{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:41:48Z","timestamp":1729665708005,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/icdcs.2013.69","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:36Z","timestamp":1387309596000},"page":"112-123","source":"Crossref","is-referenced-by-count":11,"title":["AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization"],"prefix":"10.1109","author":[{"given":"Zhaoyan","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jialong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Guofei","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Zhiqiang","family":"Lin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Effective and efficient malware detection at the end host","author":"kolbitsch","year":"2009","journal-title":"Proc of USENIX Security'09"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.11"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/945465.945467"},{"key":"15","article-title":"On the limits of information flow techniques for malware analysis and containment","author":"cavallaro","year":"2008","journal-title":"DIMVA"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180412"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653737"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336768"},{"key":"11","article-title":"Scalable, behavior-based malware clustering","author":"bayer","year":"2009","journal-title":"Proc of NDSS'09"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-22110-1_37","article-title":"BAP: A binary analysis platform","author":"brumley","year":"2011","journal-title":"Proceedings of Computer Aided Verification (CAV)"},{"key":"21","first-page":"2721","article-title":"Learning to detect and classify malicious executables in the wild","volume":"7","author":"zico kolter","year":"2006","journal-title":"J Mach Learn Res"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.10"},{"key":"22","article-title":"Accessminer: Using systemcentric models for malware protection","author":"lanzi","year":"2010","journal-title":"Proc 10th ACM CCS"},{"key":"23","article-title":"Automatic reverse engineering of data structures from binary execution","author":"lin","year":"2010","journal-title":"Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS'10)"},{"key":"24","article-title":"A layered architure for detecting malicous behaviors","author":"martignoni","year":"2008","journal-title":"RAID"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.17"},{"key":"26","article-title":"Impeding malware analysis using conditional code obfuscation","author":"sharif","year":"2008","journal-title":"Proc NDSS'08"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.41"},{"journal-title":"An analysis of Conficker's logic and rendezvous points","year":"2009","author":"porras","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402991"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/587052.587053"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2012.121"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"key":"32","article-title":"Large-scale malware indexing using function-call graphs","author":"xin","year":"2009","journal-title":"Proc CCS '09"},{"year":"0","key":"5"},{"key":"31","article-title":"A forced sampled execution approach to kernel rootkit identification","author":"wilhelm","year":"2007","journal-title":"Proc of RAID'07"},{"year":"0","key":"4"},{"key":"9","article-title":"All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)","author":"avgerinos","year":"2010","journal-title":"Proc of IEEE S&P"},{"year":"0","key":"8"}],"event":{"name":"2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS)","start":{"date-parts":[[2013,7,8]]},"location":"Philadelphia, PA, USA","end":{"date-parts":[[2013,7,11]]}},"container-title":["2013 IEEE 33rd International Conference on Distributed Computing Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679374\/6681559\/06681581.pdf?arnumber=6681581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,4]],"date-time":"2019-08-04T21:36:12Z","timestamp":1564954572000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6681581\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icdcs.2013.69","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}