{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T04:48:12Z","timestamp":1764305292468,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"DOI":"10.1145\/2490428.2490442","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"96-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["SPADE"],"prefix":"10.1145","author":[{"given":"Smita","family":"Naval","sequence":"first","affiliation":[{"name":"Malaviya National Institute of Technology, Jaipur, Rajasthan"}]},{"given":"Vijay","family":"Laxmi","sequence":"additional","affiliation":[{"name":"Malaviya National Institute of Technology, Jaipur, Rajasthan"}]},{"given":"M. S.","family":"Gaur","sequence":"additional","affiliation":[{"name":"Malaviya National Institute of Technology, Jaipur, Rajasthan"}]},{"given":"P.","family":"Vinod","sequence":"additional","affiliation":[{"name":"Malaviya National Institute of Technology, Jaipur, Rajasthan"}]}],"member":"320","published-online":{"date-parts":[[2012,8,17]]},"reference":[{"volume-title":"Last Accessed","year":"2011","unstructured":"ASPack. http:\/\/www.aspack.com\/ , Last Accessed October 2011 . ASPack. http:\/\/www.aspack.com\/, Last Accessed October 2011.","key":"e_1_3_2_1_1_1"},{"volume-title":"Last Accessed","year":"2011","unstructured":"Exe32pack. http:\/\/www.softpedia.com\/get\/System\/File-Management\/exe32pack.shtml , Last Accessed October 2011 . Exe32pack. http:\/\/www.softpedia.com\/get\/System\/File-Management\/exe32pack.shtml, Last Accessed October 2011.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","volume-title":"Last Accessed","author":"Unpacker Faster Universal","year":"2011","unstructured":"Faster Universal Unpacker . http:\/\/fuuproject.wordpress.com\/tag\/faster-universal-unpacker\/ , Last Accessed November 2011 . Faster Universal Unpacker. http:\/\/fuuproject.wordpress.com\/tag\/faster-universal-unpacker\/, Last Accessed November 2011."},{"volume-title":"Last Accessed","year":"2011","unstructured":"GUnPacker. http:\/\/leechermods.com , Last Accessed November 2011 . GUnPacker. http:\/\/leechermods.com, Last Accessed November 2011.","key":"e_1_3_2_1_4_1"},{"volume-title":"Last Accessed","year":"2011","unstructured":"NsPack. http:\/\/www.brothersoft.com\/nspack-199395.html , Last Accessed October 2011 . NsPack. http:\/\/www.brothersoft.com\/nspack-199395.html, Last Accessed October 2011.","key":"e_1_3_2_1_5_1"},{"volume-title":"Last Accessed","year":"2011","unstructured":"OllyDbg. http:\/\/www.ollydbg.de\/ , Last Accessed November 2011 . OllyDbg. http:\/\/www.ollydbg.de\/, Last Accessed November 2011.","key":"e_1_3_2_1_6_1"},{"volume-title":"Last Accessed","year":"2011","unstructured":"PECompact. http:\/\/www.bitsum.com\/pecompact.php , Last Accessed October 2011 . PECompact. http:\/\/www.bitsum.com\/pecompact.php, Last Accessed October 2011.","key":"e_1_3_2_1_7_1"},{"volume-title":"Last Accessed","year":"2011","unstructured":"PEtite. http:\/\/www.softpedia.com\/get\/Programming\/Other-Programming-Files\/Petite.shtml , Last Accessed October 2011 . PEtite. http:\/\/www.softpedia.com\/get\/Programming\/Other-Programming-Files\/Petite.shtml, Last Accessed October 2011.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","volume-title":"Last Accessed","author":"UPX.","year":"2011","unstructured":"UPX. http:\/\/upx.sourceforge.net\/ , Last Accessed October 2011 . UPX. http:\/\/upx.sourceforge.net\/, Last Accessed October 2011."},{"volume-title":"Last Accessed","year":"2011","unstructured":"VMUnpacker. http:\/\/www.woodman.co , Last Accessed November 2011 . VMUnpacker. http:\/\/www.woodman.co, Last Accessed November 2011.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","volume-title":"Last Accessed","author":"Easy Detect","year":"2012","unstructured":"Detect it Easy . http:\/\/reversingtools.blogspot.in\/2009\/11\/detect-it-easy-die-v064.html , Last Accessed January 2012 . Detect it Easy. http:\/\/reversingtools.blogspot.in\/2009\/11\/detect-it-easy-die-v064.html, Last Accessed January 2012."},{"volume-title":"Last Accessed","year":"2012","unstructured":"Malware. http:\/\/www.mashable.com\/follow\/topics\/malware\/ , Last Accessed May 2012 . Malware. http:\/\/www.mashable.com\/follow\/topics\/malware\/, Last Accessed May 2012.","key":"e_1_3_2_1_12_1"},{"volume-title":"Last Accessed","year":"2012","unstructured":"Phylogenetics. http:\/\/www.cs.princeton.edu\/~mona\/Lecture\/msa1.pdf , Last Accessed March 2012 . Phylogenetics. http:\/\/www.cs.princeton.edu\/~mona\/Lecture\/msa1.pdf, Last Accessed March 2012.