{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T14:55:06Z","timestamp":1763477706093},"reference-count":18,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2018,11,1]]},"DOI":"10.1587\/transinf.2017icp0011","type":"journal-article","created":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T22:46:52Z","timestamp":1541026012000},"page":"2622-2632","source":"Crossref","is-referenced-by-count":5,"title":["Automatically Generating Malware Analysis Reports Using Sandbox Logs"],"prefix":"10.1587","volume":"E101.D","author":[{"given":"Bo","family":"SUN","sequence":"first","affiliation":[{"name":"National Institute of Information and Communications Technology"},{"name":"Department of Communication Engineering, Waseda University"}]},{"given":"Akinori","family":"FUJINO","sequence":"additional","affiliation":[{"name":"Department of Communication Engineering, Waseda University"}]},{"given":"Tatsuya","family":"MORI","sequence":"additional","affiliation":[{"name":"Department of Communication Engineering, Waseda University"},{"name":"Center for Advanced Intelligence Project, RIKEN"}]},{"given":"Tao","family":"BAN","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology"}]},{"given":"Takeshi","family":"TAKAHASHI","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology"}]},{"given":"Daisuke","family":"INOUE","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] \u201cAv-test. malware.\u201d http:\/\/www.av-test.org\/en\/statistics\/malware."},{"key":"2","unstructured":"[2] FFRI, Inc. http:\/\/www.ffri.jp\/en\/company\/index.htm."},{"key":"3","unstructured":"[3] M.D. Kamizono Masaki et al. http:\/\/www.iwsec.org\/mws\/2015\/."},{"key":"4","unstructured":"[4] \u201cCuckoo sandbox.\u201d https:\/\/www.cuckoosandbox.org."},{"key":"5","unstructured":"[5] \u201cVirustotal-free online virus, malware and url scanner.\u201d https:\/\/www.virustotal.com."},{"key":"6","unstructured":"[6] Microsoft Malware Protection Center, \u201cCommon folder variables.\u201d https:\/\/www.microsoft.com\/security\/portal\/mmpc\/shared\/variables.aspx."},{"key":"7","unstructured":"[7] Microsoft, \u201cRecognized environment variables.\u201d https:\/\/technet.microsoft.com\/ja-jp\/library\/cc749104(v=ws.10).aspx."},{"key":"8","unstructured":"[8] File-Extensions.org, \u201cFile-Extensions.org-File Extension Library.\u201d http:\/\/www.file-extensions.org\/."},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] F. Ahmed, H. Hameed, M.Z. Shafiq, and M. Farooq, \u201cUsing spatio-temporal information in API calls with machine learning algorithms for malware detection,\u201d Proc. 2nd ACM Workshop on Security and Artificial Intelligence, pp.55-62, AISec 2009. 10.1145\/1654988.1655003","DOI":"10.1145\/1654988.1655003"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] C. Ravi and R. Manoharan, \u201cMalware detection using windows api sequence and machine learning,\u201d International Journal of Computer Applications, vol.43, no.17, pp.12-16, 2012. 10.5120\/6194-8715","DOI":"10.5120\/6194-8715"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] M. Alazab, S. Venkataraman, and P. Watters, \u201cTowards understanding malware behaviour by the extraction of API calls,\u201d 2010 Second Cybercrime and Trustworthy Computing Workshop, pp.52-59, 2010. 10.1109\/ctc.2010.8","DOI":"10.1109\/CTC.2010.8"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] J. Nakazato, J. Song, M. Eto, D. Inoue, and K. Nakao, \u201cA novel malware clustering method using frequency of function call traces in parallel threads,\u201d IEICE Trans. Inf. &amp; Syst., vol.E94-D, no.11, pp.2150-2158, 2011. 10.1587\/transinf.e94.d.2150","DOI":"10.1587\/transinf.E94.D.2150"},{"key":"13","unstructured":"[13] U. Bayer, P.M. Comparetti, C. Hlauschek, C. Kr\u00fcgel, and E. Kirda, \u201cScalable, behavior-based malware clustering,\u201d Proc. Network and Distributed System Security Symposium, NDSS, 2009."},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] P. Li, L. Liu, D. Gao, and M.K. Reiter, \u201cOn challenges in evaluating malware clustering,\u201d Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, vol.6307, pp.238-255, Springer Berlin Heidelberg, Berlin, Heidelberg, 2010. 10.1007\/978-3-642-15512-3_13","DOI":"10.1007\/978-3-642-15512-3_13"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] D. Inoue, K. Yoshioka, M. Eto, Y. Hoshizawa, and K. Nakao, \u201cAutomated malware analysis system and its sandbox for revealing malware&apos;s internal and external activities,\u201d IEICE Trans. Inf. &amp; Syst., vol.E92-D, no.5, pp.945-954, 2009. 10.1587\/transinf.e92.d.945","DOI":"10.1587\/transinf.E92.D.945"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] A. Mohaisen and O. Alrawi, \u201cAv-meter: An evaluation of antivirus scans and labels,\u201d Detection of Intrusions and Malware, and Vulnerability Assessment, Lecture Notes in Computer Science, vol.8550, pp.112-131, Springer International Publishing, Cham, 2014. 10.1007\/978-3-319-08509-8_7","DOI":"10.1007\/978-3-319-08509-8_7"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] M. Zhang, Y. Duan, Q. Feng, and H. Yin, \u201cTowards automatic generation of security-centric descriptions for android apps,\u201d Proc. 22nd ACM SIGSAC Conference on Computer and Communications Security-CCS &apos;15, pp.518-529, 2015. 10.1145\/2810103.2813669","DOI":"10.1145\/2810103.2813669"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] L. Yu, T. Zhang, X. Luo, L. Xue, and H. Chang, \u201cToward automatically generating privacy policy for android apps,\u201d IEEE Trans. Inf. Forensics Security, vol.12, no.4, pp.865-880, 2017. 10.1109\/tifs.2016.2639339","DOI":"10.1109\/TIFS.2016.2639339"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/11\/E101.D_2017ICP0011\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,30]],"date-time":"2019-10-30T08:52:17Z","timestamp":1572425537000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/11\/E101.D_2017ICP0011\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,1]]},"references-count":18,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2017icp0011","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,1]]}}}