{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T16:54:05Z","timestamp":1771952045761,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3652439","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Malware Analysis Types &amp; Techniques : A Survey"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2951-9132","authenticated-orcid":false,"given":"Priya","family":"Arora","sequence":"first","affiliation":[{"name":"Department of Computer Science &amp; Engineering, Amity University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0046-6700","authenticated-orcid":false,"given":"Rashmi","family":"Gupta","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, Amity University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5469-1420","authenticated-orcid":false,"given":"Nidhi","family":"Malik","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, The NorthCap University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2205-1493","authenticated-orcid":false,"given":"Anil","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Poornima Institute of Engineering and Technology, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.001"},{"key":"e_1_3_2_1_2_1","first-page":"2169","article-title":"A Comprehensive Review on Malware Detection Approach- es","volume":"8","author":"Aslan R.","year":"2022","unstructured":"O.A.Aslan,R.Samet, \u201cA Comprehensive Review on Malware Detection Approach- es\u201d,IEEE,Vol 8,ISSN:2169-3536,2022.","journal-title":"IEEE"},{"key":"e_1_3_2_1_3_1","first-page":"2278","article-title":"Malware and Malware Detection Techniques : A Sur- vey","volume":"2","author":"Landage M.P","year":"2013","unstructured":"J.Landage ,M.P Wankhade, \u201cMalware and Malware Detection Techniques : A Sur- vey\u201d,International Journal of Engineering Research & Technology,Vol.2,,ISSN:2278- 0181,2013.","journal-title":"International Journal of Engineering Research & Technology"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc.of IEEE 2nd International Conference on Smart Electronics and Communication (ICOSEC),2021","author":"Pachhala S.","unstructured":"N.Pachhala,S.Jothilakshmi,B.P Battula, \u201c A Comprehensive Survey on Identification of Malware Types and Malware Classification Using Machine Learning Techniques\u201d,in Proc.of IEEE 2nd International Conference on Smart Electronics and Communication (ICOSEC),2021."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5120\/15544-4098"},{"key":"e_1_3_2_1_6_1","volume-title":"Master's project report, Department of Computer Science, San Jose State Univer- sity","author":"Govindaraju","year":"2010","unstructured":"Govindaraju, \u201cExhaustive Statistical Analysis for Detection of Metamorphic Mal- ware\u201d, Master's project report, Department of Computer Science, San Jose State Univer- sity, 2010."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc.of the 26th International Conference on Advanced Information Networking and Applications Workshops ,IEEE, 738\u2013744","author":"Vinod P.","year":"2012","unstructured":"Vinod, P.,Laxmi, V. and Gaur, M. S, \u201c REFORM: relevant features for malware analy- sis\u201d,in Proc.of the 26th International Conference on Advanced Information Networking and Applications Workshops ,IEEE, 738\u2013744.,2012."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.10.011"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2008.01.028"},{"key":"e_1_3_2_1_10_1","volume-title":"Improving the detection accuracy of unknown mal- wares by partitioning the executables in groups","author":"Sharma A","year":"2016","unstructured":"Sharma,A,Sahay,S.K,Kumar.A \u201c Improving the detection accuracy of unknown mal- wares by partitioning the executables in groups\u201d,Springer ,2016,421-431."},{"issue":"113121","key":"e_1_3_2_1_11_1","article-title":"Evolution of Computer Virus Concealment and Anti- Virus Techniques: A Short Survey","volume":"8","author":"Rad B. B.","year":"2011","unstructured":"Rad, B. B., Masrom, M. and Ibrahim, S. \u201cEvolution of Computer Virus Concealment and Anti- Virus Techniques: A Short Survey\u201d, International Journal of Computer Science Issues, 8:113121,2011","journal-title":"International Journal of Computer Science Issues"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0028-7"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc.of Elsevier International Conference on Information Security & Privacy, 78:  667-674","author":"Sanjay K","year":"2015","unstructured":"Sanjay K Sahay ,Ashu Sharma2, \u201cGrouping the executables to detect malware with high accuracy\u201d, in Proc.of Elsevier International Conference on Information Security & Privacy, 78: 667-674,2015."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"M.S Akhtar T.Feng \u201cMalware Analysis and Detection using Machine Learning Al- gorithms\u201d Symmetry 2022.","DOI":"10.3390\/sym14112304"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc.of IEEE 12th Annual Computing and Communication Work- shop and Conference(CCWC),2022","unstructured":"M.masum,M.J.H.faruk , \u201cRansomware Classification and Detection with Machine Learning Algorithms\u201d,in Proc.of IEEE 12th Annual Computing and Communication Work- shop and Conference(CCWC),2022."},{"key":"e_1_3_2_1_16_1","volume-title":"Proc.of Springer,International Conference on Mathematics and Computing,2022","author":"Rani S.V","unstructured":"N.Rani,S.V Dhavale, A.Singh & A.mehra, \u201cA survey on machine learning based Ransomware Detection\u201d,in Proc.of Springer,International Conference on Mathematics and Computing,2022."},{"key":"e_1_3_2_1_17_1","volume-title":"Deceiving AI_based malware detec- tion through polymorphic attacks","author":"Catalano A","year":"2022","unstructured":"C.Catalano,A Chezzi,M Angelelli,F.Tommasi, \u201cDeceiving AI_based malware detec- tion through polymorphic attacks\u201dElsevier ,Computers in industry,2022."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0125-x"},{"key":"e_1_3_2_1_19_1","first-page":"2395","article-title":"A Survey on Malware Analysis Techniques ,its Detection and Mitigation","volume":"08","author":"Parekh G","year":"2021","unstructured":"M Parekh,G Kulkarni \u201cA Survey on Malware Analysis Techniques ,its Detection and Mitigation\u201d,,International Research Journal on Engineering & Technology,,Vol.08,ISSN:2395-0072,2021.","journal-title":"International Research Journal on Engineering & Technology"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100529"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of the International Conference on Advances in Computing Research (ACR 2023","author":"AlMasri M.N.","year":"2023","unstructured":"T.N. AlMasri, M.N.AlDalaien, \u201cDetecting Spyware in Android Devices Using Ran- dom Forest\u201d,in Proc. of the International Conference on Advances in Computing Research (ACR 2023), vol 700. Springer, Cham,2023."}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","location":"Jaipur India","acronym":"ICIMMI 2023"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3652439","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3652439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:24:45Z","timestamp":1758216285000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3652439"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":21,"alternative-id":["10.1145\/3647444.3652439","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3652439","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}