{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:43:26Z","timestamp":1753886606698,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1145\/3568562.3568636","type":"proceedings-article","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:25:01Z","timestamp":1669681501000},"page":"31-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Leveraging Reinforcement Learning and Generative Adversarial Networks to Craft Mutants of Windows Malware against Black-box Malware Detectors"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5945-3712","authenticated-orcid":false,"given":"The Duy","family":"Phan","sequence":"first","affiliation":[{"name":"Information Security Lab, University of Information Technology, Vietnam National University, Ho Chi Minh City, Vietnam, Viet Nam and Vietnam National University, Ho Chi Minh City, Vietnam, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1416-903X","authenticated-orcid":false,"given":"Tran","family":"Duc Luong","sequence":"additional","affiliation":[{"name":"University of Information Technology, Vietnam National University, Ho Chi Minh City, Vietnam, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6693-6395","authenticated-orcid":false,"given":"Nguyen","family":"Hoang Quoc An","sequence":"additional","affiliation":[{"name":"University of Information Technology, Vietnam National University, Ho Chi Minh City, Vietnam, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0065-9919","authenticated-orcid":false,"given":"Quyen","family":"Nguyen Huu","sequence":"additional","affiliation":[{"name":"University of Information Technology, Vietnam National University, Ho Chi Minh city, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6418-4169","authenticated-orcid":false,"given":"Hoang Khoa","family":"Nghi","sequence":"additional","affiliation":[{"name":"University of Information Technology, Vietnam National University, Ho Chi Minh city, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3147-3356","authenticated-orcid":false,"given":"Van-Hau","family":"Pham","sequence":"additional","affiliation":[{"name":"Information Security Lab, University of Information Technology, Vietnam National University, Ho Chi Minh city, Viet Nam and Vietnam National University, Ho Chi Minh city, Vietnam"}]}],"member":"320","published-online":{"date-parts":[[2022,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Anderson and Phil Roth","author":"S.","year":"2018","unstructured":"Hyrum\u00a0 S. Anderson and Phil Roth . 2018 . EMBER : An Open Dataset for Training Static PE Malware Machine Learning Models . https:\/\/doi.org\/10.48550\/ARXIV.1804.04637 10.48550\/ARXIV.1804.04637 Hyrum\u00a0S. Anderson and Phil Roth. 2018. EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. https:\/\/doi.org\/10.48550\/ARXIV.1804.04637"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963724"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952603"},{"key":"e_1_3_2_1_4_1","unstructured":"BackupGGCode. 2015. PE Bliss - Cross-Platform Portable Executable C++ Library. https:\/\/github.com\/BackupGGCode\/portable-executable-library.  BackupGGCode. 2015. PE Bliss - Cross-Platform Portable Executable C++ Library. https:\/\/github.com\/BackupGGCode\/portable-executable-library."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3103139"},{"key":"#cr-split#-e_1_3_2_1_6_1.1","unstructured":"Greg Brockman Vicki Cheung Ludwig Pettersson Jonas Schneider John Schulman Jie Tang and Wojciech Zaremba. 2016. OpenAI Gym. https:\/\/doi.org\/10.48550\/ARXIV.1606.01540 10.48550\/ARXIV.1606.01540"},{"key":"#cr-split#-e_1_3_2_1_6_1.2","unstructured":"Greg Brockman Vicki Cheung Ludwig Pettersson Jonas Schneider John Schulman Jie Tang and Wojciech Zaremba. 2016. OpenAI Gym. https:\/\/doi.org\/10.48550\/ARXIV.1606.01540"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2017.21"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90122-2"},{"key":"e_1_3_2_1_9_1","unstructured":"CyberForce. 2015. PEsidious - Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks. https:\/\/github.com\/CyberForce\/Pesidious.  CyberForce. 2015. PEsidious - Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks. https:\/\/github.com\/CyberForce\/Pesidious."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473039"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908033"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908033"},{"key":"e_1_3_2_1_14_1","volume-title":"C (3","author":"Gibert Daniel","year":"2020","unstructured":"Daniel Gibert , Carles Mateu , and Jordi Planes . 2020. The Rise of Machine Learning for Detection and Classification of Malware: Research Developments, Trends and Challenges. J. Netw. Comput. Appl. 153 , C (3 2020 ), 22\u00a0pages. https:\/\/doi.org\/10.1016\/j.jnca.2019.102526 10.1016\/j.jnca.2019.102526 Daniel Gibert, Carles Mateu, and Jordi Planes. 