{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T19:46:25Z","timestamp":1765827985543,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.1145\/3429789.3429867","type":"proceedings-article","created":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T20:52:56Z","timestamp":1606423976000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Uncovering Malware Traits Using Hybrid Analysis"],"prefix":"10.1145","author":[{"family":"Reischaga","sequence":"first","affiliation":[{"name":"Information Technology Department, Swiss German University, Tangerang, Banten, Indonesia"}]},{"given":"Charles","family":"Lim","sequence":"additional","affiliation":[{"name":"Information Technology Department, Swiss German University, Tangerang, Banten, Indonesia"}]},{"given":"Yohanes Syailendra","family":"Kotualubun","sequence":"additional","affiliation":[{"name":"Information Technology Department, Swiss German University, Tangerang, Banten, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1228"},{"key":"e_1_3_2_1_2_1","volume-title":"Retrieved","author":"Anonymous","year":"2019","unstructured":"Anonymous . 2019 . Day 60: Windows API Use in SpyEye Banking Trojan . Retrieved June 13, 2020 from https:\/\/medium.com\/@int0x33\/day-60-windows-api-use-in-spyeye-banking-trojan-ca8e8694bccd Anonymous. 2019. Day 60: Windows API Use in SpyEye Banking Trojan. Retrieved June 13, 2020 from https:\/\/medium.com\/@int0x33\/day-60-windows-api-use-in-spyeye-banking-trojan-ca8e8694bccd"},{"key":"e_1_3_2_1_3_1","first-page":"8","article-title":"A novel information fusion model for assessment of malware threat","volume":"1","author":"Dai Chao","year":"2016","unstructured":"Chao Dai , Jianmin Pang , Xiaochuan Zhang , Guanghui Liang , Hong Bai . 2016 . A novel information fusion model for assessment of malware threat . International Journal of Security and Its Applications 1 , 1 (2016), 8 . https:\/\/doi.org\/10.14257\/ijsia.2016.10.5.01 Chao Dai, Jianmin Pang, Xiaochuan Zhang, Guanghui Liang, Hong Bai. 2016. A novel information fusion model for assessment of malware threat. International Journal of Security and Its Applications 1, 1 (2016), 8. https:\/\/doi.org\/10.14257\/ijsia.2016.10.5.01","journal-title":"International Journal of Security and Its Applications"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33018-6_28"},{"key":"e_1_3_2_1_5_1","unstructured":"Microsoft Corporation. 1999. Microsoft portable executable and common object file format specification.  Microsoft Corporation. 1999. Microsoft portable executable and common object file format specification."},{"key":"e_1_3_2_1_6_1","unstructured":"The MITRE Corporation. 2020. Mitre ATT&CK Navigator Enterprise. Retrieved February 3 2020 from https:\/\/attack.mitre.org\/  The MITRE Corporation. 2020. Mitre ATT&CK Navigator Enterprise. Retrieved February 3 2020 from https:\/\/attack.mitre.org\/"},{"key":"e_1_3_2_1_7_1","volume-title":"SoK: ATT&CK Techniques and Trends in Windows Malware. In International Conference on Security and Privacy in Communication Systems. Springer, 406--425","author":"Oosthoek Kris","year":"2019","unstructured":"Kris Oosthoek , Christian Doerr . 2019 . SoK: ATT&CK Techniques and Trends in Windows Malware. In International Conference on Security and Privacy in Communication Systems. Springer, 406--425 . https:\/\/doi.org\/10.1007\/978-3-030-37228-6_20 Kris Oosthoek, Christian Doerr. 2019. SoK: ATT&CK Techniques and Trends in Windows Malware. In International Conference on Security and Privacy in Communication Systems. Springer, 406--425. https:\/\/doi.org\/10.1007\/978-3-030-37228-6_20"},{"volume-title":"Rwguard: A real-time detection system against cryptographic ransomware.","year":"2018","key":"e_1_3_2_1_8_1","unstructured":"Mehnaz, Shagufta, Mudgerikar, Anand, Bertino, Elisa. 2018 . Rwguard: A real-time detection system against cryptographic ransomware. (2018), 114--136. Mehnaz, Shagufta, Mudgerikar, Anand, Bertino, Elisa. 2018. Rwguard: A real-time detection system against cryptographic ransomware. (2018), 114--136."},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"Guarnieri Claudio","year":"2019","unstructured":"Claudio Guarnieri . 2019 . Cuckoo Sandbox . Retrieved May 13, 2020 from https:\/\/cuckoosandbox.org\/ Claudio Guarnieri. 2019. Cuckoo Sandbox. Retrieved May 13, 2020 from https:\/\/cuckoosandbox.org\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.48"},{"key":"e_1_3_2_1_11_1","unstructured":"Michael Sikorski Andrew Honig. 2012. Practical malware analysis: the hands-on guide to dissecting malicious software. No Starch Press.  Michael Sikorski Andrew Honig. 2012. Practical malware analysis: the hands-on guide to dissecting malicious software. No Starch Press."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102365"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_15"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Samuel Kim. 2018. PE header analysis for malware detection. (2018). https:\/\/doi.org\/10.31979\/etd.q3dd-gp9u  Samuel Kim. 2018. PE header analysis for malware detection. (2018). https:\/\/doi.org\/10.31979\/etd.q3dd-gp9u","DOI":"10.31979\/etd.q3dd-gp9u"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24310"},{"key":"e_1_3_2_1_16_1","volume-title":"2020 Malwarebytes Labs State of Malware Report","author":"Labs Malwarebytes","year":"2020","unstructured":"Malwarebytes Labs . 