{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T05:03:09Z","timestamp":1769058189729,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1145\/3568562.3568631","type":"proceedings-article","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:25:01Z","timestamp":1669681501000},"page":"142-149","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality Preservation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9387-7909","authenticated-orcid":false,"given":"Hien","family":"Do Thi Thu","sequence":"first","affiliation":[{"name":"University of Information Technology, Vietnam National University, Ho Chi Minh City, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5945-3712","authenticated-orcid":false,"given":"The Duy","family":"Phan","sequence":"additional","affiliation":[{"name":"University of Information Technology, Vietnam National University, Ho Chi Minh City, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1213-4415","authenticated-orcid":false,"given":"Hao","family":"Le Anh","sequence":"additional","affiliation":[{"name":"University of Information Technology, Vietnam National University, Ho Chi Minh City, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3801-2683","authenticated-orcid":false,"given":"Lan","family":"Nguyen Duy","sequence":"additional","affiliation":[{"name":"University of Information Technology, Vietnam National University, Ho Chi Minh City, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6418-4169","authenticated-orcid":false,"given":"Khoa","family":"Nghi Hoang","sequence":"additional","affiliation":[{"name":"University of Information Technology, Vietnam National University, Ho Chi Minh City, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3147-3356","authenticated-orcid":false,"given":"Van-Hau","family":"Pham","sequence":"additional","affiliation":[{"name":"University of Information Technology, Vietnam National University, Ho Chi Minh City, Viet Nam"}]}],"member":"320","published-online":{"date-parts":[[2022,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Amir Afianian Salman Niksefat Babak Sadeghiyan and David Baptiste. 2019. Malware Dynamic Analysis Evasion Techniques: A Survey. ACM Comput. Surv. 52(2019).  Amir Afianian Salman Niksefat Babak Sadeghiyan and David Baptiste. 2019. Malware Dynamic Analysis Evasion Techniques: A Survey. ACM Comput. Surv. 52(2019).","DOI":"10.1145\/3365001"},{"key":"e_1_3_2_1_2_1","unstructured":"Ange Albertini. 2012. PE 101 - a windows executable walkthrough. https:\/\/github.com\/corkami\/pics\/blob\/master\/binary\/pe101\/README.md.  Ange Albertini. 2012. PE 101 - a windows executable walkthrough. https:\/\/github.com\/corkami\/pics\/blob\/master\/binary\/pe101\/README.md."},{"key":"e_1_3_2_1_3_1","volume-title":"EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. (04","author":"Anderson Hyrum","year":"2018","unstructured":"Hyrum Anderson and Phil Roth . 2018 . EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. (04 2018). Hyrum Anderson and Phil Roth. 2018. EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. (04 2018)."},{"key":"e_1_3_2_1_4_1","unstructured":"Hyrum\u00a0S Anderson Anant Kharkar Bobby Filar David Evans and Phil Roth. 2018. Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning. arXiv preprint arXiv:1801.08917(2018).  Hyrum\u00a0S Anderson Anant Kharkar Bobby Filar David Evans and Phil Roth. 2018. Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning. arXiv preprint arXiv:1801.08917(2018)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963724"},{"key":"e_1_3_2_1_6_1","unstructured":"Marc Bellemare Will Dabney and Remi Munos. 2017. A Distributional Perspective on Reinforcement Learning. (2017).  Marc Bellemare Will Dabney and Remi Munos. 2017. A Distributional Perspective on Reinforcement Learning. (2017)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Raphael\u00a0Labaca Castro Sebastian Franz and Gabi\u00a0Dreo Rodosek. 2021. AIMED-RL: Exploring Adversarial Malware Examples with Reinforcement Learning. In Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track.  Raphael\u00a0Labaca Castro Sebastian Franz and Gabi\u00a0Dreo Rodosek. 