{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:52:31Z","timestamp":1771699951810,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"University of the Thai Chamber of Commerce"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1054389"],"award-info":[{"award-number":["1054389"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523659","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"69-78","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Extraction of statistically significant malware behaviors"],"prefix":"10.1145","author":[{"given":"Sirinda","family":"Palahan","sequence":"first","affiliation":[{"name":"Penn State University"}]},{"given":"Domagoj","family":"Babi\u0107","sequence":"additional","affiliation":[{"name":"Google, Inc."}]},{"given":"Swarat","family":"Chaudhuri","sequence":"additional","affiliation":[{"name":"Rice University"}]},{"given":"Daniel","family":"Kifer","sequence":"additional","affiliation":[{"name":"Penn State University"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0152-x"},{"key":"e_1_3_2_1_2_1","unstructured":"AVG Antivirus 7.5.519a http:\/\/www.oldversion.com\/download-AVG-Anti-Virus-7.5.519a.html.  AVG Antivirus 7.5.519a http:\/\/www.oldversion.com\/download-AVG-Anti-Virus-7.5.519a.html."},{"key":"e_1_3_2_1_3_1","volume-title":"Malware analysis with tree automata inference","author":"Babi\u0107 D.","year":"2011","unstructured":"D. Babi\u0107 , D. Reynaud , and D. Song . Malware analysis with tree automata inference . In CAV. Springer , 2011 . D. Babi\u0107, D. Reynaud, and D. Song. Malware analysis with tree automata inference. In CAV. Springer, 2011."},{"key":"e_1_3_2_1_4_1","volume-title":"LEET","author":"Bayer U.","year":"2009","unstructured":"U. Bayer , I. Habibi , D. Balzarotti , E. Kirda , and C. Kruegel . A view on current malware behaviors . In LEET , 2009 . U. Bayer, I. Habibi, D. Balzarotti, E. Kirda, and C. Kruegel. A view on current malware behaviors. In LEET, 2009."},{"key":"e_1_3_2_1_5_1","volume-title":"Statistical inference","author":"Casella G.","year":"2001","unstructured":"G. Casella and R. Berger . Statistical inference . Duxbury Press , 2001 . G. Casella and R. Berger. Statistical inference. Duxbury Press, 2001."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-35488-8_13"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1342211.1342215"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.12"},{"key":"e_1_3_2_1_9_1","volume-title":"Introduction to Algorithms","author":"Cormen T. H.","year":"2001","unstructured":"T. H. Cormen , C. E. Leiserson , R. L. Rivest , and C. Stein . Introduction to Algorithms . The MIT Press , 2 edition, 2001 . T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms. The MIT Press, 2 edition, 2001."},{"key":"e_1_3_2_1_10_1","volume-title":"ICEIS","author":"Devesa J.","year":"2010","unstructured":"J. Devesa , I. Santos , X. Cantero , Y. Penya , and P. Bringas . Automatic behaviour-based analysis and classification system for malware detection . In ICEIS , 2010 . J. Devesa, I. Santos, X. Cantero, Y. Penya, and P. Bringas. Automatic behaviour-based analysis and classification system for malware detection. In ICEIS, 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1390681.1442794"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.11"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.79"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_5"},{"key":"e_1_3_2_1_15_1","volume-title":"May","year":"2012","unstructured":"Mcafee labs threat center. www.mcafee.com\/us\/mcafee-labs.aspx\/ , May 2012 . Mcafee labs threat center. www.mcafee.com\/us\/mcafee-labs.aspx\/, May 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.298.5594.824"},{"key":"e_1_3_2_1_17_1","volume-title":"NDSS","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software . In NDSS , 2005 . J. Newsome and D. Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In NDSS, 2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.133"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.2006.13.133"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73614-1_6"},{"key":"e_1_3_2_1_21_1","volume-title":"Nov","year":"2012","unstructured":"Symantec security research centers. www.symantec.com\/security_response\/ , Nov 2012 . Symantec security research centers. www.symantec.com\/security_response\/, Nov 2012."},{"key":"e_1_3_2_1_22_1","unstructured":"ThreatFire v3.0.0.15 Beta 1 http:\/\/www.afterdawn.com\/software\/general\/download_splash.cfm\/threatfire?software_id=1369&version_id=6190.  ThreatFire v3.0.0.15 Beta 1 http:\/\/www.afterdawn.com\/software\/general\/download_splash.cfm\/threatfire?software_id=1369&version_id=6190."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"key":"e_1_3_2_1_24_1","volume-title":"June","year":"2012","unstructured":"Wusstrace. http:\/\/code.google.com\/p\/wusstrace\/ , June 2012 . Wusstrace. http:\/\/code.google.com\/p\/wusstrace\/, June 2012."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376662"},{"key":"e_1_3_2_1_26_1","volume-title":"ICDM","author":"Yan X.","year":"2002","unstructured":"X. Yan and J. Han . gspan: Graph-based substructure pattern mining . In ICDM , 2002 . X. Yan and J. Han. gspan: Graph-based substructure pattern mining. In ICDM, 2002."}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","location":"New Orleans Louisiana USA","acronym":"ACSAC '13","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523659","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523659"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":26,"alternative-id":["10.1145\/2523649.2523659","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523659","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}