{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:33Z","timestamp":1750220913948,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001866","name":"Fonds National de la Recherche Luxembourg","doi-asserted-by":"publisher","award":["PoC18\/13234766-NoCry"],"award-info":[{"award-number":["PoC18\/13234766-NoCry"]}],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["779391"],"award-info":[{"award-number":["779391"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359844","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"456-465","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A game of \"Cut and Mouse\""],"prefix":"10.1145","author":[{"given":"Ziya Alper","family":"Gen\u00e7","sequence":"first","affiliation":[{"name":"University of Luxembourg"}]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[{"name":"University of Luxembourg"}]},{"given":"Daniele","family":"Sgandurra","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"volume-title":"Advances in Computers.","author":"Ahmadvand Mohsen","key":"e_1_3_2_1_1_1","unstructured":"Mohsen Ahmadvand , Alexander Pretschner , and Florian Kelbert . 2019. A taxonomy of software integrity protection techniques . In Advances in Computers. Vol. 112 . Elsevier , Cambridge, MA, USA , 413--486. Mohsen Ahmadvand, Alexander Pretschner, and Florian Kelbert. 2019. A taxonomy of software integrity protection techniques. In Advances in Computers. Vol. 112. Elsevier, Cambridge, MA, USA, 413--486."},{"volume-title":"Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats (LEET'11)","author":"Mohammed","key":"e_1_3_2_1_2_1","unstructured":"Mohammed I. Al-Saleh and Jedidiah R. Crandall. 2011. Application-level Reconnaissance: Timing Channel Attacks Against Antivirus Software . In Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats (LEET'11) . USENIX Association, Berkeley, CA, USA, 9. Mohammed I. Al-Saleh and Jedidiah R. Crandall. 2011. Application-level Reconnaissance: Timing Channel Attacks Against Antivirus Software. In Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats (LEET'11). USENIX Association, Berkeley, CA, USA, 9."},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"Chris Paget","year":"2002","unstructured":"Chris Paget (alias Foon). 2002 . Exploiting design flaws in the Win32 API for privilege escalation . Retrieved May 15, 2019 from https:\/\/web.archive.org\/web\/20060904080018\/http:\/\/security.tombom.co.uk\/shatter.html Chris Paget (alias Foon). 2002. Exploiting design flaws in the Win32 API for privilege escalation. Retrieved May 15, 2019 from https:\/\/web.archive.org\/web\/20060904080018\/http:\/\/security.tombom.co.uk\/shatter.html"},{"key":"e_1_3_2_1_4_1","unstructured":"Hyrum S. Anderson Anant Kharkar Bobby Filar David Evans and Phil Roth. 2018. Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning. arXiv:cs.CR\/1801.08917 Hyrum S. Anderson Anant Kharkar Bobby Filar David Evans and Phil Roth. 2018. Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning. arXiv:cs.CR\/1801.08917"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"TEST.","year":"2019","unstructured":"AV- TEST. 2019 . The best antivirus software for Windows Home User . Retrieved June 10, 2019 from https:\/\/www.av-test.org\/en\/antivirus\/home-windows\/ AV-TEST. 2019. The best antivirus software for Windows Home User. Retrieved June 10, 2019 from https:\/\/www.av-test.org\/en\/antivirus\/home-windows\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3264418"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013886.1007518"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134599"},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","author":"Greenberg Andy","year":"2019","unstructured":"Andy Greenberg . 2019 . Another Mac Bug Lets Hackers Invisibly Click Security Prompts . Retrieved June 10, 2019 from https:\/\/www.wired.com\/story\/apple-macos-bug-synthetic-clicks\/ Andy Greenberg. 2019. Another Mac Bug Lets Hackers Invisibly Click Security Prompts. Retrieved June 10, 2019 from https:\/\/www.wired.com\/story\/apple-macos-bug-synthetic-clicks\/"},{"key":"e_1_3_2_1_12_1","volume-title":"Retrieved","author":"Mitchell Hamline IT","year":"2017","unstructured":"IT Services of Mitchell Hamline School of Law . 2017 . Technology Notice - Disable Antivirus before using Examplify . Retrieved May 31, 2019 from https:\/\/mitchellhamline.edu\/technology\/2017\/12\/03\/technology-notice-disable-antivirus-before-using-examplify\/ IT Services of Mitchell Hamline School of Law. 2017. Technology Notice - Disable Antivirus before using Examplify. Retrieved May 31, 2019 from https:\/\/mitchellhamline.edu\/technology\/2017\/12\/03\/technology-notice-disable-antivirus-before-using-examplify\/"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"S. Josefsson. 