{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T15:29:27Z","timestamp":1773761367806,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/tc.2012.65","type":"journal-article","created":{"date-parts":[[2012,3,19]],"date-time":"2012-03-19T20:24:49Z","timestamp":1332188689000},"page":"1193-1206","source":"Crossref","is-referenced-by-count":82,"title":["Malwise\u2014An Effective and Efficient Classification System for Packed and Polymorphic Malware"],"prefix":"10.1109","volume":"62","author":[{"given":"Silvio","family":"Cesare","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Wanlei","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","article-title":"Symantec Internet Security Threat Report: Volume XII"},{"key":"ref2","article-title":"F-Secure Reports Amount of Malware Grew by 100 Percent during 2007","year":"2007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_6"},{"key":"ref4","first-page":"178","article-title":"Automatic Extraction of Computer Virus Signatures","volume-title":"Proc. Int\u2019l Conf. Fourth Virus Bull.","author":"Kephart"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-005-0002-9"},{"key":"ref7","first-page":"294","article-title":"An Automated Virus Classification System","volume-title":"Proc. Virus Bull. Conf.","author":"Gheorghescu"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281308"},{"key":"ref9","first-page":"187","article-title":"Digital Genome Mapping-Advanced Binary Malware Analysis","volume-title":"Proc. Virus Bull. Conf.","author":"Carrera"},{"key":"ref10","article-title":"Graph-Based Comparison of Executable Objects (English Version)","volume-title":"Proc. SSTIC","author":"Dullien"},{"key":"ref11","first-page":"1","article-title":"Graphs, Entropy and Grid Computing: Automatic Comparison of Malware","volume-title":"Proc. Virus Bull. Conf.","author":"Briones"},{"key":"ref12","article-title":"Classification of Malware Using Structured Control Flow","volume-title":"Proc. Eighth Australasian Symp. Parallel and Distributed Computing (AusPDC \u201910)","author":"Cesare"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690851"},{"key":"ref14","first-page":"139","article-title":"Polymorphic Malware Detection and Identification via Context-Free Grammar Homomorphism","volume-title":"Bell Labs Technical J.","volume":"12","author":"Gerald"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.38"},{"key":"ref17","article-title":"Mal(ware)formation Statistics - Panda Research Blog","year":"2009"},{"key":"ref18","article-title":"Improving Proactive Detection of Packed Malware","volume-title":"Proc. Virus Bull. Conf.","author":"Stepan"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314399"},{"key":"ref20","article-title":"Pandora\u2019s Bochs: Automatic Unpacking of Malware","author":"Boehne","year":"2008"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75496-1_1"},{"key":"ref22","article-title":"Hump-and-Dump: Efficient Generic Unpacking Using an Ordered Address Execution Histogram","volume-title":"Proc. Int\u2019l Computer Anti-Virus Researchers Organization (CARO) Workshop","author":"Sun"},{"key":"ref23","article-title":"Generic Unpacking: How to Handle Modified or Unknown PE Compression Engines","volume-title":"Proc. Virus Bull. Conf.","author":"Graf"},{"key":"ref24","article-title":"Covert Debugging Circumventing Software Armoring Techniques","volume-title":"Proc. Black Hat Briefings","author":"Quist"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.15"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.22"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.130"},{"key":"ref29","first-page":"218","article-title":"Modelling Metamorphism by Abstract Interpretation","volume-title":"Proc. Int\u2019l Conf. Static Analysis","author":"Dalla Preda"},{"key":"ref30","volume-title":"Zynamics, VxClass","year":"2009"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_16"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_11"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0151-y"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.48"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02617-1_32"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030379"},{"key":"ref37","article-title":"Static Disassembly of Obfuscated Binaries","volume-title":"Proc. USENIX Security Symp.","author":"Kruegel"},{"key":"ref38","article-title":"Reverse Compilation Techniques","author":"Cifuentes","year":"1994"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2001.914984"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.203"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SPIRE.1998.712978"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"ref43","volume-title":"Offensive Computing","year":"2009"},{"key":"ref44","volume-title":"Mwcollect Alliance","year":"2009"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/12\/6509861\/06171162.pdf?arnumber=6171162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T05:50:26Z","timestamp":1742277026000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6171162\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":44,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tc.2012.65","relation":{},"ISSN":["0018-9340"],"issn-type":[{"value":"0018-9340","type":"print"}],"subject":[],"published":{"date-parts":[[2013,6]]}}}