{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:26:22Z","timestamp":1745321182475},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,2,8]],"date-time":"2016-02-08T00:00:00Z","timestamp":1454889600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s11416-016-0267-1","type":"journal-article","created":{"date-parts":[[2016,2,8]],"date-time":"2016-02-08T12:23:54Z","timestamp":1454934234000},"page":"29-46","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":61,"title":["A graph-based model for malware detection and classification using system-call groups"],"prefix":"10.1007","volume":"13","author":[{"given":"Stavros D.","family":"Nikolopoulos","sequence":"first","affiliation":[]},{"given":"Iosif","family":"Polenakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,8]]},"reference":[{"key":"267_CR1","unstructured":"Alazab, M., Layton, R., Venkataraman, S., Watters, P.: Malware detection based on structural and behavioural features of API calls. In: Proceedings of the 1st Int\u2019l Conference on Cyber Resilience (CR\u201910), pp. 1\u201310 (2010)"},{"key":"267_CR2","doi-asserted-by":"crossref","unstructured":"Babic, D., Reynaud, D., Song, D.: Malware analysis with tree automata inference. In: Proceedings of the 23rd Int\u2019l Conference on Computer Aided Verification (CAV\u201911), pp. 116\u2013131 (2011)","DOI":"10.1007\/978-3-642-22110-1_10"},{"key":"267_CR3","unstructured":"Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable behavior-based malware clustering. In: Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS\u201909), pp. 8\u201311 (2009)"},{"key":"267_CR4","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/s11416-006-0012-2","volume":"2","author":"U Bayer","year":"2006","unstructured":"Bayer, U., Moser, A.C., Kruegel, C., Kirda, E.: Dynamic analysis of malicious code. J. Comput. Virol. 2, 67\u201377 (2006)","journal-title":"J. Comput. Virol."},{"key":"267_CR5","first-page":"57","volume":"23","author":"G Canfora","year":"2014","unstructured":"Canfora, G., Mercaldo, F., Visaggio, C.A., Di Notte, P.: Metamorphic malware detection using code metrics. Inf. Secur. J. 23, 57\u201367 (2014)","journal-title":"Inf. Secur. J."},{"key":"267_CR6","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/s11416-013-0189-0","volume":"10","author":"G Canfora","year":"2014","unstructured":"Canfora, G., Iannaccone, A.N., Visaggio, C.A.: Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics. J. Comput. Virol. Hacking Tech. 10, 11\u201327 (2014)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"267_CR7","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behavior. In: Proceedings of the 1st ACM India Software Engineering Conference (ISEC\u201908), pp. 5\u201314 (2008)","DOI":"10.1145\/1342211.1342215"},{"key":"267_CR8","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-aware malware detection. In: Proceedings of the 25th IEEE Symposium on Security and Privacy (SP\u201905), pp. 32\u201346 (2005)","DOI":"10.1109\/SP.2005.20"},{"key":"267_CR9","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Christodorescu, M., Sailer, R., Yan, X.: Synthesizing near-optimal malware specifications from suspicious behaviors. In: Proceedings of the 30th IEEE Symposium on Security and Privacy (SP\u201910), pp.\u00a045\u201360 (2010)","DOI":"10.1109\/SP.2010.11"},{"key":"267_CR10","doi-asserted-by":"crossref","unstructured":"Islam, R., Tian, R., Batten, L., and Versteeg S.: Classification of malware based on string and function feature selection. In: Proceedings of the Cybercrime and Trustworthy Computing and Workshop (CTC\u201910), pp.\u00a09\u201317 (2010)","DOI":"10.1109\/CTC.2010.11"},{"key":"267_CR11","unstructured":"Kolbitsch, C., Comparetti, C.P.M., Kruegel, C., Kirda, E., Zhou, X.Y., Wang, X.: Effective and efficient malware detection at the end host. In: Proceedings of the 18th USENIX Security Symposium (USENIX Security\u201909), pp.\u00a0351\u2013366 (2009)"},{"key":"267_CR12","doi-asserted-by":"crossref","unstructured":"Kong, D., Yan, G.: Discriminant malware distance learning on structural information for automated malware classification. In Proceedings of the 19th ACM SIGKDD Int\u2019l Conference on Knowledge Discovery and Data Mining (KDD\u201913), pp.