{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:35Z","timestamp":1750220255042,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3494110.3528244","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:08:22Z","timestamp":1653365302000},"page":"15-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Position Paper"],"prefix":"10.1145","author":[{"given":"Ali","family":"Shafiei","sequence":"first","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Vera","family":"Rimmer","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Ilias","family":"Tsingenopoulos","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Lieven","family":"Desmet","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365001"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387550"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57878-7_13"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3082330"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473039"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_10"},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference on Information and Communications Security. Springer, 18--33","author":"Fadadu Fenil","year":"2019","unstructured":"Fenil Fadadu , Anand Handa , Nitesh Kumar , and Sandeep Kumar Shukla . 2019 . Evading API call sequence based malware classifiers . In International Conference on Information and Communications Security. Springer, 18--33 . Fenil Fadadu, Anand Handa, Nitesh Kumar, and Sandeep Kumar Shukla. 2019. Evading API call sequence based malware classifiers. In International Conference on Information and Communications Security. Springer, 18--33."},{"key":"e_1_3_2_1_9_1","volume-title":"International Symposium on Cyber Security Cryptography and Machine Learning. Springer, 20--37","author":"Handa Anand","year":"2021","unstructured":"Anand Handa , Nitesh Kumar , Sandeep Kumar Shukla , 2021 . Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features . In International Symposium on Cyber Security Cryptography and Machine Learning. Springer, 20--37 . Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla, et al. 2021. Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features. In International Symposium on Cyber Security Cryptography and Machine Learning. Springer, 20--37."},{"key":"e_1_3_2_1_10_1","volume-title":"Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence.","author":"Hu Weiwei","year":"2018","unstructured":"Weiwei Hu and Ying Tan . 2018 . Black-box attacks against RNN based malware detection algorithms . In Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence. Weiwei Hu and Ying Tan. 2018. Black-box attacks against RNN based malware detection algorithms. In Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence."},{"volume-title":"10th USENIX Workshop on Offensive Technologies (WOOT 16)","author":"Kyriakos","key":"e_1_3_2_1_11_1","unstructured":"Kyriakos K. Ispoglou and Mathias Payer. 2016. malWASH: Washing Malware to Evade Dynamic Analysis . In 10th USENIX Workshop on Offensive Technologies (WOOT 16) . USENIX Association, Austin, TX. Kyriakos K. Ispoglou and Mathias Payer. 2016. malWASH: Washing Malware to Evade Dynamic Analysis. In 10th USENIX Workshop on Offensive Technologies (WOOT 16). USENIX Association, Austin, TX."},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Security Symposium","volume":"14","author":"Kruegel Christopher","year":"2005","unstructured":"Christopher Kruegel , Engin Kirda , Darren Mutz , William Robertson , and Giovanni Vigna . 2005 . Automating mimicry attacks using static binary analysis . In USENIX Security Symposium , Vol. 14 . 11--11. Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, and Giovanni Vigna. 2005. Automating mimicry attacks using static binary analysis. In USENIX Security Symposium, Vol. 14. 11--11."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3375741"},{"key":"e_1_3_2_1_14_1","volume-title":"Fabio Pierazzi, and Lorenzo Cavallaro.","author":"Labaca-Castro Raphael","year":"2021","unstructured":"Raphael Labaca-Castro , Luis Mu\u00f1oz-Gonz\u00e1lez , Feargus Pendlebury , Gabi Dreo Rodosek , Fabio Pierazzi, and Lorenzo Cavallaro. 2021 . Universal Adversarial Perturbations for Malware . arXiv preprint arXiv:2102.06747 (2021). Raphael Labaca-Castro, Luis Mu\u00f1oz-Gonz\u00e1lez, Feargus Pendlebury, Gabi Dreo Rodosek, Fabio Pierazzi, and Lorenzo Cavallaro. 2021. Universal Adversarial Perturbations for Malware. arXiv preprint arXiv:2102.06747 (2021)."},{"volume-title":"Retrieved","year":"2021","key":"e_1_3_2_1_15_1","unstructured":"llvm-admin team. 2021 . The LLVM Compiler Infrastructure . Retrieved December 30, 2021 from https:\/\/llvm.org llvm-admin team. 2021. The LLVM Compiler Infrastructure. Retrieved December 30, 2021 from https:\/\/llvm.org"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0157-5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-016-0281-3"},{"key":"e_1_3_2_1_18_1","volume-title":"13th USENIX Workshop on Offensive Technologies (WOOT 19)","author":"Pavithran Jithin","year":"2019","unstructured":"Jithin Pavithran , Milan Patnaik , and Chester Rebeiro . 2019 . D-time: Distributed threadless independent malware execution for runtime obfuscation . In 13th USENIX Workshop on Offensive Technologies (WOOT 19) . Jithin Pavithran, Milan Patnaik, and Chester Rebeiro. 2019. D-time: Distributed threadless independent malware execution for runtime obfuscation. In 13th USENIX Workshop on Offensive Technologies (WOOT 19)."},{"key":"e_1_3_2_1_19_1","volume-title":"Semantics aware adversarial malware examples generation for black-box attacks. Applied Soft Computing","author":"Peng Xiaowei","year":"2021","unstructured":"Xiaowei Peng , Hequn Xian , Qian Lu , and Xiuqing Lu. 2021. Semantics aware adversarial malware examples generation for black-box attacks. Applied Soft Computing ( 2021 ), 107506. Xiaowei Peng, Hequn Xian, Qian Lu, and Xiuqing Lu. 2021. Semantics aware adversarial malware examples generation for black-box attacks. Applied Soft Computing (2021), 107506."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00073"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100199"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427230"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_23"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2020.2968933"},{"key":"e_1_3_2_1_25_1","volume-title":"Dimitry Kuznetsov, and Heng Yin.","author":"Song Wei","year":"2020","unstructured":"Wei Song , Xuezixiang Li , Deepali Garg Sadia Afroz , Dimitry Kuznetsov, and Heng Yin. 2020 . Automatic generation of adversarial examples for interpreting malware classifiers. arXiv preprint arXiv:2003.03100 (2020). Wei Song, Xuezixiang Li, Deepali Garg Sadia Afroz, Dimitry Kuznetsov, and Heng Yin. 2020. Automatic generation of adversarial examples for interpreting malware classifiers. arXiv preprint arXiv:2003.03100 (2020)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599855"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 30th ACM International Conference on Information & Knowledge Management. 4165--4172","author":"Tsai Yun-Da","year":"2021","unstructured":"Yun-Da Tsai , ChengKuan Chen , and Shou-De Lin . 2021 . Toward an Effective BlackBox Adversarial Attack on Functional JavaScript Malware against Commercial Anti-Virus . In Proceedings of the 30th ACM International Conference on Information & Knowledge Management. 4165--4172 . Yun-Da Tsai, ChengKuan Chen, and Shou-De Lin. 2021. Toward an Effective BlackBox Adversarial Attack on Functional JavaScript Malware against Commercial Anti-Virus. In Proceedings of the 30th ACM International Conference on Information & Knowledge Management. 4165--4172."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316415"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the 1st Workshop on Robust Malware Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494110.3528244","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494110.3528244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:45Z","timestamp":1750188645000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494110.3528244"}},"subtitle":["On Advancing Adversarial Malware Generation Using Dynamic Features"],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":28,"alternative-id":["10.1145\/3494110.3528244","10.1145\/3494110"],"URL":"https:\/\/doi.org\/10.1145\/3494110.3528244","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}