{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:00:00Z","timestamp":1772906400843,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,7,15]],"date-time":"2012-07-15T00:00:00Z","timestamp":1342310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,7,15]]},"DOI":"10.1145\/2338965.2336768","type":"proceedings-article","created":{"date-parts":[[2012,7,26]],"date-time":"2012-07-26T14:41:14Z","timestamp":1343313674000},"page":"122-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":104,"title":["A quantitative study of accuracy in system call-based malware detection"],"prefix":"10.1145","author":[{"given":"Davide","family":"Canali","sequence":"first","affiliation":[{"name":"EURECOM, France"}]},{"given":"Andrea","family":"Lanzi","sequence":"additional","affiliation":[{"name":"EURECOM, France"}]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[{"name":"EURECOM, France"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"UC Santa Barbara, USA"}]},{"given":"Mihai","family":"Christodorescu","sequence":"additional","affiliation":[{"name":"IBM Research, USA"}]},{"given":"Engin","family":"Kirda","sequence":"additional","affiliation":[{"name":"Northeastern University, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,7,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/anubis.iseclab.org 2011.  http:\/\/anubis.iseclab.org 2011."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. LEET'09","author":"Bayer U.","year":"2009","unstructured":"U. Bayer , I. Habibi , D. Balzarotti , E. Kirda , and C. Kruegel . A view on current malware behaviors . In Proc. LEET'09 , 2009 . U. Bayer, I. Habibi, D. Balzarotti, E. Kirda, and C. Kruegel. A view on current malware behaviors. In Proc. LEET'09, 2009."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_8"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007518"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.20"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287628"},{"key":"e_1_3_2_1_7_1","unstructured":"N. Falliere. Stuxnet introduces the first known rootkit for industrial control systems. Published online at http:\/\/www.symantec.com\/connect\/blogs\/ stuxnet-introduces-first-known-rootkit-scada-devices. Last accessed on February 10 2011.  N. Falliere. Stuxnet introduces the first known rootkit for industrial control systems. Published online at http:\/\/www.symantec.com\/connect\/blogs\/ stuxnet-introduces-first-known-rootkit-scada-devices. Last accessed on February 10 2011."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506881_11"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. USENIX Security","author":"Kirda E.","year":"2006","unstructured":"E. Kirda , C. Kruegel , G. Banks , G. Vigna , and R. Kemmerer . Behavior-based spyware detection . In Proc. USENIX Security , 2006 . E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. Kemmerer. Behavior-based spyware detection. In Proc. USENIX Security, 2006."},{"key":"e_1_3_2_1_10_1","first-page":"351","volume-title":"Proc. USENIX Security","author":"Kolbitsch C.","year":"2009","unstructured":"C. Kolbitsch , P. Milani , C. Kruegel , E. Kirda , X. Zhou , and X. Wang . Effective and efficient malware detection at the end host . In Proc. USENIX Security , pages 351 - 366 , 2009 . C. Kolbitsch, P. Milani, C. Kruegel, E. Kirda, X. Zhou, and X. Wang. Effective and efficient malware detection at the end host. In Proc. USENIX Security, pages 351-366, 2009."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_11"},{"key":"e_1_3_2_1_12_1","volume-title":"Published online at http:\/\/siblog.mcafee.com\/cto\/operation-%E2% 80%9Caurora%E2%80%9D-hit-google-others\/. Last accessed on","author":"Kurtz G.","year":"2011","unstructured":"G. Kurtz . Operation \"Aurora\" hit Google , others. Published online at http:\/\/siblog.mcafee.com\/cto\/operation-%E2% 80%9Caurora%E2%80%9D-hit-google-others\/. Last accessed on February 10, 2011 , 2011. G. Kurtz. Operation \"Aurora\" hit Google, others. Published online at http:\/\/siblog.mcafee.com\/cto\/operation-%E2% 80%9Caurora%E2%80%9D-hit-google-others\/. Last accessed on February 10, 2011, 2011."},{"key":"e_1_3_2_1_13_1","first-page":"64","volume-title":"Proc. 6th IEEE SMC Workshop on Information Assurance","author":"Li W.-J.","year":"2005","unstructured":"W.-J. Li , K. Wang , S. J. Stolfo , and B. Herzog . Fileprints: Identifying file types by n-gram analysis . In Proc. 6th IEEE SMC Workshop on Information Assurance , pages 64 - 71 . United States Military Academy , 2005 . W.-J. Li, K. Wang, S. J. Stolfo, and B. Herzog. Fileprints: Identifying file types by n-gram analysis. In Proc. 6th IEEE SMC Workshop on Information Assurance, pages 64-71. United States Military Academy, 2005."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1433006.1433013"},{"key":"e_1_3_2_1_15_1","volume-title":"McAfee threats report: Fourth quarter","author":"Labs McAfee","year":"2010","unstructured":"McAfee Labs . McAfee threats report: Fourth quarter 2010 . Publishsed online at http:\/\/www.mcafee.com\/us\/ resources\/reports\/rp-quarterly-threat-q4-2010.pdf. Last accessed on February 10, 2011. McAfee Labs. McAfee threats report: Fourth quarter 2010. Publishsed online at http:\/\/www.mcafee.com\/us\/ resources\/reports\/rp-quarterly-threat-q4-2010.pdf. Last accessed on February 10, 2011."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.37"},{"key":"e_1_3_2_1_18_1","unstructured":"G. Nebbett. Windows NT\/2000 Native API Reference. 2000.   G. Nebbett. Windows NT\/2000 Native API Reference . 2000."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884439"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73614-1_6"},{"key":"e_1_3_2_1_21_1","volume-title":"The Art of Computer Virus Research and Defense","author":"Sz\u00f6r P.","year":"2005","unstructured":"P. Sz\u00f6r . The Art of Computer Virus Research and Defense . 2005 . P. Sz\u00f6r. The Art of Computer Virus Research and Defense. 2005."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHIS.2004.75"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"}],"event":{"name":"ISSTA '12: International Symposium on Software Testing and Analysis","location":"Minneapolis MN USA","acronym":"ISSTA '12","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 2012 International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2338965.2336768","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2338965.2336768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:08Z","timestamp":1750238468000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2338965.2336768"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,15]]},"references-count":23,"alternative-id":["10.1145\/2338965.2336768","10.1145\/2338965"],"URL":"https:\/\/doi.org\/10.1145\/2338965.2336768","relation":{},"subject":[],"published":{"date-parts":[[2012,7,15]]},"assertion":[{"value":"2012-07-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}