{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:00Z","timestamp":1750306500075,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,9]],"date-time":"2015-10-09T00:00:00Z","timestamp":1444348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,9]]},"DOI":"10.1145\/2811411.2811485","type":"proceedings-article","created":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T04:22:54Z","timestamp":1446006174000},"page":"274-279","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Detecting trigger-based behaviors in botnet malware"],"prefix":"10.1145","author":[{"given":"Byeongho","family":"Kang","sequence":"first","affiliation":[{"name":"AhnLab, Seongnam-si, Gyeonggi-do, Korea"}]},{"given":"Jisu","family":"Yang","sequence":"additional","affiliation":[{"name":"AhnLab, Seongnam-si, Gyeonggi-do, Korea"}]},{"given":"Jaehyun","family":"So","sequence":"additional","affiliation":[{"name":"AhnLab, Seongnam-si, Gyeonggi-do, Korea"}]},{"given":"Czang Yeob","family":"Kim","sequence":"additional","affiliation":[{"name":"AhnLab, Seongnam-si, Gyeonggi-do, Korea"}]}],"member":"320","published-online":{"date-parts":[[2015,10,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663761.2664219"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of 18th Annual Network and Distributed System Security Symposium (NDSS)","author":"Kang Min Gyung","year":"2011","unstructured":"Min Gyung Kang , Stephen McCamant , Pongsin Poosankam , and Dawn Song . 2011 . DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation . In Proceedings of 18th Annual Network and Distributed System Security Symposium (NDSS) ( San Diego, California, USA , February 06-09, 2011). Internet Society, Reston, VA. Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, and Dawn Song. 2011. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. In Proceedings of 18th Annual Network and Distributed System Security Symposium (NDSS) (San Diego, California, USA, February 06-09, 2011). Internet Society, Reston, VA."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_1_6_1","unstructured":"Yu Zhu Jaeyeon Jung Dawn Song Tadayoshi Kohno and David Wetherall. 2009. Privacy Scope: A Precise Information Flow Tracking System for Finding Application Leaks. Doctoral Thesis. University of California Berkeley.  Yu Zhu Jaeyeon Jung Dawn Song Tadayoshi Kohno and David Wetherall. 2009. Privacy Scope: A Precise Information Flow Tracking System for Finding Application Leaks. Doctoral Thesis. University of California Berkeley."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIDC.2014.7000307"},{"key":"e_1_3_2_1_8_1","first-page":"65","article-title":"Automatically Identifying Trigger-based Behavior in Malware","volume":"36","author":"Brumley David","year":"2008","unstructured":"David Brumley , Cody Hartwig , Zhenkai Liang , James Newsome , Dawn Song , and Heng Yin . 2008 . Automatically Identifying Trigger-based Behavior in Malware . Advances in Information Security. 36 (2008), 65 -- 88 . Springer, New York, NY. DOI= https:\/\/dx.doi.org\/10.1007\/978-0-387-68768-1_4 10.1007\/978-0-387-68768-1_4 David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, and Heng Yin. 2008. Automatically Identifying Trigger-based Behavior in Malware. Advances in Information Security. 36 (2008), 65--88. Springer, New York, NY. DOI= https:\/\/dx.doi.org\/10.1007\/978-0-387-68768-1_4","journal-title":"Advances in Information Security."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2559912"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.17"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2513228.2513295"},{"volume-title":"Special Issue","author":"Han Kyoung Soo","key":"e_1_3_2_1_12_1","unstructured":"Kyoung Soo Han , BooJoong Kang , and Eul Gyu Im. 2014. Malware Analysis Using Visualized Image Matrices. The Scientific World Journal , Special Issue . Hindawi Publishing Corporation . DOI= https:\/\/dx.doi.org\/10.1155\/2014\/132713 10.1155\/2014 Kyoung Soo Han, BooJoong Kang, and Eul Gyu Im. 2014. Malware Analysis Using Visualized Image Matrices. The Scientific World Journal, Special Issue. Hindawi Publishing Corporation. DOI= https:\/\/dx.doi.org\/10.1155\/2014\/132713"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0242-0"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663761.2664222"},{"key":"e_1_3_2_1_15_1","first-page":"4","article-title":"Malware Similarity Analysis using API Sequence Alignments","volume":"4","author":"Cho In Kyeom","year":"2014","unstructured":"In Kyeom Cho , TaeGuen Kim , Yu Jin Shim , Haeryong Park , Bomin Choi , and Eul Gyu Im . 2014 . Malware Similarity Analysis using API Sequence Alignments . Journal of Internet Services and Information Security (JISIS). 4 , 4 (Nobember 2014), 103--114. In Kyeom Cho, TaeGuen Kim, Yu Jin Shim, Haeryong Park, Bomin Choi, and Eul Gyu Im. 2014. Malware Similarity Analysis using API Sequence Alignments. Journal of Internet Services and Information Security (JISIS). 4, 4 (Nobember 2014), 103--114.","journal-title":"Journal of Internet Services and Information Security (JISIS)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336769"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"volume-title":"Retrieved","year":"2015","key":"e_1_3_2_1_18_1","unstructured":"Verizon. 2015 . 2015 Data Breach Investigations Report (April 15, 2015) . Retrieved April 15, 2015 from http:\/\/www.verizonenterprise.com\/resources\/reports\/rp_data-breach-investigation-report-2015-insider_en_xg.pdf Verizon. 2015. 2015 Data Breach Investigations Report (April 15, 2015). Retrieved April 15, 2015 from http:\/\/www.verizonenterprise.com\/resources\/reports\/rp_data-breach-investigation-report-2015-insider_en_xg.pdf"},{"key":"e_1_3_2_1_19_1","volume-title":"Global Phishing Survey 2H2014 (May 27","author":"APWG.","year":"2015","unstructured":"APWG. 2015. Global Phishing Survey 2H2014 (May 27 , 2015 ). Retrieved August 2, 2015 from http:\/\/apwg.org\/download\/document\/245\/APWG_Global_Phishing_Report_2H_2014.pdf APWG. 2015. Global Phishing Survey 2H2014 (May 27, 2015). Retrieved August 2, 2015 from http:\/\/apwg.org\/download\/document\/245\/APWG_Global_Phishing_Report_2H_2014.pdf"}],"event":{"name":"RACS '15: International Conference on Research in Adaptive and Convergent Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology"],"location":"Prague Czech Republic","acronym":"RACS '15"},"container-title":["Proceedings of the 2015 Conference on research in adaptive and convergent systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2811411.2811485","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2811411.2811485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:49Z","timestamp":1750225729000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2811411.2811485"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,9]]},"references-count":19,"alternative-id":["10.1145\/2811411.2811485","10.1145\/2811411"],"URL":"https:\/\/doi.org\/10.1145\/2811411.2811485","relation":{},"subject":[],"published":{"date-parts":[[2015,10,9]]},"assertion":[{"value":"2015-10-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}