2006. The Base16 Base32 and Base64 Data Encodings. RFC 4648. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc4648.txt http:\/\/www.rfc-editor.org\/rfc\/rfc4648.txt. S. Josefsson. 2006. The Base16 Base32 and Base64 Data Encodings. RFC 4648. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc4648.txt http:\/\/www.rfc-editor.org\/rfc\/rfc4648.txt.","DOI":"10.17487\/rfc4648"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813642"},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved","author":"Koret Joxean","year":"2014","unstructured":"Joxean Koret . 2014 . Breaking Antivirus Software . Retrieved June 10, 2019 from http:\/\/joxeankoret.com\/download\/breaking_av_software_44con.pdf Joxean Koret. 2014. Breaking Antivirus Software. Retrieved June 10, 2019 from http:\/\/joxeankoret.com\/download\/breaking_av_software_44con.pdf"},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","author":"Koret Joxean","year":"2016","unstructured":"Joxean Koret . 2016 . AV: Additional Vulnerabilities . Retrieved June 10, 2019 from https:\/\/www.hoystreaming.com\/wp-content\/uploads\/2016\/03\/hb_bilbo.pdf Joxean Koret. 2016. AV: Additional Vulnerabilities. Retrieved June 10, 2019 from https:\/\/www.hoystreaming.com\/wp-content\/uploads\/2016\/03\/hb_bilbo.pdf"},{"volume-title":"The Antivirus Hacker's Handbook","author":"Koret Joxean","key":"e_1_3_2_1_17_1","unstructured":"Joxean Koret and Elias Bachaalany . 2015. The Antivirus Hacker's Handbook . John Wiley & Sons , Indianapolis, IN, USA . Joxean Koret and Elias Bachaalany. 2015. The Antivirus Hacker's Handbook. John Wiley & Sons, Indianapolis, IN, USA."},{"volume-title":"2019 2019 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society","author":"Maruyama S.","key":"e_1_3_2_1_18_1","unstructured":"S. Maruyama , S. Wakabayashi , and T. Mori . 2019. Tap 'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens . In 2019 2019 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society , Los Alamitos, CA, USA, 628--645. S. Maruyama, S. Wakabayashi, and T. Mori. 2019. Tap 'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens. In 2019 2019 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, Los Alamitos, CA, USA, 628--645."},{"volume-title":"Disclosure of Security Vulnerabilities: Legal and Ethical Issues","author":"Maurushat Alana","key":"e_1_3_2_1_19_1","unstructured":"Alana Maurushat . 2013. Disclosure of Security Vulnerabilities: Legal and Ethical Issues . Springer-Verlag London , London . Alana Maurushat. 2013. Disclosure of Security Vulnerabilities: Legal and Ethical Issues. Springer-Verlag London, London."},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_1_20_1","unstructured":"Microsoft. 2019 . Driver security checklist . Retrieved June 10, 2019 from https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/driversecurity\/driver-security-checklist Microsoft. 2019. Driver security checklist. Retrieved June 10, 2019 from https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/driversecurity\/driver-security-checklist"},{"key":"e_1_3_2_1_21_1","first-page":"2017","volume-title":"Retrieved","author":"NIST.","year":"2017","unstructured":"NIST. 2017 . NVD - CVE-2017-7150 . Retrieved June 10, 2019 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE- 2017 - 7150 NIST. 2017. NVD - CVE-2017-7150. Retrieved June 10, 2019 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-7150"},{"key":"e_1_3_2_1_22_1","volume-title":"Retrieved","author":"Nohl Karsten","year":"2014","unstructured":"Karsten Nohl , Sascha Kri\u00dfler , and Jakob Lell . 2014 . BadUSB---On accessories that turn evil . Retrieved May 15, 2019 from https:\/\/srlabs.de\/wp-content\/uploads\/2014\/07\/SRLabs-BadUSB-BlackHat-v1.pdf Karsten Nohl, Sascha Kri\u00dfler, and Jakob Lell. 2014. BadUSB---On accessories that turn evil. Retrieved May 15, 2019 from https:\/\/srlabs.de\/wp-content\/uploads\/2014\/07\/SRLabs-BadUSB-BlackHat-v1.pdf"},{"key":"e_1_3_2_1_23_1","unstructured":"Working Group Dual Use of the Flemish Interuniversity Council. 2017. Guidelines for researchers on dual use and misuse of research. Working Group Dual Use of the Flemish Interuniversity Council. 2017. Guidelines for researchers on dual use and misuse of research."},{"key":"e_1_3_2_1_24_1","volume-title":"Retrieved","author":"OPSWAT.","year":"2019","unstructured":"OPSWAT. 2019 . Windows Anti-malware Market Share Report . Retrieved June 10, 2019 from https:\/\/metadefender.opswat.com\/reports\/anti-malware-market-share#!\/ OPSWAT. 2019. Windows Anti-malware Market Share Report. Retrieved June 10, 2019 from https:\/\/metadefender.opswat.com\/reports\/anti-malware-market-share#!