{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T22:51:42Z","timestamp":1740178302900,"version":"3.37.3"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"BK21 FOUR Program of the Education and Research Program"},{"name":"Future ICT Pioneers"},{"DOI":"10.13039\/501100002551","name":"Seoul National University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002551","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institute of Information and communications Technology Planning and Evaluation"},{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["2020-0-01840"],"award-info":[{"award-number":["2020-0-01840"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Artificial Intelligence Graduate School Program","award":["2021-0-01343"],"award-info":[{"award-number":["2021-0-01343"]}]},{"name":"Artificial Intelligence Innovation Hub","award":["2021-0-02068"],"award-info":[{"award-number":["2021-0-02068"]}]},{"DOI":"10.13039\/501100002630","name":"Ewha Womans University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002630","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2020R1A2B5B03095204","NRF-2018R1A2B3001628"],"award-info":[{"award-number":["NRF-2020R1A2B5B03095204","NRF-2018R1A2B3001628"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002630","name":"Ewha Womans University","doi-asserted-by":"publisher","award":["2021"],"award-info":[{"award-number":["2021"]}],"id":[{"id":"10.13039\/501100002630","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Inter-University Semiconductor Research Center"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Top. Comput. Intell."],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1109\/tetci.2022.3146425","type":"journal-article","created":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T20:13:35Z","timestamp":1652300015000},"page":"982-993","source":"Crossref","is-referenced-by-count":0,"title":["Data Embedding Scheme for Efficient Program Behavior Modeling With Neural Networks"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7843-9510","authenticated-orcid":false,"given":"Sunwoo","family":"Ahn","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea"}]},{"given":"Hayoon","family":"Yi","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5238-3547","authenticated-orcid":false,"given":"Ho","family":"Bae","sequence":"additional","affiliation":[{"name":"Department of Cyber Security, Ewha Womans University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2367-197X","authenticated-orcid":false,"given":"Sungroh","family":"Yoon","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6412-2926","authenticated-orcid":false,"given":"Yunheung","family":"Paek","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813654"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.49"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00025"},{"article-title":"LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems","year":"2016","author":"Kim","key":"ref4"},{"article-title":"Mimicry resilient program behavior modeling with LSTM based branch models","year":"2018","author":"Yi","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16074-5_4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243811"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref9","first-page":"905","article-title":"Attack2vec: Leveraging temporal word embeddings to understand the evolution of cyberattacks","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Sehn","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23492"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"ref13","first-page":"4505","article-title":"Ithemal: Accurate, portable and fast basic block throughput estimation using deep neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Mendis","year":"2019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363224"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00090"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2020.1796162"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1105"},{"year":"2020","key":"ref20","article-title":"MySQL"},{"year":"2020","key":"ref21","article-title":"Free software foundation, GNU screen"},{"article-title":"CVE-2016-6663 MySQL \/ MariaDB \/ percona - privilege escalation \/ race condition PoC exploit","year":"2016","author":"Golunski","key":"ref22"},{"article-title":"CVE-2016-6664 MySQL \/ MariaDB \/ percona - root privilege escalation PoC exploit","year":"2016","author":"Golunski","key":"ref23"},{"year":"2017","key":"ref24","article-title":"EDB-ID: 41154 GNU screen 4.5.0 - local privilege escalation"},{"year":"2020","key":"ref25","article-title":"VirusTotal"},{"article-title":"Embedding projector: Interactive visualization and interpretation of embeddings","year":"2016","author":"Smilkov","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7439(87)80084-9"},{"issue":"11","key":"ref28","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21105\/joss.00861"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref32","first-page":"2383","article-title":"SQuAD: 100,000 questions for machine comprehension of text","volume-title":"Proc. Conf. Empirical Methods Natural Lang. Process.","author":"Deng","year":"2016"}],"container-title":["IEEE Transactions on Emerging Topics in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7433297\/9834983\/09772749.pdf?arnumber=9772749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T22:32:05Z","timestamp":1705962725000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9772749\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":32,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tetci.2022.3146425","relation":{},"ISSN":["2471-285X"],"issn-type":[{"type":"electronic","value":"2471-285X"}],"subject":[],"published":{"date-parts":[[2022,8]]}}}