{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T16:53:52Z","timestamp":1771952032635,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"DOI":"10.1145\/2490428.2490454","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"185-193","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Obfuscated malware detection using API call dependency"],"prefix":"10.1145","author":[{"given":"Chinmaya Kumar","family":"Patanaik","sequence":"first","affiliation":[{"name":"IIT Guwahati, India"}]},{"given":"Ferdous A.","family":"Barbhuiya","sequence":"additional","affiliation":[{"name":"IIT Guwahati, India"}]},{"given":"Sukumar","family":"Nandi","sequence":"additional","affiliation":[{"name":"IIT Guwahati, India"}]}],"member":"320","published-online":{"date-parts":[[2012,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/www.symantec.com\/connect\/blogs\/w32stuxnet-installation-details.  http:\/\/www.symantec.com\/connect\/blogs\/w32stuxnet-installation-details."},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.clamav.net\/.  http:\/\/www.clamav.net\/."},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/www.datarescue.com\/idabase\/.  http:\/\/www.datarescue.com\/idabase\/."},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/www.ollydbg.de\/.  http:\/\/www.ollydbg.de\/."},{"key":"e_1_3_2_1_5_1","unstructured":"https:\/\/www.virtualbox.org\/.  https:\/\/www.virtualbox.org\/."},{"key":"e_1_3_2_1_6_1","unstructured":"http:\/\/vx.netlux.org\/.  http:\/\/vx.netlux.org\/."},{"key":"e_1_3_2_1_7_1","unstructured":"http:\/\/msdn.microsoft.com\/en-us\/library\/ms123401.aspx.  http:\/\/msdn.microsoft.com\/en-us\/library\/ms123401.aspx."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_8"},{"key":"e_1_3_2_1_9_1","first-page":"169","volume-title":"In Proceedings of the 12th USENIX Security Symposium","author":"Christodorescu M.","year":"2003","unstructured":"M. Christodorescu and S. Jha . Static analysis of executables to detect malicious patterns . In In Proceedings of the 12th USENIX Security Symposium , pages 169 -- 186 , 2003 . M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. In In Proceedings of the 12th USENIX Security Symposium, pages 169--186, 2003."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287628"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.20"},{"key":"e_1_3_2_1_12_1","unstructured":"C. Kolbitsch P. M. Comparetti C. Kruegel E. Kirda X. Zhou and X. Wang. Effective and efficient malware detection at the end host.  C. Kolbitsch P. M. Comparetti C. Kruegel E. Kirda X. Zhou and X. Wang. Effective and efficient malware detection at the end host."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2004.1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774505"},{"key":"e_1_3_2_1_15_1","volume-title":"Symantec","author":"L. O.","year":"2011","unstructured":"L. O. M. Nicolas Falliere and E. Chien. W32.stuxnet dossier. Technical report , Symantec , 2011 . L. O. M. Nicolas Falliere and E. Chien. W32.stuxnet dossier. Technical report, Symantec, 2011."},{"key":"e_1_3_2_1_16_1","volume-title":"Bell Labs","author":"Rozinov K.","year":"2004","unstructured":"K. Rozinov . Reverse code engineering: An in-depth analysis of the bagle virus. Technical report , Bell Labs , 2004 . K. Rozinov. Reverse code engineering: An in-depth analysis of the bagle virus. Technical report, Bell Labs, 2004."},{"key":"e_1_3_2_1_17_1","first-page":"123","volume-title":"In Virus Bulletin Conference","author":"Sz\u0171r P.","year":"2001","unstructured":"P. Sz\u0171r and P. Ferrie . Hunting for metamorphic . In In Virus Bulletin Conference , pages 123 -- 144 , 2001 . P. Sz\u0171r and P. Ferrie. Hunting for metamorphic. In In Virus Bulletin Conference, pages 123--144, 2001."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2010.85"},{"key":"e_1_3_2_1_19_1","unstructured":"z0mbie. http:\/\/z0mbie.host.sk.  z0mbie. http:\/\/z0mbie.host.sk."}],"event":{"name":"SECURIT '12: First International Conference on Security of Internet of Things","location":"Kollam India","acronym":"SECURIT '12","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","TCG Trusted Computing Group","Amrita Amrita Vishwa Vidyapeetham","CSA Computer Science Association"]},"container-title":["Proceedings of the First International Conference on Security of Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490454","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2490428.2490454","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:35Z","timestamp":1750232075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490454"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":19,"alternative-id":["10.1145\/2490428.2490454","10.1145\/2490428"],"URL":"https:\/\/doi.org\/10.1145\/2490428.2490454","relation":{},"subject":[],"published":{"date-parts":[[2012,8,17]]},"assertion":[{"value":"2012-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}