{"id":"https://openalex.org/W1985953750","doi":"https://doi.org/10.1007/s10207-012-0170-9","title":"Replacement attacks: automatically evading behavior-based software birthmark","display_name":"Replacement attacks: automatically evading behavior-based software birthmark","publication_year":2012,"publication_date":"2012-09-08","ids":{"openalex":"https://openalex.org/W1985953750","doi":"https://doi.org/10.1007/s10207-012-0170-9","mag":"1985953750"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-012-0170-9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-012-0170-9","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013883558","display_name":"Zhi Xin","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhi Xin","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, 210093, China","State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China 210093#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, 210093, China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China 210093#TAB#","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031172325","display_name":"Huiyu Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiyu Chen","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, 210093, China","State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China 210093#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, 210093, China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China 210093#TAB#","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036515049","display_name":"Xinche Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinche Wang","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, 210093, China","State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China 210093#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, 210093, China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China 210093#TAB#","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100346828","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5091-8464"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["College of Information Science and Technology, The Pennsylvania State University, University Park, PA, USA","College of Information Science and Technology, The Pennsylvania State University, University Park, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"College of Information Science and Technology, The Pennsylvania State University, University Park, USA#TAB#","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101952501","display_name":"Sencun Zhu","orcid":"https://orcid.org/0000-0002-1047-7967"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sencun Zhu","raw_affiliation_strings":["College of Information Science and Technology, The Pennsylvania State University, University Park, PA, USA","College of Information Science and Technology, The Pennsylvania State University, University Park, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"College of Information Science and Technology, The Pennsylvania State University, University Park, USA#TAB#","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102010474","display_name":"Bing Mao","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bing Mao","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, 210093, China","State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China 210093#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, 210093, China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China 210093#TAB#","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100365450","display_name":"Xie Li","orcid":"https://orcid.org/0000-0002-8307-4640"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Xie","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, 210093, China","State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China 210093#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, 210093, China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China 210093#TAB#","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5013883558"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":null,"fwci":0.4962,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.64856635,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"11","issue":"5","first_page":"293","last_page":"304"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.835843563079834},{"id":"https://openalex.org/keywords/birthmark","display_name":"Birthmark","score":0.7108604311943054},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6471253633499146},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.6410112380981445},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.6119138598442078},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5137292146682739},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5121302604675293},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.4899393916130066},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.45776987075805664},{"id":"https://openalex.org/keywords/call-graph","display_name":"Call graph","score":0.4517750144004822},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.4466530978679657},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4383242428302765},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.42887312173843384},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.419801265001297},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3636658787727356}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.835843563079834},{"id":"https://openalex.org/C2776826570","wikidata":"https://www.wikidata.org/wiki/Q3513591","display_name":"Birthmark","level":2,"score":0.7108604311943054},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6471253633499146},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.6410112380981445},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.6119138598442078},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5137292146682739},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5121302604675293},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.4899393916130066},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.45776987075805664},{"id":"https://openalex.org/C102379954","wikidata":"https://www.wikidata.org/wiki/Q2589940","display_name":"Call graph","level":2,"score":0.4517750144004822},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.4466530978679657},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4383242428302765},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.42887312173843384},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.419801265001297},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3636658787727356},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-012-0170-9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-012-0170-9","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5","score":0.5}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W27540423","https://openalex.org/W34541083","https://openalex.org/W64563084","https://openalex.org/W128561509","https://openalex.org/W150085617","https://openalex.org/W162711728","https://openalex.org/W1500616534","https://openalex.org/W1517637393","https://openalex.org/W1567046609","https://openalex.org/W1580417272","https://openalex.org/W1591051730","https://openalex.org/W1839992670","https://openalex.org/W1863385414","https://openalex.org/W1910686388","https://openalex.org/W1910918478","https://openalex.org/W1990600049","https://openalex.org/W1995739251","https://openalex.org/W2019763646","https://openalex.org/W2038159719","https://openalex.org/W2042454716","https://openalex.org/W2084201645","https://openalex.org/W2086968222","https://openalex.org/W2108551812","https://openalex.org/W2117583561","https://openalex.org/W2126359798","https://openalex.org/W2135143063","https://openalex.org/W2146567535","https://openalex.org/W2147405597","https://openalex.org/W2167671111","https://openalex.org/W2169685348","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4387947354","https://openalex.org/W3037087970","https://openalex.org/W3089825636","https://openalex.org/W2132874238","https://openalex.org/W1567493346","https://openalex.org/W2128507946","https://openalex.org/W2913797084","https://openalex.org/W2534378520","https://openalex.org/W2401085479","https://openalex.org/W2025715015"],"abstract_inverted_index":null,"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
