{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:30Z","timestamp":1750308690407,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3326301","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"302-303","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Ensemble malware analysis for evaluating the integrity of mission critical devices poster"],"prefix":"10.1145","author":[{"given":"Robert","family":"Heras","sequence":"first","affiliation":[{"name":"Florida International University"}]},{"given":"Alexander","family":"Perez-Pons","sequence":"additional","affiliation":[{"name":"Florida International University"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"A. S. A. Aziz A. E. Hassanien S. E. Hanaf and M. F. Tolba. 2013. Multi-layer hybrid machine learning techniques for anomalies detection and classification approach. (Dec 2013) 215--220 pages. A. S. A. Aziz A. E. Hassanien S. E. Hanaf and M. F. Tolba. 2013. Multi-layer hybrid machine learning techniques for anomalies detection and classification approach. (Dec 2013) 215--220 pages.","DOI":"10.1109\/HIS.2013.6920485"},{"key":"e_1_3_2_1_2_1","unstructured":"S Bandyopadhyay. {n. d.}. A Study on Performance Monitoring Counters in x86-Architecture. ({n. d.}). S Bandyopadhyay. {n. d.}. A Study on Performance Monitoring Counters in x86-Architecture. ({n. d.})."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2013.55"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Raymond Canzanese. 2015. Detection and Classification of Malicious Processes Using System Call Analysis. (2015). Raymond Canzanese. 2015. Detection and Classification of Malicious Processes Using System Call Analysis. (2015).","DOI":"10.1109\/MALWARE.2015.7413681"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413681"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.26"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Martim Carbone Weidong Cui Long Lu Wenke Lee Marcus Peinado and Xuxian Jiang. 2009. Mapping Kernel Objects to Enable Systematic Integrity Checking. (2009) 11 pages. Martim Carbone Weidong Cui Long Lu Wenke Lee Marcus Peinado and Xuxian Jiang. 2009. Mapping Kernel Objects to Enable Systematic Integrity Checking. (2009) 11 pages.","DOI":"10.1145\/1653662.1653729"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Brendan Dolan-Gavitt Abhinav Srivastava Patrick Traynor and Jonathon Giffin. 2009. Robust Signatures for Kernel Data Structures. (2009) 12 pages. Brendan Dolan-Gavitt Abhinav Srivastava Patrick Traynor and Jonathon Giffin. 2009. Robust Signatures for Kernel Data Structures. (2009) 12 pages.","DOI":"10.1145\/1653662.1653730"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"E. Dorj and E. Altangerel. 2013. Anomaly detection approach using Hidden Markov Model. (June 2013) 141--144 pages. E. Dorj and E. Altangerel. 2013. Anomaly detection approach using Hidden Markov Model. (June 2013) 141--144 pages.","DOI":"10.1109\/IFOST.2013.6616874"},{"key":"e_1_3_2_1_10_1","unstructured":"S. Forrest S. A. Hofmeyr A. Somayaji and T. A. Longstaff. 1996. A sense of self for Unix processes. (May 1996) 120--128 pages. S. Forrest S. A. Hofmeyr A. Somayaji and T. A. Longstaff. 1996. A sense of self for Unix processes. (May 1996) 120--128 pages."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Z. Fuyong and Z. Tiezhu. 2017. Malware Detection and Classification Based on N-Grams Attribute Similarity. (July 2017) 793--796 pages. Z. Fuyong and Z. Tiezhu. 2017. Malware Detection and Classification Based on N-Grams Attribute Similarity. (July 2017) 793--796 pages.","DOI":"10.1109\/CSE-EUC.2017.157"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"M. Jaiswal Y. Malik and F. Jaafar. 2018. Android gaming malware detection using system call analysis. (March 2018) 5 pages. M. Jaiswal Y. Malik and F. Jaafar. 2018. Android gaming malware detection using system call analysis. (March 2018) 5 pages.","DOI":"10.1109\/ISDFS.2018.8355360"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2011.17"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2291964"},{"key":"e_1_3_2_1_15_1","unstructured":"Konrad Rieck Philipp Trinius Carsten Willems and Thorsten Holz. 2011. Automatic Analysis of Malware Behavior Using Machine Learning. (Dec. 2011) 30 pages. http:\/\/dl.acm.org\/citation.cfm?id=2011216.2011217 Konrad Rieck Philipp Trinius Carsten Willems and Thorsten Holz. 2011. Automatic Analysis of Malware Behavior Using Machine Learning. (Dec. 2011) 30 pages. http:\/\/dl.acm.org\/citation.cfm?id=2011216.2011217"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"F. Shahzad S. Bhatti M. Shahzad and M. Farooq. 2011. In-Execution Malware Detection Using Task Structures of Linux Processes. (June 2011) 6 pages. F. Shahzad S. Bhatti M. Shahzad and M. Farooq. 2011. In-Execution Malware Detection Using Task Structures of Linux Processes. (June 2011) 6 pages.","DOI":"10.1109\/icc.2011.5963012"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2008.16"},{"key":"e_1_3_2_1_18_1","unstructured":"H. Upadhyay Pons Dr. Dr. A. and H. A. Gohel. {n. d.}. Dr. & Lagos L. Dr. (2018). ({n. d.}). H. Upadhyay Pons Dr. Dr. A. and H. A. Gohel. {n. d.}. Dr. & Lagos L. Dr. (2018). ({n. d.})."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.25046\/aj030104"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741874"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2012.134"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Z. Xu S. Ray P. Subramanyan and S. Malik. 2017. Malware detection using machine learning based analysis of virtual memory access patterns. (March 2017) 169--174 pages. Z. Xu S. Ray P. Subramanyan and S. Malik. 2017. Malware detection using machine learning based analysis of virtual memory access patterns. (March 2017) 169--174 pages.","DOI":"10.23919\/DATE.2017.7926977"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"X. Yuan. 2017. PhD Forum: Deep Learning-Based Real-Time Malware Detection with Multi-Stage Analysis. (May 2017) 2 pages. X. Yuan. 2017. PhD Forum: Deep Learning-Based Real-Time Malware Detection with Multi-Stage Analysis. (May 2017) 2 pages.","DOI":"10.1109\/SMARTCOMP.2017.7946997"},{"volume-title":"Fest: A feature extraction and selection tool for Android malware detection. (July","year":"2015","author":"Zhao K.","key":"e_1_3_2_1_24_1"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Miami Florida","acronym":"WiSec '19"},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3326301","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3326301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3326301"}},"subtitle":["poster"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":24,"alternative-id":["10.1145\/3317549.3326301","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3326301","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}