{"id":"https://openalex.org/W1973715256","doi":"https://doi.org/10.1109/malware.2013.6703695","title":"Static malware detection with Segmented Sandboxing","display_name":"Static malware detection with Segmented Sandboxing","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W1973715256","doi":"https://doi.org/10.1109/malware.2013.6703695","mag":"1973715256"},"language":"en","primary_location":{"id":"doi:10.1109/malware.2013.6703695","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2013.6703695","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 8th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066455978","display_name":"Hongyuan Qiu","orcid":null},"institutions":[{"id":"https://openalex.org/I6902469","display_name":"Brandeis University","ror":"https://ror.org/05abbep66","country_code":"US","type":"education","lineage":["https://openalex.org/I6902469"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hongyuan Qiu","raw_affiliation_strings":["Wireless System Security Research Laboratory, Brandeis University","Wireless Syst. Security Res. Lab., Brandeis Univ., Waltham, MA, USA"],"affiliations":[{"raw_affiliation_string":"Wireless System Security Research Laboratory, Brandeis University","institution_ids":["https://openalex.org/I6902469"]},{"raw_affiliation_string":"Wireless Syst. Security Res. Lab., Brandeis Univ., Waltham, MA, USA","institution_ids":["https://openalex.org/I6902469"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059090211","display_name":"Fernando C. Col\u00f3n Osorio","orcid":null},"institutions":[{"id":"https://openalex.org/I6902469","display_name":"Brandeis University","ror":"https://ror.org/05abbep66","country_code":"US","type":"education","lineage":["https://openalex.org/I6902469"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fernando C. Colon Osorio","raw_affiliation_strings":["Brandeis University, Waltham, MA, US","Wireless Syst. Security Res. Lab., Brandeis Univ., Waltham, MA, USA"],"affiliations":[{"raw_affiliation_string":"Brandeis University, Waltham, MA, US","institution_ids":["https://openalex.org/I6902469"]},{"raw_affiliation_string":"Wireless Syst. Security Res. Lab., Brandeis Univ., Waltham, MA, USA","institution_ids":["https://openalex.org/I6902469"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5066455978"],"corresponding_institution_ids":["https://openalex.org/I6902469"],"apc_list":null,"apc_paid":null,"fwci":1.596,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.82470423,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"132","last_page":"141"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8897918462753296},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8137534856796265},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7493018507957458},{"id":"https://openalex.org/keywords/sandbox","display_name":"Sandbox (software development)","score":0.6871109008789062},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.6452010869979858},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6376078724861145},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.43594515323638916},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3754515051841736},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28086191415786743},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.25167322158813477},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.24489909410476685},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19402354955673218}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8897918462753296},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8137534856796265},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7493018507957458},{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.6871109008789062},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.6452010869979858},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6376078724861145},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.43594515323638916},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3754515051841736},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28086191415786743},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.25167322158813477},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.24489909410476685},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19402354955673218}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/malware.2013.6703695","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2013.6703695","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 8th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W54929040","https://openalex.org/W88694106","https://openalex.org/W162399341","https://openalex.org/W1573286687","https://openalex.org/W1580559113","https://openalex.org/W1582350176","https://openalex.org/W1583484179","https://openalex.org/W2033811087","https://openalex.org/W2034938003","https://openalex.org/W2110978214","https://openalex.org/W2122471594","https://openalex.org/W2131523719","https://openalex.org/W2151528949","https://openalex.org/W2167975832","https://openalex.org/W2171887114","https://openalex.org/W2409664136","https://openalex.org/W4285719527","https://openalex.org/W6602179964","https://openalex.org/W6606704627","https://openalex.org/W6685837280","https://openalex.org/W7066491068"],"related_works":["https://openalex.org/W2620652965","https://openalex.org/W2024170198","https://openalex.org/W4296272594","https://openalex.org/W2034129977","https://openalex.org/W2900526031","https://openalex.org/W3099773647","https://openalex.org/W1745773915","https://openalex.org/W2765820957","https://openalex.org/W2728713145","https://openalex.org/W2470502009"],"abstract_inverted_index":{"Traditionally,":[0],"dynamic":[1,149],"detection":[2,87],"approaches":[3,127,152],"to":[4,29,60,98,103,132,177],"Malware":[5,26],"identification":[6],"are":[7,41,49,164],"commended":[8],"for":[9,32],"their":[10,90,159,162,167],"simplicity":[11],"and":[12,52,71,118],"small":[13],"sized":[14],"signature":[15,109],"database.":[16,110],"In":[17,172],"practice":[18],"they":[19],"suffer":[20],"from":[21,94,156],"two":[22],"major":[23],"defects.":[24],"First,":[25],"might":[27],"need":[28],"be":[30,54],"emulated":[31],"a":[33,45,69],"long":[34],"time":[35],"before":[36],"traces":[37],"of":[38,64,107,136,147,158,182,190,192],"harmful":[39],"behavior":[40],"first":[42],"exhibited.":[43],"Second,":[44],"few":[46],"Anti-VM":[47],"techniques":[48,121],"widely":[50],"known":[51],"can":[53],"easily":[55],"employed":[56],"by":[57],"any":[58],"program":[59],"thwart":[61],"the":[62,77,83,99,104,108,113,133,137,145,179,188],"attempt":[63],"having":[65],"it":[66],"executed":[67],"in":[68,112,166,187],"sandbox":[70],"observe":[72],"its":[73],"original":[74],"behavior,":[75],"rendering":[76],"approach":[78,198],"less":[79,128],"than":[80,129],"effective.":[81],"On":[82],"other":[84],"hand,":[85],"static":[86,126,151],"approaches,":[88],"have":[89,122],"own":[91,168],"limitations,":[92],"ranging":[93],"parsing":[95],"obfuscated":[96],"executables":[97],"scalability":[100],"issues":[101],"due":[102,131],"ever-increasing":[105],"size":[106],"Fundamentally,":[111],"last":[114],"10\u201315":[115],"years":[116],"polymorphic":[117],"metamorphic":[119],"obfuscation":[120],"become":[123],"prevalent":[124],"making":[125],"effective":[130],"sheer":[134],"magnitude":[135],"sample":[138],"set":[139],"<sup":[140],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[141],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sup>":[142],".":[143],"While":[144],"benefits":[146],"either":[148,191],"or":[150],"look":[153],"quite":[154],"tempting":[155],"each":[157],"counterparts":[160],"perspectives,":[161],"weakness":[163],"daunting":[165],"sight":[169],"as":[170],"well.":[171],"this":[173,196],"manuscript":[174],"we":[175],"attempted":[176],"combine":[178],"best":[180],"part":[181],"both":[183],"worlds,":[184],"without":[185],"bringing":[186],"disadvantage":[189],"them.":[193],"We":[194],"call":[195],"mixed":[197],"\u201cSegmented":[199],"Sandboxing\u201d.":[200]},"counts_by_year":[{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
