temporal logic of stochastic systems","author":"adnan","year":"1995","journal-title":"Computer Aided Verification"},{"key":"ref1","article-title":"Simulating large biochemical and biological processes and reasoning about their behaviour","author":"antoniotti","year":"2003","journal-title":"Third International Conference on Systems Biology (ICSB)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139207799"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1755952.1755987"}],"event":{"name":"2015 10th International Conference on Malicious and Unwanted Software (MALWARE)","location":"Fajardo, PR, USA","start":{"date-parts":[[2015,10,20]]},"end":{"date-parts":[[2015,10,22]]}},"container-title":["2015 10th International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7405773\/7413673\/07413686.pdf?arnumber=7413686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T07:03:47Z","timestamp":1498287827000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7413686\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/malware.2015.7413686","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}