{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:38:07Z","timestamp":1774949887131,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":93,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"European Commission","doi-asserted-by":"publisher","award":["101063107"],"award-info":[{"award-number":["101063107"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3664514","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["SoK: Visualization-based Malware Detection Techniques"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4944-0976","authenticated-orcid":false,"given":"Matteo","family":"Brosolo","sequence":"first","affiliation":[{"name":"University of Padua, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6078-2014","authenticated-orcid":false,"given":"Vinod","family":"Puthuvath","sequence":"additional","affiliation":[{"name":"University of Padua, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7662-8959","authenticated-orcid":false,"given":"Asmitha","family":"KA","sequence":"additional","affiliation":[{"name":"Cochin University of Science and Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7330-1178","authenticated-orcid":false,"given":"Rafidha","family":"Rehiman","sequence":"additional","affiliation":[{"name":"Cochin University of Science and Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544473"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2023.301564"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380354"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05195-w"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108804"},{"key":"e_1_3_2_1_6_1","volume-title":"Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification.Computer Systems Science & Engineering 46, 2","author":"Ban Younghoon","year":"2023","unstructured":"Younghoon Ban, Jeong\u00a0Hyun Yi, and Haehyun Cho. 2023. Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification.Computer Systems Science & Engineering 46, 2 (2023)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833659"},{"key":"e_1_3_2_1_8_1","volume-title":"Attacks on Visualization-Based Malware Detection: Balancing Effectiveness and Executability. CoRR abs\/2109.10417","author":"Benkraouda Hadjer","year":"2021","unstructured":"Hadjer Benkraouda, Jingyu Qian, Hung\u00a0Quoc Tran, and Berkay Kaplan. 2021. Attacks on Visualization-Based Malware Detection: Balancing Effectiveness and Executability. CoRR abs\/2109.10417 (2021). arXiv:2109.10417https:\/\/arxiv.org\/abs\/2109.10417"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103057"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102166"},{"key":"e_1_3_2_1_11_1","volume-title":"Electronics & Mobile Communication Conference (UEMCON). IEEE, 0660\u20130665","author":"Burks Roland","year":"2019","unstructured":"Roland Burks, Kazi\u00a0Aminul Islam, Yan Lu, and Jiang Li. 2019. Data augmentation with generative models for improved malware detection: A comparative study. In 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 0660\u20130665."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371924"},{"key":"e_1_3_2_1_13_1","first-page":"44","article-title":"Dynamic Mobile Malware Detection through System Call-based Image representation.J","volume":"12","author":"Casolare Rosangela","year":"2021","unstructured":"Rosangela Casolare, Carlo De\u00a0Dominicis, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, and Antonella Santone. 2021. Dynamic Mobile Malware Detection through System Call-based Image representation.J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12, 1 (2021), 44\u201363.","journal-title":"Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102133"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103306"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103402"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3200866"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509965"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSC49826.2021.9346277"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102887"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2822680"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.06.032"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3605775"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103084"},{"key":"e_1_3_2_1_25_1","volume-title":"When explainability meets adversarial learning: Detecting adversarial examples using shap signatures. In 2020 international joint conference on neural networks (IJCNN)","author":"Fidel Gil","unstructured":"Gil Fidel, Ron Bitton, and Asaf Shabtai. 2020. When explainability meets adversarial learning: Detecting adversarial examples using shap signatures. In 2020 international joint conference on neural networks (IJCNN). IEEE, 1\u20138."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101873"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102526"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-018-0323-0"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117957"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3605764.3623914"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.804262"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117200"},{"key":"e_1_3_2_1_33_1","unstructured":"Jingcai Guo Yuanyuan Xu Wenchao Xu Yufeng Zhan Yuxia Sun and Song Guo. 2023. MDENet: Multi-modal Dual-embedding Networks for Malware Open-set Recognition. arxiv:2305.01245\u00a0[cs.CR]"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1973.4309314"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-022-00445-y"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.09.358"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102198"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102400"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-023-04522-y"},{"key":"e_1_3_2_1_40_1","volume-title":"Transcend: Detecting concept drift in malware classification models. In 26th USENIX security symposium (USENIX security 17). 625\u2013642.","author":"Jordaney Roberto","year":"2017","unstructured":"Roberto Jordaney, Kumar Sharad, Santanu\u00a0K Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro. 2017. Transcend: Detecting concept drift in malware classification models. In 26th USENIX security symposium (USENIX security 17). 625\u2013642."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100153"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120017"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103063"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118073"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.12.036"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3075694"},{"key":"e_1_3_2_1_47_1","volume-title":"Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art. Computers & Security","author":"Ling Xiang","year":"2023","unstructured":"Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Yaguan Qian, Chunming Wu, Shouling Ji, Tianyue Luo, 2023. Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art. Computers & Security (2023), 103134."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101682"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329073"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/WSC40007.2019.9004932"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.32604\/jcs.2022.033537"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100529"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA56854.2022.00049"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103265"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.03.015"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102154"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEECCOT52851.2021.9708041"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.005"},{"key":"e_1_3_2_1_60_1","volume-title":"Botching human factors in cybersecurity in business organizations. HOLISTICA\u2013Journal of Business and Public Administration 9, 3","author":"Nobles Calvin","year":"2018","unstructured":"Calvin Nobles. 2018. Botching human factors in cybersecurity in business organizations. HOLISTICA\u2013Journal of Business and Public Administration 9, 3 (2018), 71\u201388."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102660"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00210"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102247"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","unstructured":"Yanchen Qiao Qingshan Jiang Zhenchao Jiang and Liang Gu. 2019. A Multi-channel Visualization Method for Malware Classification Based on Deep Learning. In 2019 18th IEEE International Conference On Trust Security And Privacy In Computing And Communications\/13th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). 757\u2013762. https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2019.00109","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00109"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-14236-6"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102098"},{"key":"e_1_3_2_1_67_1","volume-title":"Microsoft Malware Classification Challenge. CoRR abs\/1802.10135","author":"Ronen Royi","year":"2018","unstructured":"Royi Ronen, Marian Radu, Corina Feuerstein, Elad Yom-Tov, and Mansour Ahmadi. 2018. Microsoft Malware Classification Challenge. CoRR abs\/1802.10135 (2018). arXiv:1802.10135http:\/\/arxiv.org\/abs\/1802.10135"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533759"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453158"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.10.001"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICET56601.2022.10004652"},{"key":"e_1_3_2_1_72_1","volume-title":"Windows and IoT malware visualization and classification with deep CNN and Xception CNN using Markov images. Journal of Intelligent Information Systems","author":"Sharma Osho","year":"2022","unstructured":"Osho Sharma, Akashdeep Sharma, and Arvind Kalia. 2022. Windows and IoT malware visualization and classification with deep CNN and Xception CNN using Markov images. Journal of Intelligent Information Systems (2022), 1\u201327."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106030"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2910086"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.06.029"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2884928"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102515"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09376-6"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.001"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107138"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101748"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.06.006"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101895"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3789"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102273"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2020.03.012"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102420"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102622"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101592"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101740"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3160357"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102691"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470067"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2024"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664514","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3664514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:53:40Z","timestamp":1755881620000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664514"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":93,"alternative-id":["10.1145\/3664476.3664514","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3664514","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}