{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:40Z","timestamp":1750306780899,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523677","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"79-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["DUET"],"prefix":"10.1145","author":[{"given":"Xin","family":"Hu","sequence":"first","affiliation":[{"name":"IBM T.J. Watson Research Labs"}]},{"given":"Kang G.","family":"Shin","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Unpackers. http:\/\/www.exetools.com\/unpackers.htm.  Unpackers. http:\/\/www.exetools.com\/unpackers.htm."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1162\/153244303321897735"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381896.2381900"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1776434.1776449"},{"key":"e_1_3_2_1_5_1","volume-title":"NDSS","author":"Balzarotti D.","year":"2010","unstructured":"D. Balzarotti , M. Cova , C. Karlberger , C. Kruegel , E. Kirda , and G. Vigna . Efficient detection of split personalities in malware . In NDSS , 2010 . D. Balzarotti, M. Cova, C. Karlberger, C. Kruegel, E. Kirda, and G. Vigna. Efficient detection of split personalities in malware. In NDSS, 2010."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of the 16th NDSS","author":"Bayer U.","year":"2009","unstructured":"U. Bayer , P. Comparetti , C. Hlauschek , C. Kruegel , and E. Kirda . Scalable, behavior-based malware clustering . In Proc. of the 16th NDSS , 2009 . U. Bayer, P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, behavior-based malware clustering. In Proc. of the 16th NDSS, 2009."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of the 12th USENIX Security Symposium","author":"Christodorescu M.","year":"2003","unstructured":"M. Christodorescu and S. Jha . Static analysis of executables to detect malicious patterns . In Proc. of the 12th USENIX Security Symposium , 2003 . M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. In Proc. of the 12th USENIX Security Symposium, 2003."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859085"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/648055.743949"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/846227.848563"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217303"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_6"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.03.007"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046742"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-005-0002-9"},{"key":"e_1_3_2_1_17_1","unstructured":"Karypis Lab. Hypergraph partitioning software. http:\/\/glaros.dtc.umn.edu\/gkhome\/views\/metis 2010.  Karypis Lab. Hypergraph partitioning software. http:\/\/glaros.dtc.umn.edu\/gkhome\/views\/metis 2010."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046740"},{"key":"e_1_3_2_1_19_1","first-page":"2006","article-title":"Learning to detect and classify malicious executables in the wild","volume":"7","author":"Kolter J. Z.","year":"2006","unstructured":"J. Z. Kolter and M. A. Maloof . Learning to detect and classify malicious executables in the wild . Journal of Machine Learning Research , 7 : 2006 , 2006 . J. Z. Kolter and M. A. Maloof. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research, 7:2006, 2006.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_20_1","volume-title":"Automatic analysis of malware behavior using machine learning. Technical report","author":"Konrad Rieck C. W.","year":"2011","unstructured":"C. W. Konrad Rieck , Philipp Trinius and T. Holz . Automatic analysis of malware behavior using machine learning. Technical report , 2011 . C. W. Konrad Rieck, Philipp Trinius and T. Holz. Automatic analysis of malware behavior using machine learning. Technical report, 2011."},{"key":"e_1_3_2_1_21_1","volume-title":"2nd USENIX Workshop on LEET","author":"Kruegel C.","year":"2009","unstructured":"C. Kruegel , E. Kirda , U. Bayer , D. Balzarotti , and I. Habibi . A view on current malware behaviors . In 2nd USENIX Workshop on LEET , 2009 . C. Kruegel, E. Kirda, U. Bayer, D. Balzarotti, and I. Habibi. A view on current malware behaviors. In 2nd USENIX Workshop on LEET, 2009."},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Security'04","author":"Kruegel C.","year":"2004","unstructured":"C. Kruegel , W. Robertson , F. Valeur , and G. Vigna . Static disassembly of obfuscated binaries . In USENIX Security'04 , 2004 . C. Kruegel, W. Robertson, F. Valeur, and G. Vigna. Static disassembly of obfuscated binaries. In USENIX Security'04, 2004."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of EICAR Conference","author":"Lee T.","year":"2006","unstructured":"T. Lee and J. J. Mody . Behavioral classification . In Proceedings of EICAR Conference , 2006 . T. Lee and J. J. Mody. Behavioral classification. In Proceedings of EICAR Conference, 2006."},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"Exploiting diverse observation perspectives to get insights on the malware landscape","author":"Leita C.","year":"2010","unstructured":"C. Leita , U. Bayer , and E. Kirda . Exploiting diverse observation perspectives to get insights on the malware landscape . In DSN , 1 2010 . C. Leita, U. Bayer, and E. Kirda. Exploiting diverse observation perspectives to get insights on the malware landscape. In DSN, 1 2010.","journal-title":"DSN"},{"key":"e_1_3_2_1_25_1","unstructured":"T. Liston. On the cutting edge: Thwarting virtual machine detection http:\/\/handlers.sans.org.\/tliston\/ThwartingVMDetection_Liston_Skoudis.pdf.  T. Liston. On the cutting edge: Thwarting virtual machine detection http:\/\/handlers.sans.org.\/tliston\/ThwartingVMDetection_Liston_Skoudis.pdf."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.17"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_6"},{"key":"e_1_3_2_1_28_1","unstructured":"P. Security. Bredolab.aw. http:\/\/www.pandasecurity.com\/homeusers\/security-info\/220087\/Bredolab.AW.  P. Security. Bredolab.aw. http:\/\/www.pandasecurity.com\/homeusers\/security-info\/220087\/Bredolab.AW."},{"key":"e_1_3_2_1_29_1","volume-title":"Recent Advances in Intrusion Detection.","author":"Srivastava A.","year":"2010","unstructured":"A. Srivastava and J. Giffin . Raid . In Recent Advances in Intrusion Detection. 2010 . A. Srivastava and J. Giffin. Raid. In Recent Advances in Intrusion Detection. 2010."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2005.13"},{"key":"e_1_3_2_1_31_1","unstructured":"G. Wicherski. pehash: A novel approach to fast malware clustering. In LEET'2009.   G. Wicherski. pehash: A novel approach to fast malware clustering. In LEET'2009 ."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835820"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"New Orleans Louisiana USA","acronym":"ACSAC '13"},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523677","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523677","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523677"}},"subtitle":["integration of dynamic and static analyses for malware clustering with cluster ensembles"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":32,"alternative-id":["10.1145\/2523649.2523677","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523677","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}