2021. AIMED-RL: Exploring Adversarial Malware Examples with Reinforcement Learning. In Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track.","DOI":"10.1007\/978-3-030-86514-6_3"},{"key":"e_1_3_2_1_8_1","volume-title":"Austin, and Mark Stamp","author":"Damodaran Anusha","year":"2017","unstructured":"Anusha Damodaran , Fabio\u00a0Di Troia , Corrado\u00a0Aaron Visaggio , Thomas\u00a0 H. Austin, and Mark Stamp . 2017 . A comparison of static, dynamic, and hybrid analysis for malware detection. Journal of Computer Virology and Hacking Techniques ( 2017). Anusha Damodaran, Fabio\u00a0Di Troia, Corrado\u00a0Aaron Visaggio, Thomas\u00a0H. Austin, and Mark Stamp. 2017. A comparison of static, dynamic, and hybrid analysis for malware detection. Journal of Computer Virology and Hacking Techniques (2017)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908033"},{"key":"e_1_3_2_1_10_1","volume-title":"Noisy Networks For Exploration. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rywHCPkAW","author":"Fortunato Meire","year":"2018","unstructured":"Meire Fortunato , Mohammad\u00a0Gheshlaghi Azar , Bilal Piot , Jacob Menick , Matteo Hessel , Ian Osband , Alex Graves , Volodymyr Mnih , Remi Munos , Demis Hassabis , Olivier Pietquin , Charles Blundell , and Shane Legg . 2018 . Noisy Networks For Exploration. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rywHCPkAW Meire Fortunato, Mohammad\u00a0Gheshlaghi Azar, Bilal Piot, Jacob Menick, Matteo Hessel, Ian Osband, Alex Graves, Volodymyr Mnih, Remi Munos, Demis Hassabis, Olivier Pietquin, Charles Blundell, and Shane Legg. 2018. Noisy Networks For Exploration. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rywHCPkAW"},{"key":"e_1_3_2_1_11_1","unstructured":"Yasuhiro Fujita Toshiki Kataoka Prabhat Nagarajan and Takahiro Ishikawa. 2019. ChainerRL: A Deep Reinforcement Learning Library. Journal of Machine Learning Research(2019).  Yasuhiro Fujita Toshiki Kataoka Prabhat Nagarajan and Takahiro Ishikawa. 2019. ChainerRL: A Deep Reinforcement Learning Library. Journal of Machine Learning Research(2019)."},{"key":"e_1_3_2_1_12_1","volume-title":"The rise of machine learning for detection and classification of malware: Research developments, trends and challenges. Journal of Network and Computer Applications","author":"Gibert Daniel","year":"2020","unstructured":"Daniel Gibert , Carles Mateu , and Jordi Planes . 2020. The rise of machine learning for detection and classification of malware: Research developments, trends and challenges. Journal of Network and Computer Applications ( 2020 ). Daniel Gibert, Carles Mateu, and Jordi Planes. 2020. The rise of machine learning for detection and classification of malware: Research developments, trends and challenges. Journal of Network and Computer Applications (2020)."},{"key":"e_1_3_2_1_13_1","unstructured":"Weiwei Hu and Ying Tan. 2017. Generating adversarial malware examples for black-box attacks based on GAN. arXiv:1702.05983.  Weiwei Hu and Ying Tan. 2017. Generating adversarial malware examples for black-box attacks based on GAN. arXiv:1702.05983."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC.2019.8669079"},{"key":"e_1_3_2_1_15_1","unstructured":"Guolin Ke Qi Meng Thomas Finley Taifeng Wang Wei Chen Weidong Ma Qiwei Ye and Tie-Yan Liu. 2017. LightGBM: A Highly Efficient Gradient Boosting Decision Tree. In Advances in Neural Information Processing Systems.  Guolin Ke Qi Meng Thomas Finley Taifeng Wang Wei Chen Weidong Ma Qiwei Ye and Tie-Yan Liu. 2017. LightGBM: A Highly Efficient Gradient Boosting Decision Tree. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_16_1","volume-title":"Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. In 26th European Signal Processing Conference (EUSIPCO).","author":"Kolosnjaji Bojan","year":"2018","unstructured":"Bojan Kolosnjaji , Ambra Demontis , Battista Biggio , Davide Maiorca , Giorgio Giacinto , Claudia Eckert , and Fabio Roli . 2018 . Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. In 26th European Signal Processing Conference (EUSIPCO). Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, and Fabio Roli. 2018. Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. In 26th European Signal Processing Conference (EUSIPCO)."},{"key":"e_1_3_2_1_17_1","unstructured":"Deqiang Li Qianmu Li Yanfang\u00a0(Fanny) Ye and Shouhuai Xu. 2021. Arms Race in Adversarial Malware Detection: A Survey. ACM Comput. Surv. 55(2021).  Deqiang Li Qianmu Li Yanfang\u00a0(Fanny) Ye and Shouhuai Xu. 2021. Arms Race in Adversarial Malware Detection: A Survey. ACM Comput. Surv. 55(2021)."},{"key":"e_1_3_2_1_18_1","series-title":"Lecture Notes in Networks and Systems","volume-title":"Deep Reinforcement Learning: An Overview","author":"Mousavi Sajad","unstructured":"Sajad Mousavi , Michael Schukat , and Enda Howley . 2018. Deep Reinforcement Learning: An Overview . Lecture Notes in Networks and Systems . Sajad Mousavi, Michael Schukat, and Enda Howley. 2018. Deep Reinforcement Learning: An Overview. Lecture Notes in Networks and Systems."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Ori Or-Meir Nir Nissim Yuval Elovici and Lior Rokach. 2019. Dynamic Malware Analysis in the Modern Era\u2014A State of the Art Survey. ACM Comput. Surv. 52(2019).  Ori Or-Meir Nir Nissim Yuval Elovici and Lior Rokach. 2019. Dynamic Malware Analysis in the Modern Era\u2014A State of the Art Survey. ACM Comput. Surv. 52(2019).","DOI":"10.1145\/3329786"},{"key":"e_1_3_2_1_20_1","unstructured":"Oracle. 2020. VBoxManage. https:\/\/docs.oracle.com\/en\/virtualization\/virtualbox\/6.0\/user\/vboxmanage-intro.html.  Oracle. 2020. VBoxManage. https:\/\/docs.oracle.com\/en\/virtualization\/virtualbox\/6.0\/user\/vboxmanage-intro.html."},{"key":"e_1_3_2_1_21_1","volume-title":"A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. Comput. Surveys","author":"Oz Harun","year":"2022","unstructured":"Harun Oz , Ahmet Aris , Albert Levi , and A.\u00a0 Selcuk Uluagac . 2022. A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. Comput. Surveys ( 2022 ). Harun Oz, Ahmet Aris, Albert Levi, and A.\u00a0Selcuk Uluagac. 2022. A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. Comput. Surveys (2022)."},{"key":"e_1_3_2_1_22_1","unstructured":"Quarkslab. 2017. LIEF - Library to instrument executable formats. https:\/\/github.com\/lief-project.  Quarkslab. 2017. LIEF - Library to instrument executable formats. https:\/\/github.com\/lief-project."},{"key":"#cr-split#-e_1_3_2_1_23_1.1","unstructured":"Edward Raff Jon Barker Jared Sylvester Robert Brandon Bryan Catanzaro and Charles Nicholas. 2017. Malware Detection by Eating a Whole EXE. https:\/\/doi.org\/10.48550\/arXiv.1710.09435 10.48550\/arXiv.1710.09435"},{"key":"#cr-split#-e_1_3_2_1_23_1.2","unstructured":"Edward Raff Jon Barker Jared Sylvester Robert Brandon Bryan Catanzaro and Charles Nicholas. 2017. Malware Detection by Eating a Whole EXE. https:\/\/doi.org\/10.48550\/arXiv.1710.09435"},{"key":"e_1_3_2_1_24_1","volume-title":"A survey on machine learning-based malware detection in executable files. Journal of Systems Architecture 112","author":"Singh Jagsir","year":"2021","unstructured":"Jagsir Singh and Jaswinder Singh . 2021. A survey on machine learning-based malware detection in executable files. Journal of Systems Architecture 112 ( 2021 ). Jagsir Singh and Jaswinder Singh. 2021. A survey on machine learning-based malware detection in executable files. Journal of Systems Architecture 112 (2021)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2010.85"}],"event":{"name":"SoICT 2022: The 11th International Symposium on Information and Communication Technology","location":"Hanoi Vietnam","acronym":"SoICT 2022"},"container-title":["The 11th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568631","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568562.3568631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:40Z","timestamp":1750186840000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568631"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":26,"alternative-id":["10.1145\/3568562.3568631","10.1145\/3568562"],"URL":"https:\/\/doi.org\/10.1145\/3568562.3568631","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"2022-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}