{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:57Z","timestamp":1750221237387,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3268966.3268974","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Quantifying the Effectiveness of Software Diversity using Near-Duplicate Detection Algorithms"],"prefix":"10.1145","author":[{"given":"Joel","family":"Coffman","sequence":"first","affiliation":[{"name":"Johns Hopkins University, Laurel, MD, USA"}]},{"given":"Aurin","family":"Chakravarty","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, Baltimore, MD, USA"}]},{"given":"Joshua A.","family":"Russo","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, Baltimore, MD, USA"}]},{"given":"Andrew S.","family":"Gearhart","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, Laurel, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"23","article-title":"The Methodology of N-Version Programming. In Software Fault Tolerance, Michael R. Lyu (Ed.). John Wiley & Son Inc","volume":"2","author":"Avi\u017eienis Algirdas A.","year":"1995","unstructured":"Algirdas A. Avi\u017eienis . 1995 . The Methodology of N-Version Programming. In Software Fault Tolerance, Michael R. Lyu (Ed.). John Wiley & Son Inc ., Chapter 2 , 23 -- 46 . Algirdas A. Avi\u017eienis. 1995. The Methodology of N-Version Programming. In Software Fault Tolerance, Michael R. Lyu (Ed.). John Wiley & Son Inc., Chapter 2, 23--46.","journal-title":"Chapter"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2014.11"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991114"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241241"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_6_1","volume-title":"Automated evaluation of approximate matching algorithms on real data. Digital Investigation 11 (May","author":"Breitinger Frank","year":"2014","unstructured":"Frank Breitinger and Vassil Roussev . 2014. Automated evaluation of approximate matching algorithms on real data. Digital Investigation 11 (May 2014 ), S10--S17. Frank Breitinger and Vassil Roussev. 2014. Automated evaluation of approximate matching algorithms on real data. Digital Investigation 11 (May 2014), S10--S17."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.17"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2995306.2995309"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2400682.2400683"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/822075.822408"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900550"},{"key":"e_1_3_2_1_14_1","volume-title":"Results of SEI Line-Funded Exploratory New Starts Projects","author":"French David","year":"2012","unstructured":"David French and William Casey . 2012. Results of SEI Line-Funded Exploratory New Starts Projects . Number Carnegie Mellon University\/SEI- 2012 -TR-004. Chapter Fuzzy Hashing Techniques in Applied Malware Analysis, 2--18. David French and William Casey. 2012. Results of SEI Line-Funded Exploratory New Starts Projects. Number Carnegie Mellon University\/SEI-2012-TR-004. Chapter Fuzzy Hashing Techniques in Applied Malware Analysis, 2--18."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00039"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/645925.671516"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148222"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2013.6494997"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276876"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.80"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2821429.2821434"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.015"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_1_25_1","first-page":"3","article-title":"Obfuscating C++ Programs via Control Flow Flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae","volume":"30","author":"L\u00e1szl\u00f3 T\u0131mea","year":"2009","unstructured":"T\u0131mea L\u00e1szl\u00f3 and \u00c1kos Kiss . 2009 . Obfuscating C++ Programs via Control Flow Flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae , Sectio Computatorica 30 (2009), 3 -- 19 . T\u0131mea L\u00e1szl\u00f3 and \u00c1kos Kiss. 2009. Obfuscating C++ Programs via Control Flow Flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae, Sectio Computatorica 30 (2009), 3--19.","journal-title":"Sectio Computatorica"},{"key":"e_1_3_2_1_26_1","volume-title":"Experimental Study of Fuzzy Hashing in Malware Clustering Analysis. In 8th Workshop on Cyber Security Experimentation and Test (CSET '15)","volume":"5","author":"Li Yuping","year":"2015","unstructured":"Yuping Li , Sathya Chandran Sundaramurthy , Alexandru G. Bardas , Xinming Ou , Doina Caragea , Xin Hu , and Jiyong Jang . 2015 . Experimental Study of Fuzzy Hashing in Malware Clustering Analysis. In 8th Workshop on Cyber Security Experimentation and Test (CSET '15) , Vol. 5 . https:\/\/www.usenix.org\/conference\/ cset15\/workshop-program\/presentation\/li Yuping Li, Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Xinming Ou, Doina Caragea, Xin Hu, and Jiyong Jang. 2015. Experimental Study of Fuzzy Hashing in Malware Clustering Analysis. In 8th Workshop on Cyber Security Experimentation and Test (CSET '15), Vol. 5. https:\/\/www.usenix.org\/conference\/ cset15\/workshop-program\/presentation\/li"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2013.9"},{"key":"e_1_3_2_1_28_1","volume-title":"Applications and Techniques in Information Security (ATIS","author":"Oliver Jonathan","year":"2014","unstructured":"Jonathan Oliver , Scott Forman , and Chun Cheng . 2014. Using Randomization to Attack Similarity Digests . In Applications and Techniques in Information Security (ATIS 2014 ), Lynn Batten, Gang Li , Wenjia Niu, and Matthew Warren (Eds .), Vol. 490 . 199--210. Jonathan Oliver, Scott Forman, and Chun Cheng. 2014. Using Randomization to Attack Similarity Digests. In Applications and Techniques in Information Security (ATIS 2014), Lynn Batten, Gang Li, Wenjia Niu, and Matthew Warren (Eds.), Vol. 490. 199--210."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176306"},{"key":"e_1_3_2_1_30_1","volume-title":"Microsoft Malware Classification Challenge. arXiv abs\/1802.10135 (Feb","author":"Ronen Royi","year":"2018","unstructured":"Royi Ronen , Marian Radu , Corina Feuerstein , Elad Yom-Tov , and Mansour Ahmadi . 2018. Microsoft Malware Classification Challenge. arXiv abs\/1802.10135 (Feb . 2018 ). arXiv:1802.10135 http:\/\/arxiv.org\/abs\/1802.10135 Royi Ronen, Marian Radu, Corina Feuerstein, Elad Yom-Tov, and Mansour Ahmadi. 2018. Microsoft Malware Classification Challenge. arXiv abs\/1802.10135 (Feb. 2018). arXiv:1802.10135 http:\/\/arxiv.org\/abs\/1802.10135"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Vassil Roussev. 2010. Data Fingerprinting with Similarity Digests. In Advances in Digital Forensics VI Kam-Pui Chow and Sujeet Shenoi (Eds.). 207--226.  Vassil Roussev. 2010. Data Fingerprinting with Similarity Digests. In Advances in Digital Forensics VI Kam-Pui Chow and Sujeet Shenoi (Eds.). 207--226.","DOI":"10.1007\/978-3-642-15506-2_15"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.05.005"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(92)90078-E"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572287"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01720100"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413682"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 5th ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3268966.3268974","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3268966.3268974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:20Z","timestamp":1750212440000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3268966.3268974"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":36,"alternative-id":["10.1145\/3268966.3268974","10.1145\/3268966"],"URL":"https:\/\/doi.org\/10.1145\/3268966.3268974","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}