{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:19:01Z","timestamp":1769725141850,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Key Laboratory of Smart Education of Guangdong Higher Education Institutes, Jinan University","award":["2022LSYS003"],"award-info":[{"award-number":["2022LSYS003"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372396"],"award-info":[{"award-number":["62372396"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2024YFE0210800"],"award-info":[{"award-number":["2024YFE0210800"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1145\/3696410.3714696","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:57:28Z","timestamp":1745362648000},"page":"1942-1950","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["WasmGuard: Enhancing Web Security through Robust Raw-Binary Detection of WebAssembly Malware"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5959-0629","authenticated-orcid":false,"given":"Yuxia","family":"Sun","sequence":"first","affiliation":[{"name":"Jinan University, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6836-697X","authenticated-orcid":false,"given":"HuiHong","family":"Chen","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4099-1577","authenticated-orcid":false,"given":"Zhixiao","family":"Fu","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3406-3933","authenticated-orcid":false,"given":"Wenjian","family":"Lv","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0491-307X","authenticated-orcid":false,"given":"Zitao","family":"Liu","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3192-6378","authenticated-orcid":false,"given":"Haolin","family":"Liu","sequence":"additional","affiliation":[{"name":"Xiangtan University, Xiangtan, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528560"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380085"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103731"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103296"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031--44245--2_8"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-70896-1_5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913439"},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","author":"Strike Crowd","year":"2024","unstructured":"Crowd Strike. 2024. Adversaries Have Nowhere to Hide When Over Watch is Hunting for Threats. Retrieved March 24, 2024 from https:\/\/www.crowdstrike.com\/blog\/ecriminals-increasingly-use-webassembly-to-hide-malware\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473039"},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved","year":"2024","unstructured":"gitee. 2024. vue-chrome-extension-quickstart. Retrieved May 21, 2024 from https:\/\/gitee.com\/zheng_yongtao\/vue-chrome-extension-quickstart\/"},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","year":"2024","unstructured":"GitHub.com. 2024. WasmBench. Retrieved March 24, 2024 from https:\/\/github.com\/sola-st\/WasmBench\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450138"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243840"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/madweb.2020.23002"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313665"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/3495724.3497291"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243858"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 6th International Conference on Learning Representations (ICLR'18)","author":"Krc\u00e1l Marek","year":"2018","unstructured":"Marek Krc\u00e1l, Ondrej \u0160vec, Martin B\u00e1lek, and Otakar Ja\u0161ek. 2018. Deep Convolutional Malware Classifiers Can Learn from Raw Executables and Labels Only. In Proceedings of the 6th International Conference on Learning Representations (ICLR'18) Workshop (2018)."},{"key":"e_1_3_2_1_19_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Lehmann Daniel","year":"2020","unstructured":"Daniel Lehmann, Johannes Kinder, and Michael Pradel. 2020. Everything Old is New Again: Binary Security of Web Assembly. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 217--234."},{"key":"e_1_3_2_1_20_1","volume-title":"C (May","author":"Ling Xiang","year":"2023","unstructured":"Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Yaguan Qian, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, and Yanjun Wu. 2023. Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art. Computers & Securiry 128, C (May 2023), 24 pages."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031--35504--2_4"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/3620237.3620303"},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","author":"McConnell Judy","year":"2019","unstructured":"Judy McConnell. 2019. WebAssembly Support Now Shipping in All Major Browsers. Retrieved March 24, 2024 from https:\/\/blog.mozilla.org\/en\/mozilla\/webassemblyin-browsers\/"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339261"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24444"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00073"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i11.17131"},{"key":"e_1_3_2_1_28_1","volume-title":"Revisiting Adapters with Adversarial Training. arXiv preprint arXiv:2210.04886","author":"Rebuffi Sylvestre-Alvise","year":"2022","unstructured":"Sylvestre-Alvise Rebuffi, Francesco Croce, and Sven Gowal. 2022. Revisiting Adapters with Adversarial Training. arXiv preprint arXiv:2210.04886 (2022). arXiv:2210.04886"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583235"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416580"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00015"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3418958"},{"key":"e_1_3_2_1_33_1","article-title":"Visualizing Data Using T-SNE","volume":"9","author":"der Maaten Laurens Van","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing Data Using T-SNE. Journal of machine learning research 9, 11 (2008).","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_34_1","volume-title":"Retrieved","year":"2024","unstructured":"VirusTotal. 2024. VirusTotal-Home. Retrieved March 28, 2024 from https:\/\/www.virustotal.com\/gui\/home\/upload\/"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--98989--1_7"},{"key":"e_1_3_2_1_36_1","volume-title":"International Conference on Learning Representations.","author":"Wong Eric","unstructured":"Eric Wong, Leslie Rice, and J. Zico Kolter. 2020. Fast is Better than Free: Revisiting Adversarial Training. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3219082"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714696","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:57Z","timestamp":1750295937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714696"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":37,"alternative-id":["10.1145\/3696410.3714696","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714696","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}