{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:28:51Z","timestamp":1771064931168,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"K7 Computing Pvt. Ltd"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1109\/tdsc.2024.3406699","type":"journal-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T17:36:32Z","timestamp":1717004192000},"page":"518-533","source":"Crossref","is-referenced-by-count":5,"title":["SUNDEW: A Case-Sensitive Detection Engine to Counter Malware Diversity"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0756-678X","authenticated-orcid":false,"given":"Sareena","family":"Karapoola","sequence":"first","affiliation":[{"name":"Department of CSE, Indian Institute of Technology Madras, Chennai, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2697-1855","authenticated-orcid":false,"given":"Nikhilesh","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of CSE, Indian Institute of Technology Madras, Chennai, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8063-0026","authenticated-orcid":false,"given":"Chester","family":"Rebeiro","sequence":"additional","affiliation":[{"name":"Department of CSE, Indian Institute of Technology Madras, Chennai, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2332-8538","authenticated-orcid":false,"given":"Kamakoti","family":"Veezhinathan","sequence":"additional","affiliation":[{"name":"Department of CSE, Indian Institute of Technology Madras, Chennai, India"}]}],"member":"263","reference":[{"key":"ref1","article-title":"AVTest: Malware stastics","year":"2021"},{"key":"ref2","first-page":"807","article-title":"Optimized invariant representation of network traffic for detecting unseen malware variants","volume-title":"Proc. 25th USENIX Secur. Symp.","author":"Bartos"},{"key":"ref3","first-page":"1","article-title":"NumChecker: Detecting kernel control-flow modifying rootkits by using hardware performance counters","volume-title":"Proc. 50th Annu. Des. Automat. Conf.","author":"Wang"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1511-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.122"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.02.053"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485970"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2209-8_5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_6"},{"key":"ref11","first-page":"8","article-title":"Scalable, behavior-based malware clustering","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Bayer"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2457918"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107247"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101663"},{"key":"ref15","first-page":"139","article-title":"BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection","volume-title":"Proc. 17th USENIX Secur. Symp.","author":"Gu"},{"key":"ref16","article-title":"Behavioral clustering of HTTP-Based malware and signature generation using malicious network traces","volume-title":"Proc. 7th USENIX Symp. Networked Syst. Des. Implementation","author":"Perdisci"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844349"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3051354"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2491300"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196047"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.010"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.010"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2739145"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2771228"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567003"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2014.6993402"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2857055"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336768"},{"key":"ref29","article-title":"Types of malware: Kasperkey solutions","year":"2021"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8740837"},{"key":"ref31","article-title":"Intel 64 and IA-32 architectures software developer\u2019s manual","volume":"3B","year":"2007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00021"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3123972"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.04.001"},{"key":"ref35","article-title":"Automated malware analysis","year":"2021"},{"key":"ref36","volume-title":"Security Information and Event Management (SIEM) Implementation","author":"Miller","year":"2011"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866319"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7247095"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3097296"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61078-4_25"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557121"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3546096.3546108"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24475"},{"key":"ref44","first-page":"8","article-title":"Scalable, behavior-based malware clustering","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Bayer"},{"key":"ref45","first-page":"729","article-title":"TESSERACT: Eliminating experimental bias in malware classification across space and time","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Pendlebury"},{"key":"ref46","article-title":"CNET: Windows application repository","year":"2021"},{"key":"ref47","article-title":"Introducing geekbench-5","year":"2021"},{"key":"ref48","article-title":"Active learning literature survey","author":"Settles","year":"2021"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10843954\/10541049.pdf?arnumber=10541049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T03:58:21Z","timestamp":1737431901000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10541049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":48,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3406699","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]}}}