\/"},{"key":"e_1_3_2_1_25_1","volume-title":"Retrieved","author":"Ormandy Tavis","year":"2015","unstructured":"Tavis Ormandy . 2015 . Analysis and Exploitation of an ESET Vulnerability . Retrieved June 10, 2019 from https:\/\/googleprojectzero.blogspot.com\/2015\/06\/analysis-and-exploitation-of-eset.html Tavis Ormandy. 2015. Analysis and Exploitation of an ESET Vulnerability. Retrieved June 10, 2019 from https:\/\/googleprojectzero.blogspot.com\/2015\/06\/analysis-and-exploitation-of-eset.html"},{"key":"e_1_3_2_1_26_1","volume-title":"Retrieved","author":"Ormandy Tavis","year":"2016","unstructured":"Tavis Ormandy . 2016 . How to Compromise the Enterprise Endpoint . Retrieved June 10, 2019 from https:\/\/googleprojectzero.blogspot.com\/2016\/06\/how-to-compromise-enterprise-endpoint.html Tavis Ormandy. 2016. How to Compromise the Enterprise Endpoint. Retrieved June 10, 2019 from https:\/\/googleprojectzero.blogspot.com\/2016\/06\/how-to-compromise-enterprise-endpoint.html"},{"key":"e_1_3_2_1_27_1","volume-title":"Retrieved","author":"Pro TaxSlayer","year":"2017","unstructured":"TaxSlayer Pro . 2017 . Quick Start Manual . Retrieved June 10, 2019 from http:\/\/downloads.taxslayer.com\/online\/2017-Quick-Start-Manual.pdf TaxSlayer Pro. 2017. Quick Start Manual. Retrieved June 10, 2019 from http:\/\/downloads.taxslayer.com\/online\/2017-Quick-Start-Manual.pdf"},{"volume-title":"The Bell and La Padula Security Model. Computer Science Laboratory","author":"Rushby John","key":"e_1_3_2_1_28_1","unstructured":"John Rushby . 1986. The Bell and La Padula Security Model. Computer Science Laboratory , SRI International, Menlo Park, CA . Draft Technical Note . John Rushby. 1986. The Bell and La Padula Security Model. Computer Science Laboratory, SRI International, Menlo Park, CA. Draft Technical Note."},{"key":"e_1_3_2_1_29_1","unstructured":"Monirul I. Sharif Andrea Lanzi Jonathon T. Giffin and Wenke Lee. 2008. Impeding Malware Analysis Using Conditional Code Obfuscation. Monirul I. Sharif Andrea Lanzi Jonathon T. Giffin and Wenke Lee. 2008. Impeding Malware Analysis Using Conditional Code Obfuscation."},{"volume-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14)","author":"Springall Drew","key":"e_1_3_2_1_30_1","unstructured":"Drew Springall , Travis Finkenauer , Zakir Durumeric , Jason Kitcat , Harri Hursti , Margaret MacAlpine , and J. Alex Halderman . 2014. Security Analysis of the Estonian Internet Voting System . In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14) . ACM, New York, NY, USA, 703--715. Drew Springall, Travis Finkenauer, Zakir Durumeric, Jason Kitcat, Harri Hursti, Margaret MacAlpine, and J. Alex Halderman. 2014. Security Analysis of the Estonian Internet Voting System. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). ACM, New York, NY, USA, 703--715."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.1080.0397"},{"key":"e_1_3_2_1_32_1","volume-title":"Retrieved","author":"Xue Feng","year":"2008","unstructured":"Feng Xue . 2008 . Attacking Antivirus . Retrieved June 10, 2019 from https:\/\/blackhat.com\/presentations\/bh-europe-08\/Feng-Xue\/Presentation\/bh-eu-08-xue.pdf Feng Xue. 2008. Attacking Antivirus. Retrieved June 10, 2019 from https:\/\/blackhat.com\/presentations\/bh-europe-08\/Feng-Xue\/Presentation\/bh-eu-08-xue.pdf"},{"key":"e_1_3_2_1_33_1","unstructured":"Feng Xue. 2008. Attacking The Antivirus. Feng Xue. 2008. Attacking The Antivirus."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"key":"e_1_3_2_1_35_1","volume-title":"Malware Obfuscation Techniques: A Brief Survey. In International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA '10)","author":"You Ilsun","year":"2010","unstructured":"Ilsun You and Kangbin Yim . 2010 . Malware Obfuscation Techniques: A Brief Survey. In International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA '10) . IEEE, Piscataway, New Jersey, US, 4. Ilsun You and Kangbin Yim. 2010. Malware Obfuscation Techniques: A Brief Survey. In International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA '10). IEEE, Piscataway, New Jersey, US, 4."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","acronym":"ACSAC '19","location":"San Juan Puerto Rico USA"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359844","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359844"}},"subtitle":["bypassing antivirus by simulating user inputs"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":34,"alternative-id":["10.1145\/3359789.3359844","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359844","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}