{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:26:42Z","timestamp":1775579202358,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministerio de Ciencia, Innovaci\u00f3n y Universidades","award":["RTI2018-102043-B-I00,FPU18\/06416"],"award-info":[{"award-number":["RTI2018-102043-B-I00,FPU18\/06416"]}]},{"DOI":"10.13039\/501100006541","name":"Comunidad de Madrid","doi-asserted-by":"publisher","award":["P2018\/TCS-4339,PEJD-2018-PRE\/TIC-9571"],"award-info":[{"award-number":["P2018\/TCS-4339,PEJD-2018-PRE\/TIC-9571"]}],"id":[{"id":"10.13039\/501100006541","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427261","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"42-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":99,"title":["AVclass2: Massive Malware Tag Extraction from AV Labels"],"prefix":"10.1145","author":[{"given":"Silvia","family":"Sebasti\u00e1n","sequence":"first","affiliation":[{"name":"IMDEA Software Institute"}]},{"given":"Juan","family":"Caballero","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Spain"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Drebin: Efficient and Explainable Detection of Android Malware in Your Pocket. In Network and Distributed System Security.","author":"Arp Daniel","year":"2014"},{"key":"e_1_3_2_1_2_1","volume-title":"Automated Classification and Analysis of Internet Malware. In International Symposium on Recent Advances in Intrusion Detection.","author":"Bailey Michael","year":"2007"},{"key":"e_1_3_2_1_3_1","unstructured":"Ulrich Bayer Paolo\u00a0Milani Comparetti Clemens Hlauschek Christopher Kruegel and Engin Kirda. 2009. Scalable Behavior-Based Malware Clustering. In Network and Distributed System Security.  Ulrich Bayer Paolo\u00a0Milani Comparetti Clemens Hlauschek Christopher Kruegel and Engin Kirda. 2009. Scalable Behavior-Based Malware Clustering. In Network and Distributed System Security."},{"key":"e_1_3_2_1_4_1","volume-title":"The Common Malware Enumeration Initiative. In Virus Bulletin Conference.","author":"Beck Desiree","year":"2006"},{"key":"e_1_3_2_1_5_1","volume-title":"Large Scale Malware Collection: Lessons Learned. In IEEE SRDS Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems.","author":"Canto Julio","year":"2008"},{"key":"e_1_3_2_1_6_1","volume-title":"CARO Virus Naming Convention. http:\/\/www.caro.org\/articles\/naming.html.","author":"CARO"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"e_1_3_2_1_8_1","volume-title":"SMART: Semantic Malware Attribute Relevance Tagging. arXiv preprint arXiv:1905.06262(2019).","author":"Ducau N","year":"2019"},{"key":"e_1_3_2_1_9_1","unstructured":"Euphony [n.d.]. Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. https:\/\/github.com\/fmind\/euphony.  Euphony [n.d.]. Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. https:\/\/github.com\/fmind\/euphony."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698897"},{"key":"e_1_3_2_1_11_1","volume-title":"The Complex Dynamics of Collaborative Tagging. In International Conference on World Wide Web.","author":"Halpin Harry","year":"2007"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Wenyi Huang and Jack\u00a0W. Stokes. 2016. MtNet: A Multi-Task Neural Network for Dynamic Malware Classification. In Detection of Intrusions and Malware and Vulnerability Assessment.  Wenyi Huang and Jack\u00a0W. Stokes. 2016. MtNet: A Multi-Task Neural Network for Dynamic Malware Classification. In Detection of Intrusions and Malware and Vulnerability Assessment.","DOI":"10.1007\/978-3-319-40667-1_20"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"M\u00e9d\u00e9ric Hurier Kevin Allix Tegawend\u00e9 Bissyand\u00e9 Jacques Klein and Yves\u00a0Le Traon. 2016. On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. In Detection of Intrusions and Malware and Vulnerability Assessment.  M\u00e9d\u00e9ric Hurier Kevin Allix Tegawend\u00e9 Bissyand\u00e9 Jacques Klein and Yves\u00a0Le Traon. 2016. On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. In Detection of Intrusions and Malware and Vulnerability Assessment.","DOI":"10.1007\/978-3-319-40667-1_8"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046742"},{"key":"e_1_3_2_1_15_1","volume-title":"Towards Automatic Software Lineage Inference. In USENIX Security Symposium.","author":"Jang Jiyong","year":"2013"},{"key":"e_1_3_2_1_16_1","unstructured":"JoeSandbox [n.d.]. Joe Sandbox. https:\/\/www.joesandbox.com\/.  JoeSandbox [n.d.]. Joe Sandbox. https:\/\/www.joesandbox.com\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808780"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772744"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813665"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.59"},{"key":"e_1_3_2_1_21_1","volume-title":"On Challenges in Evaluating Malware Clustering. In International Symposium on Recent Advances in Intrusion Detection.","author":"Li Peng","year":"2010"},{"key":"e_1_3_2_1_22_1","volume-title":"Annual Computer Security Applications Conference.","author":"Lindorfer Martina","year":"2012"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/BADGERS.2014.7"},{"key":"e_1_3_2_1_24_1","unstructured":"MAEC [n.d.]