\u00a01357\u20131365 (2013)","DOI":"10.1145\/2487575.2488219"},{"key":"267_CR13","unstructured":"Luh, R., Tavolato, P.: Behavior-based malware recognition. Technical Report, St. Polten University of Applied Sciences, TR-79-84 (2012)"},{"key":"267_CR14","first-page":"22","volume":"3","author":"K Mathur","year":"2013","unstructured":"Mathur, K., Hiranwal, S.: A survey on techniques in detection and analyzing malware executables. J. Adv. Res. Comput. Sci. Softw. Eng. 3, 22\u2013428 (2013)","journal-title":"J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"267_CR15","doi-asserted-by":"crossref","unstructured":"Mohaisen, A., Alrawi, O.: Unveiling zeus: automated classification of malware samples. In: Proceedings of the 22nd Int\u2019l Conference on World Wide Web Companion (WWW\u201913), pp. 829\u2013832 (2013)","DOI":"10.1145\/2487788.2488056"},{"key":"267_CR16","unstructured":"Mungale, M., Mark, S.: Software similarity and metamorphic detection. In: Proceedings of the 11th Intl Conference on Security and Management (SAM12) (2012)"},{"key":"267_CR17","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th Int\u2019l Symposium on Visualization for Cyber Security (VizSec\u201911), pp.\u00a04\u201311 (2011)","DOI":"10.1145\/2016904.2016908"},{"key":"267_CR18","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B. S.: A comparative assessment of malware classification using binary texture analysis and dynamic analysis. In: Proceedings of the 4th ACM workshop on Security and Artificial Intelligence, pp.\u00a021\u201330 (2011)","DOI":"10.1145\/2046684.2046689"},{"key":"267_CR19","unstructured":"Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS05) (2005)"},{"key":"267_CR20","doi-asserted-by":"crossref","unstructured":"Nikolopoulos, S.D., Polenakis, I.: Detecting malicious code by exploiting dependencies of system-call groups, Cornell University Library. arXiv:1412.8712v1 (2014)","DOI":"10.1145\/2812428.2812432"},{"key":"267_CR21","doi-asserted-by":"crossref","unstructured":"Park, Y., Reeves, D., Mulukutla, V., Sundaravel, B.: Fast malware classification by automated behavioral graph matching. In: Proceedings of the 6th ACM Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW\u201910), pp.\u00a045\u201349 (2010)","DOI":"10.1145\/1852666.1852716"},{"key":"267_CR22","first-page":"74","volume":"12","author":"BB Rad","year":"2012","unstructured":"Rad, B.B., Maslin, M., Suhaimi, I.: Camouflage in malware: from encryption to metamorphism. J. Comput. Sci. Netw. Secur. 12, 74\u201383 (2012)","journal-title":"J. Comput. Sci. Netw. Secur."},{"key":"267_CR23","doi-asserted-by":"crossref","unstructured":"Rieck, K., Thorsten, H., Carsten, W., Patrick, D., Laskov, P.: Learning and classification of malware behavior. In: Proceedings of the 5th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA\u201908), pp.\u00a0108\u2013125 (2008)","DOI":"10.1007\/978-3-540-70542-0_6"},{"key":"267_CR24","unstructured":"Sikorski, M., Honig, A.: Practical malware analysis: the hands-on guide to dissecting malicious software. No Starch Press, USA (2012)"},{"key":"267_CR25","unstructured":"Szor, P., Ferrie, P.: Hunting for metamorphic. In: Virus Bulletin Conference (VB\u201901) (2001)"},{"key":"267_CR26","doi-asserted-by":"crossref","unstructured":"Tian, R., Batten, L.M., Versteeg, S.C.: Function length as a tool for malware classification. In: Proceedings of the 3rd Int\u2019l Conference on Malicious and Unwanted Software (MALWARE\u201908), pp.\u00a069\u201376 (2008)","DOI":"10.1109\/MALWARE.2008.4690860"},{"key":"267_CR27","doi-asserted-by":"crossref","unstructured":"Hu, X., Chiueh, T., Shin, K.\u00a0G.: Large-scale malware indexing using function-call graphs. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS\u201909), pp.\u00a0611\u2013620 (2009)","DOI":"10.1145\/1653662.1653736"},{"key":"267_CR28","doi-asserted-by":"crossref","unstructured":"Yan, G., Brown, N., Kong, D.: Exploring discriminatory features for automated malware classification. In: Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA\u201913), pp.\u00a041\u201361(2013)","DOI":"10.1007\/978-3-642-39235-1_3"},{"key":"267_CR29","doi-asserted-by":"crossref","unstructured":"Ye, Y., Dingding, W., Tao, L. Dongyi, Y.: IMDS: Intelligent malware detection system. In: Proceedings of the 13th ACM Int\u2019l Conference on Knowledge Discovery and Data Mining (SIGKDD\u201907), pp.\u00a01043\u20131047 (2007)","DOI":"10.1145\/1281192.1281308"},{"key":"267_CR30","doi-asserted-by":"crossref","unstructured":"You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: Proceedings of the 5th Int\u2019l Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA\u201910), pp.\u00a0297\u2013300 (2010)","DOI":"10.1109\/BWCCA.2010.85"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-016-0267-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-016-0267-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-016-0267-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-016-0267-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T10:30:34Z","timestamp":1567593034000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-016-0267-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,8]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["267"],"URL":"https:\/\/doi.org\/10.1007\/s11416-016-0267-1","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,8]]}}}