{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:30Z","timestamp":1750220250732,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3519365","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"370-372","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Robust Detection of PDF-based Malware"],"prefix":"10.1145","author":[{"given":"Kai Yuan","family":"Tay","sequence":"first","affiliation":[{"name":"Defence Science and Technology Agency, Singapore, Singapore"}]},{"given":"Shawn","family":"Chua","sequence":"additional","affiliation":[{"name":"Defence Science and Technology Agency, Singapore, Singapore"}]},{"given":"Melissa","family":"Chua","sequence":"additional","affiliation":[{"name":"Defence Science and Technology Agency, Singapore, Singapore"}]},{"given":"Vivek","family":"Balachandran","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176942"},{"key":"e_1_3_2_2_3_1","volume-title":"Threat Report","author":"Eschelbeck Gerhard","year":"2014","unstructured":", Gerhard Eschelbeck . 2015. Sophos Security Threat Report 2014 . https:\/\/news.sophos.com\/en-us\/2013\/12\/10\/sophos-security-threat-report-2014\/ , Gerhard Eschelbeck. 2015. Sophos Security Threat Report 2014. https:\/\/news.sophos.com\/en-us\/2013\/12\/10\/sophos-security-threat-report-2014\/"},{"key":"e_1_3_2_2_4_1","unstructured":"Nicolas Fleury Theo Dubrunquez and Ihsen Alouani. 2021. PDF-Malware: An Overview on Threats Detection and Evasion Attacks. arxiv: 2107.12873 [cs.CR]  Nicolas Fleury Theo Dubrunquez and Ihsen Alouani. 2021. PDF-Malware: An Overview on Threats Detection and Evasion Attacks. arxiv: 2107.12873 [cs.CR]"},{"key":"e_1_3_2_2_5_1","unstructured":"Recorded Future. 2015. Gone in a flash: Top 10 vulnerabilities used by exploit kits. https:\/\/www.recordedfuture.com\/top-vulnerabilities-2015\/  Recorded Future. 2015. Gone in a flash: Top 10 vulnerabilities used by exploit kits. https:\/\/www.recordedfuture.com\/top-vulnerabilities-2015\/"},{"key":"e_1_3_2_2_6_1","volume-title":"Lightgbm: A highly efficient gradient boosting decision tree. Advances in neural information processing systems","author":"Ke Guolin","year":"2017","unstructured":"Guolin Ke , Qi Meng , Thomas Finley , Taifeng Wang , Wei Chen , Weidong Ma , Qiwei Ye , and Tie-Yan Liu . 2017 . Lightgbm: A highly efficient gradient boosting decision tree. Advances in neural information processing systems , Vol. 30 (2017), 3146--3154. Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. Lightgbm: A highly efficient gradient boosting decision tree. Advances in neural information processing systems , Vol. 30 (2017), 3146--3154."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484327"},{"key":"e_1_3_2_2_8_1","unstructured":"Russ Smoak. 2014. Cisco 2014 annual Security report. https:\/\/blogs.cisco.com\/security\/cisco-2014-annual-security-report-threat-intelligence-offers-view-into-network-compromises  Russ Smoak. 2014. Cisco 2014 annual Security report. https:\/\/blogs.cisco.com\/security\/cisco-2014-annual-security-report-threat-intelligence-offers-view-into-network-compromises"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420987"},{"key":"e_1_3_2_2_10_1","unstructured":"Corporation Symantec. 2014. 2014 Internet Security Threat Report. https:\/\/docs.broadcom.com\/doc\/istr-14-april-volume-19-en  Corporation Symantec. 2014. 2014 Internet Security Threat Report. https:\/\/docs.broadcom.com\/doc\/istr-14-april-volume-19-en"},{"key":"e_1_3_2_2_11_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Tong Liang","year":"2019","unstructured":"Liang Tong , Bo Li , Chen Hajaj , Chaowei Xiao , Ning Zhang , and Yevgeniy Vorobeychik . 2019 . Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features . In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, 285--302. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/tong Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, and Yevgeniy Vorobeychik. 2019. Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 285--302. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/tong"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23115"},{"key":"e_1_3_2_2_13_1","article-title":"Hidost: A static machine-learning-based detector of malicious files","volume":"2016","author":"Laskov Pavel","year":"2016","unstructured":"Pavel Laskov . 2016 . Hidost: A static machine-learning-based detector of malicious files . EURASIP Journal on Information Security , Vol. 2016 , 1 (2016). https:\/\/doi.org\/10.1186\/s13635-016-0045-0 10.1186\/s13635-016-0045-0 Pavel Laskov. 2016. Hidost: A static machine-learning-based detector of malicious files. EURASIP Journal on Information Security , Vol. 2016, 1 (2016). https:\/\/doi.org\/10.1186\/s13635-016-0045-0","journal-title":"EURASIP Journal on Information Security"},{"key":"e_1_3_2_2_14_1","volume-title":"2014 IEEE Symposium on Security and Privacy. 197--211","author":"Pavel Laskov Nedimrndic","year":"2014","unstructured":"Nedimrndic and Pavel Laskov . 2014 . Practical Evasion of a Learning-Based Classifier: A Case Study . In 2014 IEEE Symposium on Security and Privacy. 197--211 . https:\/\/doi.org\/10.1109\/SP.2014.20 10.1109\/SP.2014.20 Nedimrndic and Pavel Laskov. 2014. Practical Evasion of a Learning-Based Classifier: A Case Study. In 2014 IEEE Symposium on Security and Privacy. 197--211. https:\/\/doi.org\/10.1109\/SP.2014.20"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3519365","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3519365","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:40Z","timestamp":1750188640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3519365"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":14,"alternative-id":["10.1145\/3508398.3519365","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3519365","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}