{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:11:08Z","timestamp":1771330268348,"version":"3.50.1"},"reference-count":15,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2013,8,26]],"date-time":"2013-08-26T00:00:00Z","timestamp":1377475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2013,8,26]]},"abstract":"<jats:p>Software malware not only creates financial damages to corporate and individual computer users, but also invades privacy, exploits their devices and induces other significant losses. While efficient tools and technologies that control and limit malware spread across devices in the public domain are being developed, the problem is far from being resolved. We worked on a methodology that uses techniques to detect malware during in-house development and prevents malware from being released in the field. This work helps determine and handle situations where a person, authorized to access an authentic signing certificate [1] signs malware (or set of file(s)) intended to perform harmful operations, such as spreading a virus on a computer using the said certificate, and releases the malicious code publically or to a community.<\/jats:p>","DOI":"10.1145\/2507288.2507307","type":"journal-article","created":{"date-parts":[[2013,9,3]],"date-time":"2013-09-03T11:57:11Z","timestamp":1378209431000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Malware signing detection system"],"prefix":"10.1145","volume":"38","author":[{"given":"Ajay","family":"Jain","sequence":"first","affiliation":[{"name":"Adobe Systems"}]},{"given":"Kusha","family":"Chopra","sequence":"additional","affiliation":[{"name":"Adobe Systems"}]}],"member":"320","published-online":{"date-parts":[[2013,8,26]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Signing Certificate http:\/\/www.netscape.ca\/browser\/netscape8\/help\/en\/glossary.html#999493  Signing Certificate http:\/\/www.netscape.ca\/browser\/netscape8\/help\/en\/glossary.html#999493"},{"key":"e_1_2_1_2_1","unstructured":"Virus http:\/\/home.mcafee.com\/virusinfo\/glossary#V  Virus http:\/\/home.mcafee.com\/virusinfo\/glossary#V"},{"key":"e_1_2_1_3_1","unstructured":"Worms http:\/\/home.mcafee.com\/virusinfo\/glossary#W  Worms http:\/\/home.mcafee.com\/virusinfo\/glossary#W"},{"key":"e_1_2_1_4_1","unstructured":"Trojan Horses http:\/\/home.mcafee.com\/virusinfo\/glossary#T  Trojan Horses http:\/\/home.mcafee.com\/virusinfo\/glossary#T"},{"key":"e_1_2_1_5_1","unstructured":"Spyware http:\/\/home.mcafee.com\/virusinfo\/glossary#S  Spyware http:\/\/home.mcafee.com\/virusinfo\/glossary#S"},{"key":"e_1_2_1_6_1","unstructured":"Malicious Code http:\/\/home.mcafee.com\/virusinfo\/glossary#M  Malicious Code http:\/\/home.mcafee.com\/virusinfo\/glossary#M"},{"key":"e_1_2_1_7_1","unstructured":"Gatekeeper http:\/\/support.apple.com\/kb\/HT5290  Gatekeeper http:\/\/support.apple.com\/kb\/HT5290"},{"key":"e_1_2_1_8_1","unstructured":"CodeSign https:\/\/developer.apple.com\/library\/mac\/#documentation\/Security\/Conceptual\/CodeSigningGuide\/AboutCS\/AboutCS.html  CodeSign https:\/\/developer.apple.com\/library\/mac\/#documentation\/Security\/Conceptual\/CodeSigningGuide\/AboutCS\/AboutCS.html"},{"key":"e_1_2_1_9_1","unstructured":"Codesign Commands https:\/\/developer.apple.com\/library\/mac\/#documentation\/Darwin\/Reference\/ManPages\/man1\/codesign.1.html  Codesign Commands https:\/\/developer.apple.com\/library\/mac\/#documentation\/Darwin\/Reference\/ManPages\/man1\/codesign.1.html"},{"key":"e_1_2_1_10_1","unstructured":"Trusted certificates http:\/\/technet.microsoft.com\/en-us\/library\/cc754841.aspx  Trusted certificates http:\/\/technet.microsoft.com\/en-us\/library\/cc754841.aspx"},{"key":"e_1_2_1_11_1","unstructured":"Cryptographic hash Function http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2176  Cryptographic hash Function http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2176"},{"key":"e_1_2_1_12_1","unstructured":"National Security Agency http:\/\/www.nsa.gov\/  National Security Agency http:\/\/www.nsa.gov\/"},{"key":"e_1_2_1_13_1","unstructured":"NIST http:\/\/www.nist.gov\/index.html  NIST http:\/\/www.nist.gov\/index.html"},{"key":"e_1_2_1_14_1","unstructured":"Federal Information Processing Standard http:\/\/www.nist.gov\/itl\/fipsinfo.cfm  Federal Information Processing Standard http:\/\/www.nist.gov\/itl\/fipsinfo.cfm"},{"key":"e_1_2_1_15_1","unstructured":"SHA Functions http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2.pdf  SHA Functions http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2.pdf"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2507288.2507307","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2507288.2507307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:29Z","timestamp":1750231709000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2507288.2507307"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,26]]},"references-count":15,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,8,26]]}},"alternative-id":["10.1145\/2507288.2507307"],"URL":"https:\/\/doi.org\/10.1145\/2507288.2507307","relation":{},"ISSN":["0163-5948"],"issn-type":[{"value":"0163-5948","type":"print"}],"subject":[],"published":{"date-parts":[[2013,8,26]]},"assertion":[{"value":"2013-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}