{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T22:55:21Z","timestamp":1777503321531,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T00:00:00Z","timestamp":1638748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,6]]},"DOI":"10.1145\/3485832.3485894","type":"proceedings-article","created":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T13:42:32Z","timestamp":1638798152000},"page":"706-719","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification"],"prefix":"10.1145","author":[{"given":"Duy-Phuc","family":"Pham","sequence":"first","affiliation":[{"name":"Univ Rennes, Inria, CNRS, IRISA, France, France"}]},{"given":"Damien","family":"Marion","sequence":"additional","affiliation":[{"name":"Univ Rennes, Inria, CNRS, IRISA, France"}]},{"given":"Matthieu","family":"Mastio","sequence":"additional","affiliation":[{"name":"Univ Rennes, Inria, CNRS, IRISA, France"}]},{"given":"Annelie","family":"Heuser","sequence":"additional","affiliation":[{"name":"Univ Rennes, Inria, CNRS, IRISA, France"}]}],"member":"320","published-online":{"date-parts":[[2021,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[1] 10 evil user tricks for bypassing anti-virus 2013. https:\/\/blog.netspi.com\/10-evil-user-tricks-for-bypassing-anti-virus\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0558-5"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-013-0185-4"},{"key":"e_1_3_2_1_4_1","volume-title":"Dynamic Programming (1ed.)","author":"Bellman Richard","unstructured":"Richard Bellman. 1957. Dynamic Programming (1ed.). Princeton University Press, Princeton, NJ, USA. http:\/\/books.google.com\/books?id=fyVtp3EMxasC&pg=PR5&dq=dynamic+programming+richard+e+bellman&client=firefox-a#v=onepage&q=dynamic%20programming%20richard%20e%20bellman&f=false"},{"key":"e_1_3_2_1_5_1","volume-title":"NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage. In International Symposium on Electromagnetic Compatibility (EMC \u201914 \/ Tokyo)","author":"Bhasin Shivam","year":"2014","unstructured":"Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, and Zakaria Najm. 2014. NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage. In International Symposium on Electromagnetic Compatibility (EMC \u201914 \/ Tokyo). IEEE. eprint version: https:\/\/eprint.iacr.org\/2013\/717.pdf."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3080510"},{"key":"e_1_3_2_1_7_1","volume-title":"2013 USENIX Workshop on Health Information Technologies (HealthTech 13)","author":"Clark S.","year":"2013","unstructured":"Shane\u00a0S. Clark, Benjamin Ransford, Amir Rahmati, Shane Guineau, Jacob Sorber, Wenyuan Xu, and Kevin Fu. 2013. WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices. In 2013 USENIX Workshop on Health Information Technologies (HealthTech 13). USENIX Association, Washington, D.C.https:\/\/www.usenix.org\/conference\/healthtech13\/workshop-program\/presentation\/clark"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0075-9"},{"key":"e_1_3_2_1_9_1","unstructured":"Christian Collberg Sam Martin Jonathan Myers Bill Zimmerman Petr Krajca Gabriel Kerneis Saumya Debray and Babak Yadegari. [n.d.]. The Tigress C Diver- sifier\/Obfuscator. http:\/\/tigress.cs.arizona.edu\/index.html"},{"key":"e_1_3_2_1_10_1","unstructured":"Christian Collberg Clark Thomborson and Douglas Low. 1997. A taxonomy of obfuscating transformations."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00054"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384727"},{"key":"e_1_3_2_1_13_1","volume-title":"Southern Africa Telecommunication Networks and Applications Conference (SATNAC). 228\u2013235","author":"Frieslaar Ibraheem","year":"2017","unstructured":"Ibraheem Frieslaar and Barry Irwin. 2017. Recovering AES-128 encryption keys from a Raspberry Pi. In Southern Africa Telecommunication Networks and Applications Conference (SATNAC). 228\u2013235."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_2"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29912-4_18"},{"key":"e_1_3_2_1_16_1","volume-title":"An Introduction to Statistical Learning: With Applications in R","author":"James Gareth","unstructured":"Gareth James, Daniela Witten, Trevor Hastie, and Robert Tibshirani. 