{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:37:05Z","timestamp":1773247025108,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T00:00:00Z","timestamp":1730678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,4]]},"DOI":"10.1145\/3686215.3690147","type":"proceedings-article","created":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:17:01Z","timestamp":1730290621000},"page":"36-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Understanding LLMs Ability to Aid Malware Analysts in Bypassing Evasion Techniques"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-5851-4851","authenticated-orcid":false,"given":"Miuyin","family":"Yong Wong","sequence":"first","affiliation":[{"name":"Georgia Institue of Technology, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6565-3856","authenticated-orcid":false,"given":"Kevin","family":"Valakuzhy","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7955-5126","authenticated-orcid":false,"given":"Mustaque","family":"Ahamad","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0803-7647","authenticated-orcid":false,"given":"Doug","family":"Blough","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9805-2217","authenticated-orcid":false,"given":"Fabian","family":"Monrose","sequence":"additional","affiliation":[{"name":"ECE, Georgia Tech, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.36"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"e_1_3_2_1_3_1","volume-title":"A Systematical and longitudinal study of evasive behaviors in windows malware. Computers & security 113","author":"Galloro Nicola","year":"2022","unstructured":"Nicola Galloro, Mario Polino, Michele Carminati, Andrea Continella, and Stefano Zanero. 2022. A Systematical and longitudinal study of evasive behaviors in windows malware. Computers & security 113 (2022), 102550."},{"key":"e_1_3_2_1_4_1","volume-title":"From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy","author":"Gupta Maanak","year":"2023","unstructured":"Maanak Gupta, CharanKumar Akiri, Kshitiz Aryal, Eli Parker, and Lopamudra Praharaj. 2023. From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy. IEEE Access (2023)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046740"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.25"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664252"},{"key":"e_1_3_2_1_8_1","volume-title":"Longitudinal study of the prevalence of malware evasive techniques. arXiv preprint arXiv:2112.11289","author":"Maffia Lorenzo","year":"2021","unstructured":"Lorenzo Maffia, Dario Nisi, Platon Kotzias, Giovanni Lagorio, Simone Aonzo, and Davide Balzarotti. 2021. Longitudinal study of the prevalence of malware evasive techniques. arXiv preprint arXiv:2112.11289 (2021)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813617"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.48"},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Security symposium","author":"Peng Fei","year":"2014","unstructured":"Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, and Zhendong Su. [n. d.]. X-force: Force-executing binary programs for security applications. In USENIX Security symposium 2014."},{"key":"e_1_3_2_1_12_1","volume-title":"Entrapment: Tricking malware with transparent, scalable malware analysis. talk at Black Hat","author":"Royal Paul","year":"2012","unstructured":"Paul Royal. 2012. Entrapment: Tricking malware with transparent, scalable malware analysis. talk at Black Hat (2012)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDT61202.2024.10489766"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Chad Spensky Hongyi Hu and Kevin Leach. 2016. LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.. In NDSS.","DOI":"10.14722\/ndss.2016.23121"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1365\/s43439-023-00094-x"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 2006 Network and Distributed System Security Symposium. 35\u201349","author":"Wang Yi-Min","year":"2006","unstructured":"Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, and Sam King. 2006. Automated web patrol with strider honeymonkeys. In Proceedings of the 2006 Network and Distributed System Security Symposium. 35\u201349."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243827"},{"key":"e_1_3_2_1_20_1","volume-title":"Benchmarking the capability of symbolic execution tools with logic bombs","author":"Xu Hui","year":"2018","unstructured":"Hui Xu, Zirui Zhao, Yangfan Zhou, and Michael\u00a0R Lyu. 2018. Benchmarking the capability of symbolic execution tools with logic bombs. IEEE Transactions on Dependable and Secure Computing (2018)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.47"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151053"},{"key":"e_1_3_2_1_23_1","volume-title":"Review of generative ai methods in cybersecurity. arXiv preprint arXiv:2403.08701","author":"Yigit Yagmur","year":"2024","unstructured":"Yagmur Yigit, William\u00a0J Buchanan, Madjid\u00a0G Tehrani, and Leandros Maglaras. 2024. Review of generative ai methods in cybersecurity. arXiv preprint arXiv:2403.08701 (2024)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484759"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00035"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575343"}],"event":{"name":"ICMI '24: INTERNATIONAL CONFERENCE ON MULTIMODAL INTERACTION","location":"San Jose Costa Rica","acronym":"ICMI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Companion Proceedings of the 26th International Conference on Multimodal Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686215.3690147","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3686215.3690147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T16:22:00Z","timestamp":1760545320000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686215.3690147"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,4]]},"references-count":26,"alternative-id":["10.1145\/3686215.3690147","10.1145\/3686215"],"URL":"https:\/\/doi.org\/10.1145\/3686215.3690147","relation":{},"subject":[],"published":{"date-parts":[[2024,11,4]]},"assertion":[{"value":"2024-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}