{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:54:05Z","timestamp":1772042045646,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/tdsc.2013.40","type":"journal-article","created":{"date-parts":[[2013,9,17]],"date-time":"2013-09-17T18:03:46Z","timestamp":1379441026000},"page":"307-317","source":"Crossref","is-referenced-by-count":143,"title":["Control Flow-Based Malware VariantDetection"],"prefix":"10.1109","volume":"11","author":[{"given":"Silvio","family":"Cesare","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Wanlei","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.844059"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1006\/jmbi.1990.9999"},{"key":"ref33","first-page":"311","article-title":"Data Structures and Algorithms for Nearest Neighbor Search in General Metric Spaces","author":"peter","year":"1993","journal-title":"Proc Fourth Ann ACM-SIAM Symp Discrete Algorithms"},{"key":"ref32","article-title":"Dynamic Software Birthmarks to Detect the Theft of Windows Applications","author":"tamada","year":"2004","journal-title":"Proc Int'l Symp Future Software Technology (ISFST '04)"},{"key":"ref31","article-title":"Android: From Reversing to Decompilation","author":"desnos","year":"2011","journal-title":"Blakchat Briefings"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690851"},{"key":"ref37","author":"cifuentes","year":"1994","journal-title":"Reverse compilation techniques"},{"key":"ref36","first-page":"18","article-title":"Static Disassembly of Obfuscated Binaries","author":"kruegel","year":"2004","journal-title":"Proc Usenix Security Symp"},{"key":"ref35","first-page":"289","article-title":"Polyunpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware","author":"royal","year":"2006","journal-title":"Proc 22nd Ann Computer Security Applications Conf"},{"key":"ref34","first-page":"163","article-title":"DBM-Tree: A Dynamic Metric Access Method Sensitive to Local Density Data","author":"vieira","year":"2004","journal-title":"Proc 11th Brazilian Symp Databases"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.121"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1002\/bltj.20256","article-title":"Polymorphic Malware Detection and Identification via Context-Free Grammar Homomorphism","volume":"12","author":"gerald","year":"2007","journal-title":"Bell Labs Technical J"},{"key":"ref29","article-title":"Classification of Malware Using Structured Control Flow","author":"cesare","year":"2010","journal-title":"Proc Eighth Australasian Symp Parallel and Distributed Computing (AusPDC '10)"},{"key":"ref2","article-title":"Internet Security Threat Report","volume":"6","year":"2011"},{"key":"ref1","year":"0"},{"key":"ref20","author":"boehne","year":"2008","journal-title":"Pandora's Bochs Automatic Unpacking of Malware"},{"key":"ref22","article-title":"Static Analysis of Executables to Detect Malicious Patterns","author":"christodorescu","year":"2003","journal-title":"Proc 12th Conf Usenix Security Symp"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.20"},{"key":"ref24","first-page":"1","article-title":"Graphs, Entropy and Grid Computing: Automatic Comparison of Malware","author":"briones","year":"2008","journal-title":"Proc Virus Bull Conf"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403019"},{"key":"ref26","article-title":"Graph-Based Comparison of Executable Objects (English Version)","author":"dullien","year":"2005","journal-title":"Proc SSTIC"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"ref50","year":"2010","journal-title":"Cygwin"},{"key":"ref51","article-title":"Unpacking Virtualization Obfuscators","author":"rolles","year":"2009","journal-title":"Proceedings of USENIX Workshop on Offensive Technologies (WOOT)"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.15"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314399"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.27"},{"key":"ref10","first-page":"187","article-title":"Digital Genome Mapping?Advanced Binary Malware Analysis","author":"carrera","year":"2004","journal-title":"Proc Virus Bull Conf"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972870.13"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/11663812_11","article-title":"Polymorphic Worm Detection Using Structural Information of Executables","author":"kruegel","year":"2006","journal-title":"Proc Eighth Int?l Conf Recent Advances in Intrusion Detection"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"key":"ref13","article-title":"BitBlaze: A New Approach to Computer Security via Binary Analysis","author":"song","year":"2008","journal-title":"Proc Fourth Int?l Conf on Information Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.016865"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-005-0002-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.22"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"ref18","first-page":"294","article-title":"An Automated Virus Classification System","author":"gheorghescu","year":"2005","journal-title":"Proc Virus Bull Conf"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281308"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04342-0_6","article-title":"Automatic Generation of String Signatures for Malware Detection","author":"griffin","year":"2009","journal-title":"Proc 11th Int?l Symp Recent Advances in Intrusion Detection"},{"key":"ref3","article-title":"F-Secure Reports Amount of Malware Grew by 100% during 2007","year":"2009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"ref5","first-page":"178","article-title":"Automatic Extraction of Computer Virus Signatures","author":"kephart","year":"1994","journal-title":"Proc Fourth Virus Bull Int'l Conf"},{"key":"ref8","article-title":"Normalizing Metamorphic Malware Using Term Rewriting","author":"andrew","year":"2006","journal-title":"Proc Sixth IEEE Int'l Workshop Source Code Analysis and Manipulation"},{"key":"ref49","year":"2009","journal-title":"Mwcollect Alliance"},{"key":"ref7","author":"christodorescu","year":"2005","journal-title":"Malware Normalization"},{"key":"ref9","article-title":"Effective and Efficient Malware Detection at the End Host","author":"kolbitsch","year":"2009","journal-title":"Proc 18th Conf USENIX Security Symp"},{"key":"ref46","article-title":"Slim-Trees: High Performance Metric Trees Minimizing Overlap between Nodes","author":"traina jr","year":"2000","journal-title":"Advances in Database Technology Proc of the 15th Int'l Conf on Extending Database Technology"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SPIRE.1998.712978"},{"key":"ref48","year":"2009","journal-title":"Offensive Computing"},{"key":"ref47","year":"2010","journal-title":"GDBI Arboretum"},{"key":"ref42","author":"brecheisen","year":"2007","journal-title":"Efficient and Effective Similarity Search on Complex Objects"},{"key":"ref41","first-page":"52","article-title":"A Tutorial on Principal Components Analysis","volume":"51","author":"smith","year":"2002","journal-title":"Cornell Univ"},{"key":"ref44","article-title":"M-tree: An Efficient Access Method for Similarity Search in Metric Spaces","author":"paolo","year":"1997","journal-title":"Proc of the 17th Int?l Conf on Very Large Data Bases"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/nav.3800020109"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/6851971\/06601601.pdf?arnumber=6601601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:18:16Z","timestamp":1642004296000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6601601\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":54,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2013.40","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2014,7]]}}}