{"id":"https://openalex.org/W4391769263","doi":"https://doi.org/10.1109/ccwc60891.2024.10427663","title":"Cimalir: Cross-Platform IoT Malware Clustering using Intermediate Representation","display_name":"Cimalir: Cross-Platform IoT Malware Clustering using Intermediate Representation","publication_year":2024,"publication_date":"2024-01-08","ids":{"openalex":"https://openalex.org/W4391769263","doi":"https://doi.org/10.1109/ccwc60891.2024.10427663"},"language":"en","primary_location":{"id":"doi:10.1109/ccwc60891.2024.10427663","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccwc60891.2024.10427663","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093917810","display_name":"Minhajul Alam Rahat","orcid":"https://orcid.org/0009-0002-6831-2927"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Minhajul Alam Rahat","raw_affiliation_strings":["University of Colorado Colorado,Springs,CO,USA","University of Colorado Colorado, Springs, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado Colorado,Springs,CO,USA","institution_ids":["https://openalex.org/I888729015"]},{"raw_affiliation_string":"University of Colorado Colorado, Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060923462","display_name":"Vijay Banerjee","orcid":"https://orcid.org/0009-0001-8173-6954"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vijay Banerjee","raw_affiliation_strings":["University of Colorado Colorado,Springs,CO,USA","University of Colorado Colorado, Springs, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado Colorado,Springs,CO,USA","institution_ids":["https://openalex.org/I888729015"]},{"raw_affiliation_string":"University of Colorado Colorado, Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055170166","display_name":"Gedare Bloom","orcid":"https://orcid.org/0000-0002-5677-7092"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gedare Bloom","raw_affiliation_strings":["University of Colorado Colorado,Springs,CO,USA","University of Colorado Colorado, Springs, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado Colorado,Springs,CO,USA","institution_ids":["https://openalex.org/I888729015"]},{"raw_affiliation_string":"University of Colorado Colorado, Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072959708","display_name":"Yanyan Zhuang","orcid":"https://orcid.org/0000-0002-8407-0801"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yanyan Zhuang","raw_affiliation_strings":["University of Colorado Colorado,Springs,CO,USA","University of Colorado Colorado, Springs, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado Colorado,Springs,CO,USA","institution_ids":["https://openalex.org/I888729015"]},{"raw_affiliation_string":"University of Colorado Colorado, Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5093917810"],"corresponding_institution_ids":["https://openalex.org/I888729015"],"apc_list":null,"apc_paid":null,"fwci":1.1206,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.7397869,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"0460","last_page":"0466"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7787249088287354},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.769445538520813},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7652559876441956},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6297637224197388},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5470631122589111},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22766563296318054},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17465868592262268}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7787249088287354},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.769445538520813},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7652559876441956},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6297637224197388},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5470631122589111},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22766563296318054},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17465868592262268},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccwc60891.2024.10427663","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccwc60891.2024.10427663","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.41999998688697815,"display_name":"Decent work and economic growth"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320311855","display_name":"University of Colorado","ror":"https://ror.org/00jc20583"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W151377110","https://openalex.org/W1573526548","https://openalex.org/W1629811776","https://openalex.org/W1987971958","https://openalex.org/W2113054345","https://openalex.org/W2171673865","https://openalex.org/W2324662912","https://openalex.org/W2334331178","https://openalex.org/W2408186052","https://openalex.org/W2547625248","https://openalex.org/W2601305972","https://openalex.org/W2618735189","https://openalex.org/W2775300889","https://openalex.org/W2791879367","https://openalex.org/W2838525302","https://openalex.org/W2884256006","https://openalex.org/W2887921593","https://openalex.org/W2901828657","https://openalex.org/W2912883037","https://openalex.org/W2913493033","https://openalex.org/W2972552958","https://openalex.org/W2981856772","https://openalex.org/W2994944553","https://openalex.org/W3016048014","https://openalex.org/W3048726132","https://openalex.org/W3109206613","https://openalex.org/W3113371616","https://openalex.org/W3156018547","https://openalex.org/W4214726584","https://openalex.org/W4214898199","https://openalex.org/W4249471531","https://openalex.org/W4281398200","https://openalex.org/W4292387506","https://openalex.org/W4294672413","https://openalex.org/W4299301436","https://openalex.org/W4302383595","https://openalex.org/W4319866870","https://openalex.org/W6680970901","https://openalex.org/W6743716703"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819"],"abstract_inverted_index":{"The":[0],"widespread":[1],"adoption":[2],"of":[3,12,25,55,76,101,123,164,169,184],"Internet-of-Things":[4],"(IoT)":[5],"devices":[6,18],"has":[7,106],"significantly":[8],"increased":[9],"the":[10,21,121,126,142,176],"interconnectivity":[11],"everyday":[13],"activities.":[14],"Malware":[15],"on":[16],"IoT":[17],"directly":[19],"jeopardize":[20],"security":[22],"and":[23,28,120,166,186],"privacy":[24],"their":[26],"users,":[27],"device":[29],"heterogeneity":[30],"poses":[31],"significant":[32],"challenges":[33],"in":[34,125,160],"malware":[35,48,94,151,173],"analysis.":[36,83,130],"This":[37,189],"paper":[38],"presents":[39],"Cimalir,":[40],"which":[41],"uses":[42,63],"an":[43,51],"automated":[44],"approach":[45,67],"for":[46,154],"clustering":[47,138,172],"that":[49,68,96,134],"leverages":[50],"intermediate":[52],"representation":[53],"(IR)":[54],"low-level":[56],"assembly":[57],"code":[58,103],"across":[59],"different":[60,93,155],"architectures.":[61],"Cimalir":[62,85,105,135,158],"a":[64,87,98,107,114,161],"staged":[65],"analysis":[66,145],"first":[69],"filters":[70],"binary":[71,127,144],"images":[72,128],"using":[73],"set-based":[74],"similarity":[75],"function":[77],"attributes":[78],"before":[79],"applying":[80],"call":[81],"graph":[82],"Additionally,":[84],"employs":[86],"string":[88],"based":[89],"technique":[90],"to":[91,141,150,195],"distinguish":[92],"families":[95,174],"exhibit":[97],"substantial":[99],"level":[100],"shared":[102],"use.":[104],"low":[108],"runtime":[109],"complexity":[110],"as":[111],"evidenced":[112],"by":[113],"linear":[115],"relationship":[116],"between":[117],"execution":[118],"time":[119],"number":[122],"functions":[124],"under":[129],"Experimental":[131],"results":[132,139,159],"show":[133],"yields":[136],"improved":[137],"compared":[140,194],"state-of-the-art":[143],"tool,":[146],"BinDiff,":[147],"when":[148,171],"applied":[149],"binaries":[152],"compiled":[153],"instruction":[156],"sets.":[157],"DBCV":[162],"score":[163],"0.75":[165],"Silhouette":[167],"Score":[168],"0.812":[170],"from":[175],"CUBE-MALIOT-2021":[177],"dataset.":[178],"In":[179],"comparison,":[180],"BinDiff":[181],"achieves":[182],"scores":[183],"0.54":[185],"0.616,":[187],"respectively.":[188],"indicates":[190],"Cimalir\u2019s":[191],"superior":[192],"performance":[193],"BinDiff.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