2020. The Rise of Machine Learning for Detection and Classification of Malware: Research Developments, Trends and Challenges. J. Netw. Comput. Appl. 153, C (3 2020), 22\u00a0pages. https:\/\/doi.org\/10.1016\/j.jnca.2019.102526"},{"key":"e_1_3_2_1_15_1","volume-title":"Generative adversarial nets. Advances in neural information processing systems 27","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow , Jean Pouget-Abadie , Mehdi Mirza , Bing Xu , David Warde-Farley , Sherjil Ozair , Aaron Courville , and Yoshua Bengio . 2014. Generative adversarial nets. Advances in neural information processing systems 27 ( 2014 ). Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in neural information processing systems 27 (2014)."},{"key":"e_1_3_2_1_16_1","unstructured":"Weiwei Hu and Ying Tan. 2017. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. CoRR abs\/1702.05983(2017). arXiv:1702.05983http:\/\/arxiv.org\/abs\/1702.05983  Weiwei Hu and Ying Tan. 2017. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. CoRR abs\/1702.05983(2017). arXiv:1702.05983http:\/\/arxiv.org\/abs\/1702.05983"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86514-6_3"},{"key":"e_1_3_2_1_18_1","volume-title":"Article 15 (11","author":"Li Deqiang","year":"2021","unstructured":"Deqiang Li , Qianmu Li , Yanfang\u00a0(Fanny) Ye, and Shouhuai Xu. 2021. Arms Race in Adversarial Malware Detection: A Survey. ACM Comput. Surv. 55, 1 , Article 15 (11 2021 ), 35\u00a0pages. https:\/\/doi.org\/10.1145\/3484491 10.1145\/3484491 Deqiang Li, Qianmu Li, Yanfang\u00a0(Fanny) Ye, and Shouhuai Xu. 2021. Arms Race in Adversarial Malware Detection: A Survey. ACM Comput. Surv. 55, 1, Article 15 (11 2021), 35\u00a0pages. https:\/\/doi.org\/10.1145\/3484491"},{"key":"e_1_3_2_1_19_1","volume-title":"Article 78 (8","author":"Maiorca Davide","year":"2019","unstructured":"Davide Maiorca , Battista Biggio , and Giorgio Giacinto . 2019. Towards Adversarial Malware Detection: Lessons Learned from PDF-Based Attacks. ACM Comput. Surv. 52, 4 , Article 78 (8 2019 ), 36\u00a0pages. https:\/\/doi.org\/10.1145\/3332184 10.1145\/3332184 Davide Maiorca, Battista Biggio, and Giorgio Giacinto. 2019. Towards Adversarial Malware Detection: Lessons Learned from PDF-Based Attacks. ACM Comput. Surv. 52, 4, Article 78 (8 2019), 36\u00a0pages. https:\/\/doi.org\/10.1145\/3332184"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974752"},{"key":"e_1_3_2_1_21_1","volume-title":"babu, and T. Anuradha","author":"Mohammed Athiq","year":"2020","unstructured":"Athiq Mohammed , G. Viswanath , K. babu, and T. Anuradha . 2020 . Malware Detection in Executable Files Using Machine Learning . 277\u2013284. https:\/\/doi.org\/10.1007\/978-3-030-24322-7_36 10.1007\/978-3-030-24322-7_36 Athiq Mohammed, G. Viswanath, K. babu, and T. Anuradha. 2020. Malware Detection in Executable Files Using Machine Learning. 277\u2013284. https:\/\/doi.org\/10.1007\/978-3-030-24322-7_36"},{"key":"e_1_3_2_1_22_1","volume-title":"Article 88 (9","author":"Or-Meir Ori","year":"2019","unstructured":"Ori Or-Meir , Nir Nissim , Yuval Elovici , and Lior Rokach . 2019. Dynamic Malware Analysis in the Modern Era\u2014A State of the Art Survey. ACM Comput. Surv. 52, 5 , Article 88 (9 2019 ), 48\u00a0pages. https:\/\/doi.org\/10.1145\/3329786 10.1145\/3329786 Ori Or-Meir, Nir Nissim, Yuval Elovici, and Lior Rokach. 2019. Dynamic Malware Analysis in the Modern Era\u2014A State of the Art Survey. ACM Comput. Surv. 52, 5, Article 88 (9 2019), 48\u00a0pages. https:\/\/doi.org\/10.1145\/3329786"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"e_1_3_2_1_24_1","unstructured":"Quarkslab. 2017. LIEF - Library to instrument executable formats. https:\/\/github.com\/lief-project.  Quarkslab. 2017. LIEF - Library to instrument executable formats. https:\/\/github.com\/lief-project."},{"key":"e_1_3_2_1_25_1","volume-title":"Anazida Zainal, Fuad\u00a0A. Ghaleb, and Murad\u00a0A. Rassam.","author":"Urooj Umara","year":"2022","unstructured":"Umara Urooj , Bander Ali\u00a0Saleh Al-rimy , Anazida Zainal, Fuad\u00a0A. Ghaleb, and Murad\u00a0A. Rassam. 2022 . Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions. Applied Sciences 12, 1 (2022). https:\/\/doi.org\/10.3390\/app12010172 10.3390\/app12010172 Umara Urooj, Bander Ali\u00a0Saleh Al-rimy, Anazida Zainal, Fuad\u00a0A. Ghaleb, and Murad\u00a0A. Rassam. 2022. Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions. Applied Sciences 12, 1 (2022). https:\/\/doi.org\/10.3390\/app12010172"}],"event":{"name":"SoICT 2022: The 11th International Symposium on Information and Communication Technology","acronym":"SoICT 2022","location":"Hanoi Vietnam"},"container-title":["The 11th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568636","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568562.3568636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:40Z","timestamp":1750186840000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":26,"alternative-id":["10.1145\/3568562.3568636","10.1145\/3568562"],"URL":"https:\/\/doi.org\/10.1145\/3568562.3568636","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"2022-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}