{"id":"https://openalex.org/W4390188307","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361372","title":"Enhancing Malware Detection Using \u201cGenetic Markers\u201d and Machine Learning","display_name":"Enhancing Malware Detection Using \u201cGenetic Markers\u201d and Machine Learning","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390188307","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361372"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361372","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025037378","display_name":"Jae-Hyun Lim","orcid":"https://orcid.org/0000-0001-7169-8969"},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jaehyun Lim","raw_affiliation_strings":["Saratoga High School, Silicon Valley Cybersecurity Institute, CA, USA"],"affiliations":[{"raw_affiliation_string":"Saratoga High School, Silicon Valley Cybersecurity Institute, CA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007268081","display_name":"Quang Duy Tran","orcid":"https://orcid.org/0000-0002-3639-2179"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Quang Duy Tran","raw_affiliation_strings":["Department of Computer Science, San Jose State University, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, San Jose State University, CA, USA","institution_ids":["https://openalex.org/I51504820"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074325073","display_name":"Fabio Di Troia","orcid":"https://orcid.org/0000-0003-2355-7146"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]},{"id":"https://openalex.org/I4210148712","display_name":"Silicon Valley University","ror":"https://ror.org/04jk6hn97","country_code":"US","type":"education","lineage":["https://openalex.org/I4210148712"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fabio Di Troia","raw_affiliation_strings":["Silicon Valley Cybersecurity Institute, San Jose State University, CA, USA"],"affiliations":[{"raw_affiliation_string":"Silicon Valley Cybersecurity Institute, San Jose State University, CA, USA","institution_ids":["https://openalex.org/I51504820","https://openalex.org/I4210148712"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":69},"biblio":{"volume":null,"issue":null,"first_page":"0975","last_page":"0977"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection in High-Dimensional Data","score":0.9924,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.96368253},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6786714},{"id":"https://openalex.org/keywords/outlier-detection","display_name":"Outlier Detection","score":0.534596},{"id":"https://openalex.org/keywords/detection","display_name":"Detection","score":0.532722},{"id":"https://openalex.org/keywords/botnet-detection","display_name":"Botnet Detection","score":0.526963},{"id":"https://openalex.org/keywords/intrusion-detection","display_name":"Intrusion Detection","score":0.526082},{"id":"https://openalex.org/keywords/novelty-detection","display_name":"Novelty Detection","score":0.520172},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.43206924}],"concepts":[{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.96368253},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9374237},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81430924},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.69584465},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6786714},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.60417426},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.53791857},{"id":"https://openalex.org/C110332635","wikidata":"https://www.wikidata.org/wiki/Q629498","display_name":"Genetic programming","level":2,"score":0.48869565},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.43206924},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20444334},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09369445},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361372","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W2095577883","https://openalex.org/W2171035369","https://openalex.org/W2793223501","https://openalex.org/W2964242288","https://openalex.org/W2996806689","https://openalex.org/W3005941094","https://openalex.org/W3007032623","https://openalex.org/W3007481080","https://openalex.org/W3181531606","https://openalex.org/W4224305508","https://openalex.org/W4317349506"],"related_works":["https://openalex.org/W4388157251","https://openalex.org/W4382794599","https://openalex.org/W4360993664","https://openalex.org/W4296272594","https://openalex.org/W36091977","https://openalex.org/W2903602818","https://openalex.org/W2900526031","https://openalex.org/W2470029541","https://openalex.org/W2465235098","https://openalex.org/W2384735743"],"abstract_inverted_index":{"Despite":[0],"the":[1,44,70,77,122,125],"advanced":[2],"techniques":[3,120],"of":[4,22,47,69,72,128],"malware":[5,23,34,49,60,64,78,98,118,130],"detection":[6,35,111],"using":[7,87],"machine":[8],"learning":[9],"and":[10,26,91,113],"deep":[11],"learning,":[12],"our":[13,102,104],"community":[14],"has":[15,66],"been":[16],"still":[17],"suffering":[18],"from":[19],"new":[20,32,105],"variants":[21],"in":[24],"networks":[25],"systems.":[27],"This":[28,74],"paper":[29,75],"proposes":[30],"a":[31,39,58],"NLP-based":[33],"method":[36,123],"to":[37,56,95],"generate":[38],"genetic":[40,53],"marker":[41],"by":[42,86],"capturing":[43],"semantic":[45],"behaviors":[46],"each":[48,63,84,97,129],"family.":[50,99],"The":[51],"unique":[52],"markers":[54],"aim":[55],"identify":[57,96],"specific":[59],"family":[61,65,85],"since":[62,121],"different":[67,93],"characteristics":[68],"distribution":[71],"opcodes.":[73],"evaluates":[76],"behavior":[79],"based":[80],"on":[81,101],"opcodes":[82],"for":[83],"an":[88],"NLP":[89],"model":[90],"creates":[92],"templates":[94],"Based":[100],"experiments,":[103],"approach":[106],"achieved":[107],"more":[108],"than":[109],"99%":[110],"rates":[112],"is":[114],"fault-tolerant":[115],"against":[116],"various":[117],"obfuscation":[119],"captures":[124],"meaningful":[126],"context":[127],"sample.":[131]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4390188307","counts_by_year":[],"updated_date":"2024-11-22T20:21:48.615499","created_date":"2023-12-26"}