{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T08:02:12Z","timestamp":1761897732081,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1145\/3526241.3530825","type":"proceedings-article","created":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T14:37:09Z","timestamp":1654180629000},"page":"507-512","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["CAD-FSL: Code-Aware Data Generation based Few-Shot Learning for Efficient Malware Detection"],"prefix":"10.1145","author":[{"given":"Sreenitha","family":"Kasarapu","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Sanket","family":"Shukla","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Rakibul","family":"Hassan","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Avesta","family":"Sasan","sequence":"additional","affiliation":[{"name":"University of California Davis, Davis, CA, USA"}]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[{"name":"University of California, Davis, Davis, CA, USA"}]},{"given":"Sai Manoj","family":"PD","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,6,6]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2021. Malware statistics Trends REPORT: AV-TEST. https:\/\/www.av-test.org\/ en\/statistics\/malware\/  2021. Malware statistics Trends REPORT: AV-TEST. https:\/\/www.av-test.org\/ en\/statistics\/malware\/"},{"key":"e_1_3_2_2_2_1","unstructured":"2021. Virustotal package. https:\/\/www.rdocumentation.org\/packages\/virustotal\/ versions\/0.2.1  2021. Virustotal package. https:\/\/www.rdocumentation.org\/packages\/virustotal\/ versions\/0.2.1"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102691"},{"key":"e_1_3_2_2_4_1","unstructured":"Omaiyma Abbas and etal 2016. Big Data Issues and Challenges.  Omaiyma Abbas and et al. 2016. Big Data Issues and Challenges."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITACEE.2014.7065704"},{"key":"e_1_3_2_2_6_1","volume-title":"Camouflage In Malware: From Encryption To Metamorphism. IJCSNS","author":"Rad Babak Bashari","year":"2012","unstructured":"Babak Bashari Rad and et.al. 2012. Camouflage In Malware: From Encryption To Metamorphism. IJCSNS ( 2012 ). Babak Bashari Rad and et.al. 2012. Camouflage In Malware: From Encryption To Metamorphism. IJCSNS (2012)."},{"volume-title":"Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station. In PES Innovative Smart Grid Technologies Conference-Latin America (ISGT Latin America).","author":"Manoj","key":"e_1_3_2_2_7_1","unstructured":"Manoj Basnet and et.al. 2021 . Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station. In PES Innovative Smart Grid Technologies Conference-Latin America (ISGT Latin America). Manoj Basnet and et.al. 2021. Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station. In PES Innovative Smart Grid Technologies Conference-Latin America (ISGT Latin America)."},{"key":"e_1_3_2_2_8_1","volume-title":"Deep transfer learning for static malware classification. arXiv preprint arXiv:1812.07606","author":"Chen Li","year":"2018","unstructured":"Li Chen . 2018. Deep transfer learning for static malware classification. arXiv preprint arXiv:1812.07606 ( 2018 ). Li Chen. 2018. Deep transfer learning for static malware classification. arXiv preprint arXiv:1812.07606 (2018)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Anusha Damodaran et al. 2015. A comparison of static dynamic and hybrid analysis for malware detection. Journal of Computer Virology and Hacking Techniques (2015).  Anusha Damodaran et al. 2015. A comparison of static dynamic and hybrid analysis for malware detection. Journal of Computer Virology and Hacking Techniques (2015).","DOI":"10.1007\/s11416-015-0261-z"},{"key":"e_1_3_2_2_10_1","volume-title":"Using convolutional neural networks for classification of malware represented as images. Journal of Computer Virology and Hacking Techniques","author":"Gibert Daniel","year":"2019","unstructured":"Daniel Gibert and et.al. 2019. Using convolutional neural networks for classification of malware represented as images. Journal of Computer Virology and Hacking Techniques ( 2019 ). Daniel Gibert and et.al. 2019. Using convolutional neural networks for classification of malware represented as images. Journal of Computer Virology and Hacking Techniques (2019)."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"M. S. Jalali and etal 2019. The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products. IEEE Security Privacy (2019).  M. S. Jalali and et al. 2019. The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products. IEEE Security Privacy (2019).","DOI":"10.1109\/MSEC.2018.2888780"},{"key":"e_1_3_2_2_12_1","volume-title":"Number of malware attacks per year","author":"Johnson Joseph","year":"2020","unstructured":"Joseph Johnson . 2021. Number of malware attacks per year 2020 . https: \/\/www.statista.com\/statistics\/873097\/malware-attacks-per-year-worldwide\/ Joseph Johnson. 2021. Number of malware attacks per year 2020. https: \/\/www.statista.com\/statistics\/873097\/malware-attacks-per-year-worldwide\/"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Kesav Kancherla and et.al. 2013. Image visualization based malware detection. In Computational Intelligence in Cyber Security (CICS).  Kesav Kancherla and et.al. 2013. Image visualization based malware detection. In Computational Intelligence in Cyber Security (CICS).","DOI":"10.1109\/CICYBS.2013.6597204"},{"volume-title":"Asia Joint Conference on Information Security (AsiaJCIS).","author":"Nitesh","key":"e_1_3_2_2_14_1","unstructured":"Nitesh Kumar and et.al. 2019. Malware Classification using Early Stage Behavioral Analysis . In Asia Joint Conference on Information Security (AsiaJCIS). Nitesh Kumar and et.al. 2019. Malware Classification using Early Stage Behavioral Analysis. In Asia Joint Conference on Information Security (AsiaJCIS)."