{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:26Z","timestamp":1750219826046,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T00:00:00Z","timestamp":1692835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2020A1515010696"],"award-info":[{"award-number":["2020A1515010696"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,24]]},"DOI":"10.1145\/3609510.3609818","type":"proceedings-article","created":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T16:08:44Z","timestamp":1690819724000},"page":"65-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Family Classification based on Tree Representations for Malware"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9401-9313","authenticated-orcid":false,"given":"Yang","family":"Xu","sequence":"first","affiliation":[{"name":"South China University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5827-536X","authenticated-orcid":false,"given":"Zhuotai","family":"Chen","sequence":"additional","affiliation":[{"name":"South China University of Technology, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2023,8,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2016.73017"},{"key":"e_1_3_2_1_2_1","volume-title":"Mert Nar and Ibrahim Sogukpinar","author":"Kakisim Necmettin Carkaci","year":"2019","unstructured":"Necmettin Carkaci Arzu G. Kakisim , Mert Nar and Ibrahim Sogukpinar . 2019 . Analysis and Evaluation of Dynamic Feature-Based Malware Detection Methods. In Innovative Security Solutions for Information Technology and Communications, Jean-Louis Lanet and Cristian Toma (Eds.). Springer International Publishing , Cham, 247--258. https:\/\/doi.org\/10.1007\/978-3-030-12942-2_19 10.1007\/978-3-030-12942-2_19 Necmettin Carkaci Arzu G. Kakisim, Mert Nar and Ibrahim Sogukpinar. 2019. Analysis and Evaluation of Dynamic Feature-Based Malware Detection Methods. In Innovative Security Solutions for Information Technology and Communications, Jean-Louis Lanet and Cristian Toma (Eds.). Springer International Publishing, Cham, 247--258. https:\/\/doi.org\/10.1007\/978-3-030-12942-2_19"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2811411.2811543"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927552"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.07.004"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2014.52006"},{"key":"e_1_3_2_1_7_1","volume-title":"Youn Jihun Kim, Seungwon Lee and Haechul Choi","author":"Jonghee","year":"2017","unstructured":"Jonghee M. Youn Jihun Kim, Seungwon Lee and Haechul Choi . 2017 . A study of simple classification of malware based on the dynamic API call counts. In Advances in Computer Science and Ubiquitous Computing. Springer Singapore , Singapore, 944--949. https:\/\/doi.org\/10.1007\/978-981-10-3023-9_147 10.1007\/978-981-10-3023-9_147 Jonghee M. Youn Jihun Kim, Seungwon Lee and Haechul Choi. 2017. A study of simple classification of malware based on the dynamic API call counts. In Advances in Computer Science and Ubiquitous Computing. Springer Singapore, Singapore, 944--949. https:\/\/doi.org\/10.1007\/978-981-10-3023-9_147"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2015.15"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1110-2"},{"key":"e_1_3_2_1_10_1","volume-title":"Nir Nissim and Lior Rokach","author":"Ori Or-Meir Yuval Elovici","year":"2019","unstructured":"Yuval Elovici Ori Or-Meir , Nir Nissim and Lior Rokach . 2019 . Dynamic Malware Analysis in the Modern Era---A State of the Art Survey. ACM Comput. Surv. 52, 5, Article 88 (2019), 48 pages. https:\/\/doi.org\/10.1145\/3329786 10.1145\/3329786 Yuval Elovici Ori Or-Meir, Nir Nissim and Lior Rokach. 2019. Dynamic Malware Analysis in the Modern Era---A State of the Art Survey. ACM Comput. Surv. 52, 5, Article 88 (2019), 48 pages. https:\/\/doi.org\/10.1145\/3329786"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of International Conference on Security, Privacy, and Applied Cryptography Engineering (Lecture Notes in Computer Science","volume":"280","author":"Sanchit Gupta Harshit Sharma","year":"2016","unstructured":"Harshit Sharma Sanchit Gupta and Sarvjeet Kaur . 