{"id":"https://openalex.org/W2791774517","doi":"https://doi.org/10.1109/malware.2017.8323951","title":"Kali: Scalable encryption fingerprinting in dynamic malware traces","display_name":"Kali: Scalable encryption fingerprinting in dynamic malware traces","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2791774517","doi":"https://doi.org/10.1109/malware.2017.8323951","mag":"2791774517"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2017.8323951","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056233859","display_name":"Lorenzo De Carli","orcid":"https://orcid.org/0000-0003-0432-3686"},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I4210131357","https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lorenzo De Carli","raw_affiliation_strings":["Colorado State University"],"affiliations":[{"raw_affiliation_string":"Colorado State University","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113675192","display_name":"Ruben Torres","orcid":null},"institutions":[{"id":"https://openalex.org/I1308906816","display_name":"NortonLifeLock (United States)","ror":"https://ror.org/0449t3a80","country_code":"US","type":"company","lineage":["https://openalex.org/I1308906816"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ruben Torres","raw_affiliation_strings":["Symantec"],"affiliations":[{"raw_affiliation_string":"Symantec","institution_ids":["https://openalex.org/I1308906816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012600119","display_name":"Gaspar Modelo-Howard","orcid":null},"institutions":[{"id":"https://openalex.org/I1308906816","display_name":"NortonLifeLock (United States)","ror":"https://ror.org/0449t3a80","country_code":"US","type":"company","lineage":["https://openalex.org/I1308906816"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gaspar Modelo-Howard","raw_affiliation_strings":["Symantec"],"affiliations":[{"raw_affiliation_string":"Symantec","institution_ids":["https://openalex.org/I1308906816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022716924","display_name":"Alok Tongaonkar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alok Tongaonkar","raw_affiliation_strings":["RedLock Inc."],"affiliations":[{"raw_affiliation_string":"RedLock Inc.","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088826068","display_name":"Somesh Jha","orcid":"https://orcid.org/0000-0001-5877-0436"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Somesh Jha","raw_affiliation_strings":["University of Wisconsin, Madison"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin, Madison","institution_ids":["https://openalex.org/I135310074"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.306,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":2,"citation_normalized_percentile":{"value":0.186853,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":71,"max":75},"biblio":{"volume":null,"issue":null,"first_page":"3","last_page":"10"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9975,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.5295858}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8473054},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7925066},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7699486},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.5295858},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.48909456},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3455848},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33142865},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.26880252}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2017.8323951","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":20,"referenced_works":["https://openalex.org/W12238007","https://openalex.org/W1553308705","https://openalex.org/W1882010690","https://openalex.org/W1912382034","https://openalex.org/W2007378578","https://openalex.org/W2021753915","https://openalex.org/W2049208027","https://openalex.org/W2065995359","https://openalex.org/W2134633067","https://openalex.org/W2156453323","https://openalex.org/W2177710037","https://openalex.org/W2296579688","https://openalex.org/W2461373307","https://openalex.org/W2513529237","https://openalex.org/W2601591992","https://openalex.org/W2670925489","https://openalex.org/W2762032850","https://openalex.org/W4239813889","https://openalex.org/W74868156","https://openalex.org/W82544137"],"related_works":["https://openalex.org/W4389157351","https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W2394465510","https://openalex.org/W2159583675","https://openalex.org/W2155470929","https://openalex.org/W2111125783","https://openalex.org/W1982914007","https://openalex.org/W1824242903","https://openalex.org/W1493858311"],"abstract_inverted_index":{"Binary":[0],"analysis":[1,107],"of":[2,7,20,26,33,53,68,72,123],"malware":[3,21],"to":[4,104,133,142],"determine":[5],"uses":[6],"encryption":[8,37,109],"is":[9],"an":[10,85],"important":[11],"primitive":[12],"with":[13],"many":[14],"critical":[15],"applications,":[16],"such":[17],"as":[18],"reverse-engineering":[19],"network":[22],"communications":[23],"and":[24,96,129,135],"decryption":[25],"files":[27],"encrypted":[28],"by":[29],"ransomware.":[30],"The":[31],"state":[32],"the":[34,43,106],"art":[35],"for":[36,111],"fingerprinting":[38],"in":[39,49,62,126,140],"dynamic":[40],"execution":[41,127],"traces,":[42],"ALIGOT":[44,90],"algorithm":[45,87],"\u2014":[46,56],"while":[47],"effective":[48],"identifying":[50],"a":[51,69,102],"range":[52],"known":[54],"ciphers":[55],"suffers":[57],"from":[58],"significant":[59],"scalability":[60],"limitations:":[61],"certain":[63],"cases,":[64],"even":[65],"analyzing":[66],"traces":[67,139],"few":[70],"thousands":[71],"machine":[73],"instructions":[74],"may":[75],"require":[76],"prohibitive":[77],"time/space.":[78],"In":[79],"this":[80],"work,":[81],"we":[82,100],"propose":[83,101],"KALI,":[84],"enhanced":[86],"based":[88],"on":[89,108],"which":[91],"significantly":[92],"reduces":[93],"time/space":[94],"complexity":[95],"increases":[97],"scalability.":[98],"Moreover,":[99],"technique":[103],"focalize":[105],"used":[110],"specific":[112],"purposes,":[113],"further":[114],"improving":[115],"efficiency.":[116],"Results":[117],"show":[118],"that":[119],"KALI":[120],"achieves":[121],"orders":[122],"magnitude":[124],"reduction":[125],"time":[128],"memory":[130],"utilization":[131],"compared":[132],"ALIGOT,":[134],"processes":[136],"real-world":[137],"program":[138],"minutes":[141],"hours.":[143]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2791774517","counts_by_year":[{"year":2019,"cited_by_count":2}],"updated_date":"2024-12-13T00:26:04.118527","created_date":"2018-03-29"}