. Malware Attribute Enumeration and Characterization. http:\/\/maec.mitre.org\/.  MAEC [n.d.]. Malware Attribute Enumeration and Characterization. http:\/\/maec.mitre.org\/."},{"key":"e_1_3_2_1_25_1","volume-title":"Finding Non-Trivial Malware Naming Inconsistencies. In International Conference on Information Systems Security.","author":"Maggi Federico","year":"2011"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Brad Miller Alex Kantchelian Michael\u00a0Carl Tschantz Sadia Afroz Rekha Bachwani Riyaz Faizullabhoy Ling Huang Vaishaal Shankar Tony Wu George Yiu Anthony\u00a0D. Joseph and J.\u00a0D. Tygar. 2016. Reviewer Integration and Performance Measurement for Malware Detection. In Detection of Intrusions and Malware and Vulnerability Assessment.  Brad Miller Alex Kantchelian Michael\u00a0Carl Tschantz Sadia Afroz Rekha Bachwani Riyaz Faizullabhoy Ling Huang Vaishaal Shankar Tony Wu George Yiu Anthony\u00a0D. Joseph and J.\u00a0D. Tygar. 2016. Reviewer Integration and Performance Measurement for Malware Detection. In Detection of Intrusions and Malware and Vulnerability Assessment.","DOI":"10.1007\/978-3-319-40667-1_7"},{"key":"e_1_3_2_1_27_1","unstructured":"misp [n.d.]. MISP Standard. https:\/\/www.misp-standard.org\/.  misp [n.d.]. MISP Standard. https:\/\/www.misp-standard.org\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Aziz Mohaisen and Omar Alrawi. 2014. AV-Meter: An Evaluation of Antivirus Scans and Labels. In Detection of Intrusions and Malware and Vulnerability Assessment.  Aziz Mohaisen and Omar Alrawi. 2014. AV-Meter: An Evaluation of Antivirus Scans and Labels. In Detection of Intrusions and Malware and Vulnerability Assessment.","DOI":"10.1007\/978-3-319-08509-8_7"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0248-7"},{"key":"e_1_3_2_1_30_1","volume-title":"Annual Computer Security Applications Conference.","author":"Perdisci Roberto","year":"2008"},{"key":"e_1_3_2_1_31_1","volume-title":"Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. In USENIX Symposium on Networked Systems Design and Implementation.","author":"Perdisci Roberto","year":"2010"},{"key":"e_1_3_2_1_32_1","volume-title":"Annual Computer Security Applications Conference.","author":"Perdisci Roberto"},{"key":"e_1_3_2_1_33_1","unstructured":"Konrad Rieck Thorsten Holz Carsten Willems Patrick D\u00fcssel and Pavel Laskov. 2008. Learning and Classification of Malware Behavior. In Detection of Intrusions and Malware and Vulnerability Assessment.  Konrad Rieck Thorsten Holz Carsten Willems Patrick D\u00fcssel and Pavel Laskov. 2008. Learning and Classification of Malware Behavior. In Detection of Intrusions and Malware and Vulnerability Assessment."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0410"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_11"},{"key":"e_1_3_2_1_36_1","unstructured":"VirusTotal [n.d.]. VirusTotal. https:\/\/virustotal.com\/.  VirusTotal [n.d.]. VirusTotal. https:\/\/virustotal.com\/."},{"key":"e_1_3_2_1_37_1","unstructured":"vtTags [n.d.]. Full list of VirusTotal Intelligence tag modifier. https:\/\/support.virustotal.com\/hc\/en-us\/articles\/360002160378-Full-list-of-VirusTotal-Intelligence-tag-modifier.  vtTags [n.d.]. Full list of VirusTotal Intelligence tag modifier. https:\/\/support.virustotal.com\/hc\/en-us\/articles\/360002160378-Full-list-of-VirusTotal-Intelligence-tag-modifier."},{"key":"e_1_3_2_1_38_1","volume-title":"Deep Ground Truth Analysis of Current Android Malware. In Conference on Detection of Intrusions and Malware & Vulnerability Assessment.","author":"Wei Fengguo","year":"2017"},{"key":"e_1_3_2_1_39_1","volume-title":"Dissecting Android Malware: Characterization and Evolution. In IEEE Symposium on Security and Privacy.","author":"Zhou Yajin","year":"2012"},{"key":"e_1_3_2_1_40_1","unstructured":"Shuofei Zhu Jianjun Shi Limin Yang Boqin Qin Ziyi Zhang Linhai Song and Gang Wang. 2020. Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. (2020).  Shuofei Zhu Jianjun Shi Limin Yang Boqin Qin Ziyi Zhang Linhai Song and Gang Wang. 2020. Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. (2020)."}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427261","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427261"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":40,"alternative-id":["10.1145\/3427228.3427261","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427261","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}