{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:42:06Z","timestamp":1775230926374,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-11-10111"],"award-info":[{"award-number":["N00014-11-10111"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0845559, CNS-0905537"],"award-info":[{"award-number":["CNS-0845559, CNS-0905537"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF0910553"],"award-info":[{"award-number":["W911NF0910553"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523682","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"89-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["SigMal"],"prefix":"10.1145","author":[{"given":"Dhilung","family":"Kirat","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara"}]},{"given":"Lakshmanan","family":"Nataraj","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara"}]},{"given":"B. S.","family":"Manjunath","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anubis. http:\/\/anubis.iseclab.org.  Anubis. http:\/\/anubis.iseclab.org."},{"key":"e_1_3_2_1_2_1","unstructured":"VirusTotal. http:\/\/www.virustotal.com.  VirusTotal. http:\/\/www.virustotal.com."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025118.1025582"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of NDSS'09","author":"Bayer U.","year":"2009"},{"key":"e_1_3_2_1_5_1","volume-title":"Virus Bulletin Conference","author":"Carrera E.","year":"2004"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/29.1644"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646396.1646421"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_6"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046742"},{"issue":"1","key":"e_1_3_2_1_11_1","article-title":"Malware phylogeny generation using permutations of code","volume":"1","author":"Karim M.","year":"2005","journal-title":"Journal in Computer Virology"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/AMS.2007.31"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248547.1248646"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.015"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_11"},{"key":"e_1_3_2_1_16_1","volume-title":"McAfee","author":"Labs M.","year":"2013"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of RAID'10","author":"Li P.","year":"2010"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.531803"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-009-0122-8"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011139631724"},{"key":"e_1_3_2_1_22_1","volume-title":"International Computer Science Institute Berkeley","author":"Omohundro S. M.","year":"1989"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.22"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.06.016"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of NSDI","author":"Perdisci R.","year":"2010"},{"key":"e_1_3_2_1_26_1","volume-title":"InfoSec Southwest","author":"Raman K.","year":"2012"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.14"},{"key":"e_1_3_2_1_28_1","volume-title":"Inc.","author":"Salembier P.","year":"2002"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5220\/0001863603170320"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884439"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_7"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1599272.1599278"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/946247.946665"},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. BlackHat DC Conf.","author":"Walenstein A.","year":"2007"},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)","author":"Wicherski G.","year":"2009"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","location":"New Orleans Louisiana USA","acronym":"ACSAC '13","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523682","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523682"}},"subtitle":["a static signal processing based malware triage"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":35,"alternative-id":["10.1145\/2523649.2523682","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523682","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}