{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:42:21Z","timestamp":1769748141427,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046742","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"309-320","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":166,"title":["BitShred"],"prefix":"10.1145","author":[{"given":"Jiyong","family":"Jang","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"David","family":"Brumley","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Shobha","family":"Venkataraman","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs - Research, Florham Park, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache hadoop. http:\/\/hadoop.apache.org\/.  Apache hadoop. http:\/\/hadoop.apache.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Carnegie Mellon University Cloud Computer Cluster. http:\/\/www2.pdl.cmu.edu\/~twiki\/cgi-bin\/view\/OpenCloud\/ClusterOverview.  Carnegie Mellon University Cloud Computer Cluster. http:\/\/www2.pdl.cmu.edu\/~twiki\/cgi-bin\/view\/OpenCloud\/ClusterOverview."},{"key":"e_1_3_2_1_3_1","unstructured":"Malware Analysis System. http:\/\/mwanalysis.org\/.  Malware Analysis System. http:\/\/mwanalysis.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Offensive Computing. http:\/\/www.offensivecomputing.net\/.  Offensive Computing. http:\/\/www.offensivecomputing.net\/."},{"key":"e_1_3_2_1_5_1","unstructured":"SimMetrics. http:\/\/sourceforge.net\/projects\/simmetrics\/.  SimMetrics. http:\/\/sourceforge.net\/projects\/simmetrics\/."},{"key":"e_1_3_2_1_6_1","unstructured":"VirusTotal. http:\/\/www.virustotal.com\/.  VirusTotal. http:\/\/www.virustotal.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"zynamics bindiff. http:\/\/www.zynamics.com\/bindiff.html.  zynamics bindiff. http:\/\/www.zynamics.com\/bindiff.html."},{"key":"e_1_3_2_1_8_1","volume-title":"April","year":"2010","unstructured":"Symantec internet security threat report. http:\/\/www.symantec.com\/business\/theme.jsp?themeid=threatreport , April 2010 . Symantec internet security threat report. http:\/\/www.symantec.com\/business\/theme.jsp?themeid=threatreport, April 2010."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025118.1025582"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327494"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the Sixth Conference on Email and Anti-Spam","author":"Attenberg J.","year":"2009","unstructured":"J. Attenberg , K. Weinberger , A. Dasgupta , A. Smola , and M. Zinkevich . Collaborative email-spam filtering with the hashing-trick . In Proceedings of the Sixth Conference on Email and Anti-Spam , 2009 . J. Attenberg, K. Weinberger, A. Dasgupta, A. Smola, and M. Zinkevich. Collaborative email-spam filtering with the hashing-trick. In Proceedings of the Sixth Conference on Email and Anti-Spam, 2009."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1776434.1776449"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Bayer U.","year":"2009","unstructured":"U. Bayer , P. M. Comparetti , C. Hlauschek , C. Kruegel , and E. Kirda . Scalable, behavior-based malware clustering . In Proceedings of the Network and Distributed System Security Symposium , 2009 . U. Bayer, P. M. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, behavior-based malware clustering. In Proceedings of the Network and Distributed System Security Symposium, 2009."},{"key":"e_1_3_2_1_14_1","unstructured":"D. Bernstein. http:\/\/www.cse.yorku.ca\/~oz\/hash.html.  D. Bernstein. http:\/\/www.cse.yorku.ca\/~oz\/hash.html."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014064"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the USENIX Symposium on Operating System Design and Implementation","author":"Dean J.","year":"2004","unstructured":"J. Dean and S. Ghemawat . MapReduce: Simplified data processing on large clusters . In Proceedings of the USENIX Symposium on Operating System Design and Implementation , 2004 . J. Dean and S. Ghemawat. MapReduce: Simplified data processing on large clusters. In Proceedings of the USENIX Symposium on Operating System Design and Implementation, 2004."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of ACM Symposium on Discrete Algorithms (SODA)","author":"Eppstein D.","year":"1998","unstructured":"D. Eppstein . Fast hierarchical clustering and other applications of dynamic closest pairs . In Proceedings of ACM Symposium on Discrete Algorithms (SODA) , 1998 . D. Eppstein. Fast hierarchical clustering and other applications of dynamic closest pairs. In Proceedings of ACM Symposium on Discrete Algorithms (SODA), 1998."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_6"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of Eighth International Workshop on the Web and Databases (WebDB 2005)","author":"Jain N.","year":"2005","unstructured":"N. Jain , M. Dahlin , and R. Tewari . Using bloom filters to refine web search results . In Proceedings of Eighth International Workshop on the Web and Databases (WebDB 2005) , June 2005 . N. Jain, M. Dahlin, and R. Tewari. Using bloom filters to refine web search results. In Proceedings of Eighth International Workshop on the Web and Databases (WebDB 2005), June 2005."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-005-0002-9"},{"key":"e_1_3_2_1_24_1","volume-title":"CLUTO: a clustering toolkit, release 2.1.1. Technical report","author":"Karypis G.","year":"2003","unstructured":"G. Karypis . CLUTO: a clustering toolkit, release 2.1.1. Technical report , University of Minnesota , 2003 . G. Karypis. CLUTO: a clustering toolkit, release 2.1.1. Technical report, University of Minnesota, 2003."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248547.1248646"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894166.1894183"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.15"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.17"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.142"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.06.016"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of NSDI","author":"Perdisci R.","year":"2010","unstructured":"R. Perdisci , W. Lee , and N. Feamster . Behavioral clustering of HTTP-based malware and signature generation using malicious network traces . In Proceedings of NSDI , 2010 . R. Perdisci, W. Lee, and N. Feamster. Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. In Proceedings of NSDI, 2010."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.38"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.27"},{"key":"e_1_3_2_1_36_1","volume-title":"Journal of Machine Learning Research","author":"Shi Q.","year":"2009","unstructured":"Q. Shi , J. Petterson , G. Dror , J. Langford , A. Smola , and S. Vishwanathan . Hash kernels for structured data . Journal of Machine Learning Research , 2009 . Q. Shi, J. Petterson, G. Dror, J. Langford, A. Smola, and S. Vishwanathan. Hash kernels for structured data. Journal of Machine Learning Research, 2009."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the $12^th$ International Conference on Artificial Intelligence and Statisics (AISTATS)","author":"Shi Q.","year":"2009","unstructured":"Q. Shi , J. Petterson , G. Dror , J. Langford , A. Smole , A. Strehl , and V. Vishwanathan . Hash kernels . In Proceedings of the $12^th$ International Conference on Artificial Intelligence and Statisics (AISTATS) , 2009 . Q. Shi, J. Petterson, G. Dror, J. Langford, A. Smole, A. Strehl, and V. Vishwanathan. Hash kernels. In Proceedings of the $12^th$ International Conference on Artificial Intelligence and Statisics (AISTATS), 2009."},{"key":"e_1_3_2_1_38_1","volume-title":"Duplication, Redundancy, and Similarity in Software","author":"Walenstein A.","year":"2007","unstructured":"A. Walenstein and A. Lakhotia . The software similarity problem in malware analysis . In Duplication, Redundancy, and Similarity in Software , 2007 . A. Walenstein and A. Lakhotia. The software similarity problem in malware analysis. In Duplication, Redundancy, and Similarity in Software, 2007."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553516"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046742","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046742"}},"subtitle":["feature hashing malware for scalable triage and semantic analysis"],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":39,"alternative-id":["10.1145\/2046707.2046742","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046742","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}