2020. 2020 Malwarebytes Labs State of Malware Report February 2020 . Retrieved June 7, 2020 from https:\/\/resources.malwarebytes.com\/files\/2020\/02\/2020_State-of-Malware-Report.pdf Malwarebytes Labs. 2020. 2020 Malwarebytes Labs State of Malware Report February 2020. Retrieved June 7, 2020 from https:\/\/resources.malwarebytes.com\/files\/2020\/02\/2020_State-of-Malware-Report.pdf"},{"key":"e_1_3_2_1_17_1","unstructured":"Ali Suwanda Charles Lim Lukas. 2020. Malware Threat Scoring Using Static and Dynamic Analysis Features. Master's thesis. Tangerang Indonesia.  Ali Suwanda Charles Lim Lukas. 2020. Malware Threat Scoring Using Static and Dynamic Analysis Features. Master's thesis. Tangerang Indonesia."},{"key":"e_1_3_2_1_18_1","volume-title":"Automated dynamic analysis of ransomware: Benefits, limitations and use for detection. arXiv preprint arXiv:1609.03020","author":"Sgandurra Daniele","year":"2016","unstructured":"Daniele Sgandurra , Luis Mu\u00f1oz-Gonz\u00e1le , Rabih Mohsen , Emil C. Lupu . 2016. Automated dynamic analysis of ransomware: Benefits, limitations and use for detection. arXiv preprint arXiv:1609.03020 ( 2016 ). Daniele Sgandurra, Luis Mu\u00f1oz-Gonz\u00e1le, Rabih Mohsen, Emil C. Lupu. 2016. Automated dynamic analysis of ransomware: Benefits, limitations and use for detection. arXiv preprint arXiv:1609.03020 (2016)."},{"key":"e_1_3_2_1_19_1","volume-title":"Retrieved","author":"Ochsenmeier Marc","year":"2020","unstructured":"Marc Ochsenmeier . 2020 . PEStudio . Retrieved May 29, 2020 from https:\/\/www.winitor.com\/ Marc Ochsenmeier. 2020. PEStudio. Retrieved May 29, 2020 from https:\/\/www.winitor.com\/"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0290-x"},{"key":"e_1_3_2_1_21_1","volume-title":"The Cost of Malware Containment. January","author":"Ponemon Institute LLC. 2015.","year":"2015","unstructured":"Ponemon Institute LLC. 2015. The Cost of Malware Containment. January ( 2015 ), 1--19. https:\/\/doi.org\/10.1016\/j.amepre.2005.06.011 Ponemon Institute LLC. 2015. The Cost of Malware Containment. January (2015), 1--19. https:\/\/doi.org\/10.1016\/j.amepre.2005.06.011"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221913"},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","author":"Security Payload","year":"2020","unstructured":"Payload Security . 2020 . Hybrid Analysis Free Malware Analysis Service . Retrieved July 13, 2020 from https:\/\/www.hybrid-analysis.com\/ Payload Security. 2020. Hybrid Analysis Free Malware Analysis Service. Retrieved July 13, 2020 from https:\/\/www.hybrid-analysis.com\/"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSA.2008.28"},{"key":"e_1_3_2_1_25_1","volume-title":"Retrieved","author":"Sistemas Hispasec","year":"2020","unstructured":"Hispasec Sistemas . 2020 . VirusTotal . Retrieved May 19, 2020 from https:\/\/www.virustotal.com Hispasec Sistemas. 2020. VirusTotal. Retrieved May 19, 2020 from https:\/\/www.virustotal.com"},{"key":"e_1_3_2_1_26_1","unstructured":"Mamoun Alazab Robert Layton Sitalakshmi Venkatraman Paul Watters. 2010. Malware detection based on structural and behavioural features of api calls. (2010).  Mamoun Alazab Robert Layton Sitalakshmi Venkatraman Paul Watters. 2010. Malware detection based on structural and behavioural features of api calls. (2010)."},{"key":"e_1_3_2_1_27_1","volume-title":"Finding cyber threats with ATT&CK-based analytics","author":"Strom Blake E.","year":"2017","unstructured":"Blake E. Strom , Joseph A. Battaglia , Michael S. Kemmerer , William Kupersanin , Douglas P. Miller , Craig Wampler , Sean M. Whitley , Ross D. Wolf . 2017. Finding cyber threats with ATT&CK-based analytics . The MITRE Corporation , Bedford, MA , Technical Report No. MTR170202 ( 2017 ). Blake E. Strom, Joseph A. Battaglia, Michael S. Kemmerer, William Kupersanin, Douglas P. Miller, Craig Wampler, Sean M. Whitley, Ross D. Wolf. 2017. Finding cyber threats with ATT&CK-based analytics. The MITRE Corporation, Bedford, MA, Technical Report No. MTR170202 (2017)."},{"key":"e_1_3_2_1_28_1","volume-title":"Retrieved","author":"Yantis David","year":"2020","unstructured":"David Yantis . 2020 . Windows Functions in Malware Analysis . Retrieved June 13, 2020 from https:\/\/gist.github.com\/404NetworkError\/a81591849f5b6b5fe09f517efc189c1d David Yantis. 2020. Windows Functions in Malware Analysis. Retrieved June 13, 2020 from https:\/\/gist.github.com\/404NetworkError\/a81591849f5b6b5fe09f517efc189c1d"}],"event":{"name":"ICONETSI: International Conference on Engineering and Information Technology for Sustainable Industry","acronym":"ICONETSI","location":"Tangerang Indonesia"},"container-title":["Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429789.3429867","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3429789.3429867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:45Z","timestamp":1750195905000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429789.3429867"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":28,"alternative-id":["10.1145\/3429789.3429867","10.1145\/3429789"],"URL":"https:\/\/doi.org\/10.1145\/3429789.3429867","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]}}}