{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:54:05Z","timestamp":1726761245487},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T00:00:00Z","timestamp":1538956800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CSAIL CyberSecurity Initiative","award":["N\/A"]},{"name":"MIT-IBM Watson AI Lab","award":["N\/A"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3278496","type":"proceedings-article","created":{"date-parts":[[2018,11,13]],"date-time":"2018-11-13T13:39:38Z","timestamp":1542116378000},"page":"2276-2278","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["AST-Based Deep Learning for Detecting Malicious PowerShell"],"prefix":"10.1145","author":[{"given":"Gili","family":"Rusak","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Abdullah","family":"Al-Dujaili","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Boston, MA, USA"}]},{"given":"Una-May","family":"O'Reilly","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Boston, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"volume-title":"Adversarial Deep Learning for Robust Detection of Binary Encoded Malware. In 2018 IEEE Security and Privacy Workshops (SPW). IEEE, 76--82","year":"2018","author":"Al-Dujaili Abdullah","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Daniel Bohannon and Lee Holmes. 2017. Revoke-Obfuscation: PowerShell Obfuscation Detection Using Science. https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/07\/revoke-obfuscation-powershell.html. (2017). Daniel Bohannon and Lee Holmes. 2017. Revoke-Obfuscation: PowerShell Obfuscation Detection Using Science. https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/07\/revoke-obfuscation-powershell.html. (2017)."},{"key":"e_1_3_2_1_3_1","unstructured":"Ryan Cobb. 2017. AbstractSyntaxTree-Based PowerShell Obfuscation. https:\/\/cobbr.io\/AbstractSyntaxTree-Based-PowerShell-Obfuscation.html. (2017). Ryan Cobb. 2017. AbstractSyntaxTree-Based PowerShell Obfuscation. https:\/\/cobbr.io\/AbstractSyntaxTree-Based-PowerShell-Obfuscation.html. (2017)."},{"key":"e_1_3_2_1_4_1","unstructured":"JuanPablo Jofre etal 2018. PowerShell Scripting | Microsoft Docs. https:\/\/docs.microsoft.com\/en-us\/powershell\/scripting\/powershell-scripting?view=powershell-6. (2018). JuanPablo Jofre et al. 2018. PowerShell Scripting | Microsoft Docs. https:\/\/docs.microsoft.com\/en-us\/powershell\/scripting\/powershell-scripting?view=powershell-6. (2018)."},{"key":"e_1_3_2_1_5_1","unstructured":"Victor Fang. 2018. Malicious PowerShell Detection via Machine Learning. https:\/\/www.fireeye.com\/blog\/threat-research\/2018\/07\/malicious-powershell-detection-via-machine-learning.html. (2018). Victor Fang. 2018. Malicious PowerShell Detection via Machine Learning. https:\/\/www.fireeye.com\/blog\/threat-research\/2018\/07\/malicious-powershell-detection-via-machine-learning.html. (2018)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196511"},{"volume-title":"On Visual Hallmarks of Robustness to Adversarial Malware. arXiv preprint arXiv:1805.03553","year":"2018","author":"Huang Alex","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25159-2_49"},{"key":"e_1_3_2_1_9_1","unstructured":"Jeff White. 2017. Pulling Back the Curtains on EncodedCommand PowerShell Attacks. https:\/\/researchcenter.paloaltonetworks.com\/2017\/03\/unit42-pulling-back-the-curtains-on-encodedcommand-powershell-attacks\/. (2017). Jeff White. 2017. Pulling Back the Curtains on EncodedCommand PowerShell Attacks. https:\/\/researchcenter.paloaltonetworks.com\/2017\/03\/unit42-pulling-back-the-curtains-on-encodedcommand-powershell-attacks\/. (2017)."},{"key":"e_1_3_2_1_10_1","unstructured":"Candid Wueest. 2016. The Increased Use of PowerShell in Attacks. (2016). https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/security-center\/white-papers\/increased-use-of-powershell-in-attacks-16-en.pdf Candid Wueest. 2016. The Increased Use of PowerShell in Attacks. (2016). https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/security-center\/white-papers\/increased-use-of-powershell-in-attacks-16-en.pdf"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3278496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T06:25:50Z","timestamp":1673331950000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3278496"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":10,"alternative-id":["10.1145\/3243734.3278496","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3278496","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}