{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:36:07Z","timestamp":1759091767769,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T00:00:00Z","timestamp":1284595200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,9,16]]},"DOI":"10.1145\/1858378.1858443","type":"proceedings-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T12:04:33Z","timestamp":1285157073000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Malware detection using assembly code and control flow graph optimization"],"prefix":"10.1145","author":[{"given":"S. S.","family":"Anju","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidyapeetham, Tamil Nadu, India"}]},{"given":"P.","family":"Harmya","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham, Tamil Nadu, India"}]},{"given":"Noopa","family":"Jagadeesh","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham, Tamil Nadu, India"}]},{"given":"R.","family":"Darsana","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham, Tamil Nadu, India"}]}],"member":"320","published-online":{"date-parts":[[2010,9,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.37"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of International Symposium on Secure Software Engineering.","author":"Bruschi Danilo","year":"2006","unstructured":"}} Danilo Bruschi , Lorenzo Martignoni , Mattia Monga , 2006 . Using Code Normalization for Fighting Self-Mutating Malware . Proceedings of International Symposium on Secure Software Engineering. }}Danilo Bruschi, Lorenzo Martignoni, Mattia Monga, 2006. Using Code Normalization for Fighting Self-Mutating Malware. Proceedings of International Symposium on Secure Software Engineering."},{"volume-title":"Proceedings of USENIX Security Symposium, Aug.","author":"Christodorescu M.","key":"e_1_3_2_1_3_1","unstructured":"}} M. Christodorescu and S. Jha . 2003. Static analysis of executables to detect malicious patterns . Proceedings of USENIX Security Symposium, Aug. }}M. Christodorescu and S. Jha. 2003. Static analysis of executables to detect malicious patterns. Proceedings of USENIX Security Symposium, Aug."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. RAID 2007 LNCS","volume":"4637","author":"Bailey M.","unstructured":"}} M. Bailey , J. Oberheide , J. Andersen , Z. M. Mao , Jahanian, and J. Nazario , 2007. Automated classification and analysis of internet malware . Proc. RAID 2007 LNCS , vol. 4637 , 178--197. }}M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, Jahanian, and J. Nazario, 2007. Automated classification and analysis of internet malware. Proc. RAID 2007 LNCS, vol. 4637, 178--197."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190270"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.20"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2006.20"},{"key":"e_1_3_2_1_8_1","unstructured":"}}DataRescue sa\/nv. IDA Pro -- interactive disassembler. http:\/\/www.datarescue.com\/idabase\/ }}DataRescue sa\/nv. IDA Pro -- interactive disassembler. http:\/\/www.datarescue.com\/idabase\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"}}C. Cifuentes and S. Sendall 1998. Specifying the Semantics of Machine Instruction. 6th Int'l Workshop on Program Comprehension (IWPC 98) IEEE CS Press 126--133. }}C. Cifuentes and S. Sendall 1998. Specifying the Semantics of Machine Instruction. 6th Int'l Workshop on Program Comprehension (IWPC 98) IEEE CS Press 126--133.","DOI":"10.1109\/WPC.1998.693332"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/349214.349233"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/6448"},{"key":"e_1_3_2_1_12_1","volume-title":"International Workshop on the Theory of Computer Viruses.","author":"Bonfante Guillaume","year":"2007","unstructured":"}} Guillaume Bonfante , Matthieu Kaczmarek and Jean-Yves Marion , 2007 . Control Flow Graphs as Malware Signatures . International Workshop on the Theory of Computer Viruses. }}Guillaume Bonfante, Matthieu Kaczmarek and Jean-Yves Marion, 2007. Control Flow Graphs as Malware Signatures. International Workshop on the Theory of Computer Viruses."},{"volume-title":"Proc. 6th Int'l Workshop on Program Comprehension (IWPC 98)","author":"Cifuentes C.","key":"e_1_3_2_1_13_1","unstructured":"}} C. Cifuentes and S. Sendall , 1998. Specifying the Semantics of Machine Instructions . Proc. 6th Int'l Workshop on Program Comprehension (IWPC 98) , IEEE CS Press, 126--133. }}C. Cifuentes and S. Sendall, 1998. Specifying the Semantics of Machine Instructions. Proc. 6th Int'l Workshop on Program Comprehension (IWPC 98), IEEE CS Press, 126--133."},{"volume-title":"Proc. 7th Int'l Workshop on Program Comprehension, IEEE CS Press, 171--188","author":"Cifuentes C.","key":"e_1_3_2_1_14_1","unstructured":"}} C. Cifuentes and M. V. Emmerik , 2001. Recovery of Jump Table Case Statements from Binary Code . Proc. 7th Int'l Workshop on Program Comprehension, IEEE CS Press, 171--188 . }}C. Cifuentes and M. V. Emmerik, 2001. Recovery of Jump Table Case Statements from Binary Code. Proc. 7th Int'l Workshop on Program Comprehension, IEEE CS Press, 171--188."}],"event":{"name":"A2CWiC '10: Emerging Trends in Computing","acronym":"A2CWiC '10","location":"Coimbatore India"},"container-title":["Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1858378.1858443","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1858378.1858443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:26Z","timestamp":1750248506000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1858378.1858443"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,16]]},"references-count":14,"alternative-id":["10.1145\/1858378.1858443","10.1145\/1858378"],"URL":"https:\/\/doi.org\/10.1145\/1858378.1858443","relation":{},"subject":[],"published":{"date-parts":[[2010,9,16]]},"assertion":[{"value":"2010-09-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}