2016 . Malware Characterization Using Windows API Call Sequences . In Proceedings of International Conference on Security, Privacy, and Applied Cryptography Engineering (Lecture Notes in Computer Science , Vol. 10076). Springer International Publishing, Cham, 271-- 280 . https:\/\/doi.org\/10.1007\/978-3-319-49445-6_15 10.1007\/978-3-319-49445-6_15 Harshit Sharma Sanchit Gupta and Sarvjeet Kaur. 2016. Malware Characterization Using Windows API Call Sequences. In Proceedings of International Conference on Security, Privacy, and Applied Cryptography Engineering (Lecture Notes in Computer Science, Vol. 10076). Springer International Publishing, Cham, 271--280. https:\/\/doi.org\/10.1007\/978-3-319-49445-6_15"},{"key":"e_1_3_2_1_12_1","volume-title":"van der Aalst","author":"Leemans Dirk Fahland","year":"2015","unstructured":"Dirk Fahland Sander J. J. Leemans and Wil M. P . van der Aalst . 2015 . Scalable Process Discovery with Guarantees. In Enterprise, Business-Process and Information Systems Modeling, Khaled Gaaloul, Rainer Schmidt, S\u00e9rgio Guerreiro Selmin Nurcan, and Qin Ma (Eds.). Springer International Publishing , Cham, 85--101. https:\/\/doi.org\/10.1007\/978-3-319-19237-6_6 10.1007\/978-3-319-19237-6_6 Dirk Fahland Sander J. J. Leemans and Wil M. P. van der Aalst. 2015. Scalable Process Discovery with Guarantees. In Enterprise, Business-Process and Information Systems Modeling, Khaled Gaaloul, Rainer Schmidt, S\u00e9rgio Guerreiro Selmin Nurcan, and Qin Ma (Eds.). Springer International Publishing, Cham, 85--101. https:\/\/doi.org\/10.1007\/978-3-319-19237-6_6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.02.149"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1594-6"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IESYS.2017.8233569"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2016.7888735"},{"volume-title":"Process Mining (2nd. ed.)","author":"van der Aalst Wil M. P.","key":"e_1_3_2_1_17_1","unstructured":"Wil M. P. van der Aalst . 2016. Process Mining (2nd. ed.) . Springer Berlin , Heidelberg . https:\/\/doi.org\/10.1007\/978-3-662-49851-4 10.1007\/978-3-662-49851-4 Wil M. P. van der Aalst. 2016. Process Mining (2nd. ed.). Springer Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-662-49851-4"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313562"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852716"},{"key":"e_1_3_2_1_20_1","article-title":"A Novel Approach to Detect Malware Based on API Call Sequence Analysis","volume":"11","author":"Youngjoon Ki Eunjin Kim","year":"2015","unstructured":"Eunjin Kim Youngjoon Ki and Huy Kang Kim . 2015 . A Novel Approach to Detect Malware Based on API Call Sequence Analysis . International Journal of Distributed Sensor Networks 11 , 6 (2015). https:\/\/doi.org\/10.1155\/2015\/659101 10.1155\/2015 Eunjin Kim Youngjoon Ki and Huy Kang Kim. 2015. A Novel Approach to Detect Malware Based on API Call Sequence Analysis. International Journal of Distributed Sensor Networks 11, 6 (2015). https:\/\/doi.org\/10.1155\/2015\/659101","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the VLDB Endowment","volume":"2","author":"Zeng Zhiping","year":"2009","unstructured":"Zhiping Zeng , Anthony K. H. Tung , Jianyong Wang , Jianhua Feng , and Lizhu Zhou . 2009 . Fast malware classification by automated behavioral graph matching . In Proceedings of the VLDB Endowment , Vol. 2 . NY, USA, 25--36. https:\/\/doi.org\/10.14778\/1687627.1687631 10.14778\/1687627.1687631 Zhiping Zeng, Anthony K. H. Tung, Jianyong Wang, Jianhua Feng, and Lizhu Zhou. 2009. Fast malware classification by automated behavioral graph matching. In Proceedings of the VLDB Endowment, Vol. 2. NY, USA, 25--36. https:\/\/doi.org\/10.14778\/1687627.1687631"}],"event":{"name":"APSys '23: 14th ACM SIGOPS Asia-Pacific Workshop on Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Seoul Republic of Korea","acronym":"APSys '23"},"container-title":["Proceedings of the 14th ACM SIGOPS Asia-Pacific Workshop on Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609510.3609818","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3609510.3609818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:25Z","timestamp":1750178785000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609510.3609818"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,24]]},"references-count":21,"alternative-id":["10.1145\/3609510.3609818","10.1145\/3609510"],"URL":"https:\/\/doi.org\/10.1145\/3609510.3609818","relation":{},"subject":[],"published":{"date-parts":[[2023,8,24]]},"assertion":[{"value":"2023-08-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}