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","volume-title":"Last Accessed","author":"D.","year":"2012","unstructured":"Protectioni D. http:\/\/protectionid.owns.it\/ , Last Accessed January 2012 . ProtectioniD. http:\/\/protectionid.owns.it\/, Last Accessed January 2012."},{"unstructured":"D. Balzarotti M. Cova C. Karlberger C. Kruegel E. Kirda and G. Vigna. Efficient Detection of Split Personalities in Malware.  D. Balzarotti M. Cova C. Karlberger C. Kruegel E. Kirda and G. Vigna. Efficient Detection of Split Personalities in Malware.","key":"e_1_3_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/1455770.1455779"},{"volume-title":"Last Accessed","year":"2012","unstructured":"exeInfo. http:\/\/www.exeinfo.xwp.pl\/ ., Last Accessed January 2012 . exeInfo. http:\/\/www.exeinfo.xwp.pl\/., Last Accessed January 2012.","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1314389.1314399"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/ACSAC.2007.15"},{"unstructured":"McAfee. The Good the Bad the Unknown.  McAfee. The Good the Bad the Unknown.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","volume-title":"Last Accessed","author":"Dentification D. Packed Executable","year":"2012","unstructured":"PEi D. Packed Executable I Dentification . http:\/\/www.peid.info\/ ., Last Accessed January 2012 . PEiD. Packed Executable IDentification. http:\/\/www.peid.info\/., Last Accessed January 2012."},{"unstructured":"RDGMax. RDG Packer Detector. http:\/\/rdgsoft.8k.com\/ Last Accessed January 2012.  RDGMax. RDG Packer Detector. http:\/\/rdgsoft.8k.com\/ Last Accessed January 2012.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/ACSAC.2006.38"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/2030376.2030379"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1007\/978-3-642-04342-0_7"},{"key":"e_1_3_2_1_26_1","first-page":"59","volume-title":"International Journal of Advanced Science and Technology","volume":"27","author":"Shin D.","year":"2011","unstructured":"D. Shin , C. Im , H. Jeong , S. Kim , and D. Won . The new signature generation method based on an unpacking algorithm and procedure for a packer detection . In International Journal of Advanced Science and Technology , volume 27 , pages 59 -- 78 , 2011 . D. Shin, C. Im, H. Jeong, S. Kim, and D. Won. The new signature generation method based on an unpacking algorithm and procedure for a packer detection. In International Journal of Advanced Science and Technology, volume 27, pages 59--78, 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1016\/0022-2836(81)90087-5"},{"unstructured":"J. Stewart. OllyBonE v0.1 Break-On-Execute for OllyDbg. http:\/\/www.joestewart.org\/ Last Accessed November 2011.  J. Stewart. OllyBonE v0.1 Break-On-Execute for OllyDbg. http:\/\/www.joestewart.org\/ Last Accessed November 2011.","key":"e_1_3_2_1_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.5555\/2023430.2023464"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1109\/INNOVATIONS.2012.6207739"},{"volume-title":"Last Accessed","year":"2011","unstructured":"VirusTotal. Free Software Downloads and Software Reviews. https:\/\/www.virustotal.com\/ , Last Accessed November 2011 . VirusTotal. Free Software Downloads and Software Reviews. https:\/\/www.virustotal.com\/, Last Accessed November 2011.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","volume-title":"Last Accessed","author":"Virus Collections","year":"2011","unstructured":"VXHeavens. Virus Collections (VXheavens). http:\/\/vl.netlux.org\/vl.php\/ , Last Accessed August 2011 . VXHeavens. Virus Collections (VXheavens). http:\/\/vl.netlux.org\/vl.php\/, Last Accessed August 2011."}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","TCG Trusted Computing Group","Amrita Amrita Vishwa Vidyapeetham","CSA Computer Science Association"],"acronym":"SECURIT '12","name":"SECURIT '12: First International Conference on Security of Internet of Things","location":"Kollam India"},"container-title":["Proceedings of the First International Conference on Security of Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490442","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2490428.2490442","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:35Z","timestamp":1750232075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490442"}},"subtitle":["Signature based PAcker DEtection"],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":32,"alternative-id":["10.1145\/2490428.2490442","10.1145\/2490428"],"URL":"https:\/\/doi.org\/10.1145\/2490428.2490442","relation":{},"subject":[],"published":{"date-parts":[[2012,8,17]]},"assertion":[{"value":"2012-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}