2014. An Introduction to Statistical Learning: With Applications in R. Springer Publishing Company, Incorporated."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.10"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_838"},{"key":"e_1_3_2_1_19_1","volume-title":"IDEA: Intrusion Detection through Electromagnetic-Signal Analysis for Critical Embedded and Cyber-Physical Systems","author":"Khan A.","year":"2019","unstructured":"H.\u00a0A. Khan, N. Sehatbakhsh, L.\u00a0N. Nguyen, R.\u00a0L. Callan, A. Yeredor, M. Prvulovic, and A. Zajic. 2019. IDEA: Intrusion Detection through Electromagnetic-Signal Analysis for Critical Embedded and Cyber-Physical Systems. IEEE Transactions on Dependable and Secure Computing (2019), 1\u20131."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-019-00074-w"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2015.070426"},{"key":"e_1_3_2_1_22_1","volume-title":"Power analysis attacks - revealing the secrets of smart cards","author":"Mangard Stefan","unstructured":"Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2007. Power analysis attacks - revealing the secrets of smart cards. Springer."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"e_1_3_2_1_24_1","volume-title":"2017 ACM\/IEEE 44th Annual International Symposium on Computer Architecture (ISCA). 333\u2013346","author":"Nazari A.","unstructured":"A. Nazari, N. Sehatbakhsh, M. Alam, A. Zajic, and M. Prvulovic. 2017. EDDIE: EM-based detection of deviations in program execution. In 2017 ACM\/IEEE 44th Annual International Symposium on Computer Architecture (ISCA). 333\u2013346."},{"key":"e_1_3_2_1_25_1","unstructured":"Markus\u00a0F.X.J. Oberhumer L\u00e1szl\u00f3 Moln\u00e1r and John\u00a0F. Reiser.[n.d.]. UPX the Ultimate Packer for eXecutables. https:\/\/upx.github.io\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.98"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-017-0172-7"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2016.2603847"},{"key":"e_1_3_2_1_30_1","volume-title":"Detecting System Emulators","author":"Raffetseder Thomas","unstructured":"Thomas Raffetseder, Christopher Kruegel, and Engin Kirda. 2007. Detecting System Emulators. In Information Security, Juan\u00a0A. Garay, Arjen\u00a0K. Lenstra, Masahiro Mambo, and Ren\u00e9 Peralta (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1\u201318."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2888893"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0120-y"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2945767"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783762"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052999"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2311329"},{"key":"e_1_3_2_1_37_1","volume-title":"Research in Attacks, Intrusions, and Defenses, Fabian Monrose, Marc Dacier, Gregory Blanc, and Joaquin Garcia-Alfaro (Eds.)","author":"Yokoyama Akira","unstructured":"Akira Yokoyama, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Michael Brengel, Michael Backes, and Christian Rossow. 2016. SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion. In Research in Attacks, Intrusions, and Defenses, Fabian Monrose, Marc Dacier, Gregory Blanc, and Joaquin Garcia-Alfaro (Eds.). Springer International Publishing, Cham, 165\u2013187."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2304382"}],"event":{"name":"ACSAC '21: Annual Computer Security Applications Conference","location":"Virtual Event USA","acronym":"ACSAC '21"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485832.3485894","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485832.3485894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:18:59Z","timestamp":1755890339000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485832.3485894"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,6]]},"references-count":38,"alternative-id":["10.1145\/3485832.3485894","10.1145\/3485832"],"URL":"https:\/\/doi.org\/10.1145\/3485832.3485894","relation":{},"subject":[],"published":{"date-parts":[[2021,12,6]]},"assertion":[{"value":"2021-12-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}