},{"volume-title":"Int. Conf. on New Technologies, Mobility and Security (NTMS).","author":"Weng Wai","key":"e_1_3_2_2_15_1","unstructured":"Wai Weng Lo and et.al. 2019. An xception convolutional neural network for malware classification with transfer learning . In Int. Conf. on New Technologies, Mobility and Security (NTMS). Wai Weng Lo and et.al. 2019. An xception convolutional neural network for malware classification with transfer learning. In Int. Conf. on New Technologies, Mobility and Security (NTMS)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMAI.2017.8073489"},{"key":"e_1_3_2_2_17_1","volume-title":"Limits of Static Analysis for Malware Detection. In Annual Computer Security Applications Conference (ACSAC","author":"Andreas","year":"2007","unstructured":"Andreas Moser and et.al. 2007 . Limits of Static Analysis for Malware Detection. In Annual Computer Security Applications Conference (ACSAC 2007 ). Andreas Moser and et.al. 2007. Limits of Static Analysis for Malware Detection. In Annual Computer Security Applications Conference (ACSAC 2007)."},{"volume-title":"Malware Images: Visualization and Automatic Classification. In Int. Symposium on Visualization for Cyber Security.","author":"Nataraj L.","key":"e_1_3_2_2_18_1","unstructured":"L. Nataraj and et al. 2011 . Malware Images: Visualization and Automatic Classification. In Int. Symposium on Visualization for Cyber Security. L. Nataraj and et al. 2011. Malware Images: Visualization and Automatic Classification. In Int. Symposium on Visualization for Cyber Security."},{"key":"e_1_3_2_2_19_1","volume-title":"Symposium on Security and Privacy","author":"Christian","year":"2012","unstructured":"Christian Rossow and et.al. 2012. Prudent practices for designing malware experiments: Status quo and outlook . Symposium on Security and Privacy ( 2012 ). Christian Rossow and et.al. 2012. Prudent practices for designing malware experiments: Status quo and outlook. Symposium on Security and Privacy (2012)."},{"volume-title":"International Conference on Tools with Artificial Intelligence (ICTAI).","author":"Sanket","key":"e_1_3_2_2_20_1","unstructured":"Sanket Shukla and et.al. 2019. Stealthy Malware Detection using RNN-Based Automated Localized Feature Extraction and Classifier . In International Conference on Tools with Artificial Intelligence (ICTAI). Sanket Shukla and et.al. 2019. Stealthy Malware Detection using RNN-Based Automated Localized Feature Extraction and Classifier. In International Conference on Tools with Artificial Intelligence (ICTAI)."},{"volume-title":"Design Automation Conference.","author":"Sanket","key":"e_1_3_2_2_21_1","unstructured":"Sanket Shukla and et.al. 2021. On-device Malware Detection using Performance- Aware and Robust Collaborative Learning . In Design Automation Conference. Sanket Shukla and et.al. 2021. On-device Malware Detection using Performance- Aware and Robust Collaborative Learning. In Design Automation Conference."},{"key":"e_1_3_2_2_22_1","volume-title":"Stolfo and et.al","author":"Salvatore","year":"2007","unstructured":"Salvatore J. Stolfo and et.al . 2007 . Towards Stealthy Malware Detection. In Malware Detection . Salvatore J. Stolfo and et.al. 2007. Towards Stealthy Malware Detection. In Malware Detection."},{"key":"e_1_3_2_2_23_1","volume-title":"IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture.","author":"Vasan Danish","year":"2020","unstructured":"Danish Vasan and et.al. 2020 . IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture. Danish Vasan and et.al. 2020. IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture."},{"volume-title":"Malware Obfuscation Techniques: A Brief Survey. In Int. Conf. on Broadband, Wireless Comp., Comm. and Applications.","author":"Ilsun","key":"e_1_3_2_2_24_1","unstructured":"Ilsun You and et.al. 2010 . Malware Obfuscation Techniques: A Brief Survey. In Int. Conf. on Broadband, Wireless Comp., Comm. and Applications. Ilsun You and et.al. 2010. Malware Obfuscation Techniques: A Brief Survey. In Int. Conf. on Broadband, Wireless Comp., Comm. and Applications."},{"key":"e_1_3_2_2_25_1","volume-title":"Imbalanced malware images classification: a CNN based approach. arXiv preprint arXiv:1708.08042","author":"Yue Songqing","year":"2017","unstructured":"Songqing Yue . 2017. Imbalanced malware images classification: a CNN based approach. arXiv preprint arXiv:1708.08042 ( 2017 ). Songqing Yue. 2017. Imbalanced malware images classification: a CNN based approach. arXiv preprint arXiv:1708.08042 (2017)."}],"event":{"name":"GLSVLSI '22: Great Lakes Symposium on VLSI 2022","sponsor":["SIGDA ACM Special Interest Group on Design Automation"],"location":"Irvine CA USA","acronym":"GLSVLSI '22"},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3526241.3530825","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3526241.3530825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:17Z","timestamp":1750186937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3526241.3530825"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":25,"alternative-id":["10.1145\/3526241.3530825","10.1145\/3526241"],"URL":"https:\/\/doi.org\/10.1145\/3526241.3530825","relation":{},"subject":[],"published":{"date-parts":[[2022,6,6]]},"assertion":[{"value":"2022-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}