{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:52:52Z","timestamp":1725511972953},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540710929"},{"type":"electronic","value":"9783540710936"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71093-6_4","type":"book-chapter","created":{"date-parts":[[2007,5,29]],"date-time":"2007-05-29T18:58:59Z","timestamp":1180465139000},"page":"45-59","source":"Crossref","is-referenced-by-count":1,"title":["PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution"],"prefix":"10.1007","author":[{"given":"Ki Hun","family":"Lee","sequence":"first","affiliation":[]},{"given":"Yuna","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Sung Je","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Jong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"DeTristan, T., Ulenspiegel, T., Malcom, Y., Underduk, M.V.: Polymorphic shellcode engine using spectrum analysis (2003), http:\/\/www.phrack.org\/show.php?p=61&a=9"},{"key":"4_CR2","unstructured":"Macaulay, S.: Admmutate: Polymorphic shellcode engine (2001), http:\/\/www.ktwo.ca\/security.html"},{"key":"4_CR3","unstructured":"Kolesnikov, M., Lee, W.: Advanced polymorphic worms: evading ids by blending in with normal traffic. Technical report, Georgia Tech College of Computing (2004)"},{"key":"4_CR4","unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to own the internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium, Berkeley, CA, USA, pp. 149\u2013167. USENIX Association (2002)"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1145\/586110.586130","volume-title":"Proceedings of the 9th ACM conference on Computer and Communications Security (CCS)","author":"C.C. Zou","year":"2002","unstructured":"Zou, C.C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis. In: Proceedings of the 9th ACM conference on Computer and Communications Security (CCS), Washington, DC, USA, pp. 138\u2013147. ACM Press, New York (2002)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Venkataraman, S., Song, D., Gibbons, P., Blum, A.: New streaming algorithms for fast detection of superspreaders. In: Network and Distributied System Symposium (NDSS) (2005)","DOI":"10.21236\/ADA461026"},{"key":"4_CR7","unstructured":"Weaver, N., Staniford, S., Paxson, V.: Very fast containment of scanning worms. In: Proceedings of the 13th USENIX Security Symposium (2004)"},{"key":"4_CR8","unstructured":"Bailey, M., Cooke, E., Jahanian, F., Nazario, J., Watson, D.: The internet motion sensor: a distributed blackhole monitoring system. In: Network and Distributed System Symposium (NDSS) (2005)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/978-3-540-30143-1_3","volume-title":"Recent Advances in Intrusion Detection","author":"D. Dagon","year":"2004","unstructured":"Dagon, D., Qin, X., Gu, G., Lee, W., Grizzard, J., Levin, J., Owen, H.: Honeystat: local worm detection using honeypots. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 39\u201358. Springer, Heidelberg (2004)"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/CSAC.2002.1176279","volume-title":"Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC)","author":"M. Williamson","year":"2002","unstructured":"Williamson, M.: Throttling viruses: restricting propagation to defeat malicious mobile code. In: Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC), Washington, DC, USA, p. 61. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"4_CR11","volume-title":"Proceedings of annual joint conference of the IEEE Computer and Communications Societies (INFOCOM)","author":"D. Moore","year":"2003","unstructured":"Moore, D., Shannon, C., Voelker, G., Savage, S.: Internet quarantine: Requirements for containing self-propagating code. In: Proceedings of annual joint conference of the IEEE Computer and Communications Societies (INFOCOM), San Fancisco, CA, IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"4_CR12","unstructured":"Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Proceeding of 6th symposium on Operating System Design and Implementation (OSDI) (2004)"},{"key":"4_CR13","unstructured":"Kim, H.A., Autograph, B.K.: Autograph: Toward automated, distributed worm signature detection. In: Proceeding of 13th USENIX Security Symposium (2004)"},{"key":"4_CR14","unstructured":"Stampf, N.: Worms of the future: trying to exorcise the worst (2003)"},{"key":"4_CR15","unstructured":"Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium (2003)"},{"key":"4_CR16","volume-title":"2005 IEEE Symposium on Security and Privacy","author":"J. Newsome","year":"2005","unstructured":"Newsome, J., Karp, B., Song, D.: Polygraph: automatically generating signatures for polymorphic worms. In: 2005 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_11","volume-title":"Recent Advances in Intrusion Detection","author":"C. Kruegel","year":"2006","unstructured":"Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Polymorphic worm detection using structural information of executables. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, Springer, Heidelberg (2006)"},{"key":"4_CR18","series-title":"IFIP International Federation for Information Processing","volume-title":"20th IFIP International Information Security Conference","author":"P. Akritidis","year":"2005","unstructured":"Akritidis, P., Markatos, E.P., Polychronakis, M., Anagnostakis, K.: Stride: Polymorphic sled detection through instruction sequence analysis. In: 20th IFIP International Information Security Conference. IFIP TC11 20th International Information Security Conference, May 30 \u2013 June 1, 2005. IFIP International Federation for Information Processing, vol.\u00a0181, Springer, Boston (2005)"},{"key":"4_CR19","unstructured":"One, A.: Smashing the stack for fun and profit (1996), http:\/\/www.phrack.org\/show.php?p=49&a=14"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71093-6_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:15:30Z","timestamp":1605762930000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71093-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540710929","9783540710936"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71093-6_4","relation":{},"subject":[]}}