{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T22:17:45Z","timestamp":1776464265356,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-19-C-0003"],"award-info":[{"award-number":["FA8750-19-C-0003"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1704253"],"award-info":[{"award-number":["CNS-1704253"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359835","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"444-455","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["Neurlux"],"prefix":"10.1145","author":[{"given":"Chani","family":"Jindal","sequence":"first","affiliation":[{"name":"University of California"}]},{"given":"Christopher","family":"Salls","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Hojjat","family":"Aghakhani","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Keith","family":"Long","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cuckoo automated malware analysis. https:\/\/cuckoosandbox.org\/.  Cuckoo automated malware analysis. https:\/\/cuckoosandbox.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"H. S. Anderson and P. Roth. Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637 2018.  H. S. Anderson and P. Roth. Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637 2018."},{"key":"e_1_3_2_1_3_1","volume-title":"Black Hat USA","author":"Brosch T.","year":"2006"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.01.002"},{"key":"e_1_3_2_1_5_1","volume-title":"HotOS","author":"Garfinkel T.","year":"2007"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.022"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488598000094"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_10_1","unstructured":"Kanchan Sarkar. Recent trends in natural language processing using deep learning 2017. https:\/\/medium.com\/@kanchansarkar\/recent-trends-in-natural-language-processing-using-deep-learning-a1469fbd2ef.  Kanchan Sarkar. Recent trends in natural language processing using deep learning 2017. https:\/\/medium.com\/@kanchansarkar\/recent-trends-in-natural-language-processing-using-deep-learning-a1469fbd2ef."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.01.017"},{"key":"e_1_3_2_1_12_1","first-page":"757","volume-title":"25th {USENIX} Security Symposium ({USENIX} Security 16)","author":"Kharaz A.","year":"2016"},{"key":"e_1_3_2_1_13_1","first-page":"351","volume-title":"USENIX security symposium","author":"Kolbitsch C.","year":"2009"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50127-7_11"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_18"},{"key":"e_1_3_2_1_16_1","unstructured":"M. Long Y. Cao J. Wang and M. I. Jordan. Learning transferable features with deep adaptation networks. arXiv preprint arXiv:1502.02791 2015.  M. Long Y. Cao J. Wang and M. I. Jordan. Learning transferable features with deep adaptation networks. arXiv preprint arXiv:1502.02791 2015."},{"key":"e_1_3_2_1_17_1","unstructured":"L. v. d. Maaten and G. Hinton. Visualizing data using t-sne. Journal of machine learning research 9(Nov):2579--2605 2008.  L. v. d. Maaten and G. Hinton. Visualizing data using t-sne. Journal of machine learning research 9(Nov):2579--2605 2008."},{"key":"e_1_3_2_1_18_1","first-page":"3111","volume-title":"Advances in neural information processing systems","author":"Mikolov T.","year":"2013"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"e_1_3_2_1_21_1","volume-title":"Packt Publishing Ltd","author":"Oktavianto D.","year":"2013"},{"key":"e_1_3_2_1_22_1","first-page":"546","volume-title":"Proceedings of the International Conference Recent Advances in Natural Language Processing RANLP 2013","author":"Paltoglou G.","year":"2013"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.53"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.22"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140442"},{"key":"e_1_3_2_1_26_1","volume-title":"Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence","author":"Raff E.","year":"2018"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75496-1_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.19"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"M. Rhode P. Burnap and K. Jones. Early-stage malware prediction using recurrent neural networks. computers & security 77:578--594 2018.  M. Rhode P. Burnap and K. Jones. Early-stage malware prediction using recurrent neural networks. computers & security 77:578--594 2018.","DOI":"10.1016\/j.cose.2018.05.010"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.14"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.12.016"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774303"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"e_1_3_2_1_34_1","unstructured":"D. Sgandurra L. Mu\u00f1oz-Gonz\u00e1lez R. Mohsen and E. C. Lupu. Automated dynamic analysis of ransomware: Benefits limitations and use for detection. arXiv preprint arXiv:1609.03020 2016.  D. Sgandurra L. Mu\u00f1oz-Gonz\u00e1lez R. Mohsen and E. C. Lupu. Automated dynamic analysis of ransomware: Benefits limitations and use for detection. arXiv preprint arXiv:1609.03020 2016."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"M. K. Shankarapani S. Ramamoorthy R. S. Movva and S. Mukkamala. Malware detection using assembly and api call sequences. Journal in computer virology 7 (2):107--119 2011.  M. K. Shankarapani S. Ramamoorthy R. S. Movva and S. Mukkamala. Malware detection using assembly and api call sequences. Journal in computer virology 7 (2):107--119 2011.","DOI":"10.1007\/s11416-010-0141-5"},{"key":"e_1_3_2_1_36_1","unstructured":"K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 2014.  K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 2014."},{"key":"e_1_3_2_1_37_1","unstructured":"K. Simonyan A. Vedaldi and A. Zisserman. Deep inside convolutional networks: Visualising image classification models and saliency maps. arXiv preprint arXiv:1312.6034 2013.  K. Simonyan A. Vedaldi and A. Zisserman. Deep inside convolutional networks: Visualising image classification models and saliency maps. arXiv preprint arXiv:1312.6034 2013."},{"key":"e_1_3_2_1_38_1","unstructured":"D. Ucci L. Aniello and R. Baldoni. Survey on the usage of machine learning techniques for malware analysis. arXiv preprint arXiv:1710.08189 2017.  D. Ucci L. Aniello and R. Baldoni. Survey on the usage of machine learning techniques for malware analysis. arXiv preprint arXiv:1710.08189 2017."},{"key":"e_1_3_2_1_39_1","first-page":"5998","volume-title":"Advances in neural information processing systems","author":"Vaswani A.","year":"2017"},{"key":"e_1_3_2_1_40_1","unstructured":"VirusTotal. Av comparative analyses. https:\/\/blog.virustotal.com\/2012\/08\/avcomparative-analyses-marketing-and.html. (Accessed: 2019-3-31).  VirusTotal. Av comparative analyses. https:\/\/blog.virustotal.com\/2012\/08\/avcomparative-analyses-marketing-and.html. (Accessed: 2019-3-31)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1174"},{"key":"e_1_3_2_1_42_1","unstructured":"L. Zeltser. How malware generates mutex names to evade detection. https:\/\/isc.sans.edu\/diary\/How+Malware+Generates+Mutex+Names+to+Evade+Detection\/19429\/. (Accessed: 2019-5-31).  L. Zeltser. How malware generates mutex names to evade detection. https:\/\/isc.sans.edu\/diary\/How+Malware+Generates+Mutex+Names+to+Evade+Detection\/19429\/. (Accessed: 2019-5-31)."},{"key":"e_1_3_2_1_43_1","first-page":"1","volume-title":"World Wide Web","author":"Zhang H.","year":"2019"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.04.064"},{"key":"e_1_3_2_1_45_1","unstructured":"C. Zhou C. Sun Z. Liu and F. Lau. A c-lstm neural network for text classification. arXiv preprint arXiv:1511.08630 2015.  C. Zhou C. Sun Z. Liu and F. Lau. A c-lstm neural network for text classification. arXiv preprint arXiv:1511.08630 2015."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359835","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359835","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359835"}},"subtitle":["dynamic malware analysis without feature engineering"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":45,"alternative-id":["10.1145\/3359789.3359835","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359835","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}