{"id":"https://openalex.org/W1975352246","doi":"https://doi.org/10.1145/1179542.1179550","title":"Cryptographic hashing for virus localization","display_name":"Cryptographic hashing for virus localization","publication_year":2006,"publication_date":"2006-11-03","ids":{"openalex":"https://openalex.org/W1975352246","doi":"https://doi.org/10.1145/1179542.1179550","mag":"1975352246"},"language":"en","primary_location":{"id":"doi:10.1145/1179542.1179550","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1179542.1179550","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM workshop on Recurring malcode","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011460496","display_name":"Giovanni Di Crescenzo","orcid":"https://orcid.org/0000-0002-5138-1144"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Giovanni Di Crescenzo","raw_affiliation_strings":["Telcordia Technologies, Piscataway, NJ"],"affiliations":[{"raw_affiliation_string":"Telcordia Technologies, Piscataway, NJ","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066728356","display_name":"F. Vakil","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Faramak Vakil","raw_affiliation_strings":["Telcordia Technologies, Piscataway, NJ"],"affiliations":[{"raw_affiliation_string":"Telcordia Technologies, Piscataway, NJ","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011460496"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.807,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.86405094,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"41","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8001377582550049},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7744481563568115},{"id":"https://openalex.org/keywords/rewriting","display_name":"Rewriting","score":0.7652361392974854},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.6540819406509399},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.597783088684082},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5814966559410095},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5168629288673401},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.43481960892677307},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4147099554538727},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.2702740430831909},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2276066243648529},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19613319635391235}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8001377582550049},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7744481563568115},{"id":"https://openalex.org/C154690210","wikidata":"https://www.wikidata.org/wiki/Q1668499","display_name":"Rewriting","level":2,"score":0.7652361392974854},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.6540819406509399},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.597783088684082},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5814966559410095},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5168629288673401},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.43481960892677307},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4147099554538727},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2702740430831909},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2276066243648529},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19613319635391235},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1179542.1179550","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1179542.1179550","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM workshop on Recurring malcode","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1516960038","https://openalex.org/W1576397915","https://openalex.org/W1582350176","https://openalex.org/W1585665690","https://openalex.org/W1595564425","https://openalex.org/W2022041593","https://openalex.org/W2154081981","https://openalex.org/W2164215197","https://openalex.org/W2409664136"],"related_works":["https://openalex.org/W2157568185","https://openalex.org/W1674074891","https://openalex.org/W1487949331","https://openalex.org/W1987209102","https://openalex.org/W2613610283","https://openalex.org/W2949619078","https://openalex.org/W2242320573","https://openalex.org/W1533686600","https://openalex.org/W1499074627","https://openalex.org/W1775939922"],"abstract_inverted_index":{"Virus":[0],"detection":[1,26],"is":[2,97],"an":[3,43,123],"important":[4,164],"problem":[5,18,140],"in":[6,100,112],"the":[7,21,36,69,83,94,101,109,113,117,137,154,162],"area":[8,111],"of":[9,24,146,153,156,161],"computer":[10],"security.":[11],"Modern":[12],"techniques":[13,134],"attempting":[14],"to":[15,41,60,68,73,82,135,149],"solve":[16,136],"this":[17,31,75,96],"fall":[19],"into":[20],"general":[22],"paradigms":[23],"signature":[25],"and":[27,165,175,178],"integrity":[28],"checking.":[29],"In":[30],"paper":[32],"we":[33,128],"focus":[34,107],"on":[35,108,142],"latter":[37],"principle,":[38],"which":[39,57,104,127],"proposes":[40],"label":[42],"executable":[44],"or":[45],"source":[46],"file":[47,84,114,157],"with":[48],"a":[49,53],"tag":[50],"computed":[51],"using":[52],"cryptographic":[54,147],"hash":[55],"function,":[56],"later":[58],"allows":[59],"detect":[61],"if":[62],"any":[63],"changes":[64,81,90],"have":[65],"been":[66],"performed":[67],"file.":[70,119],"We":[71,132],"suggest":[72],"extend":[74],"principle":[76],"so":[77],"that":[78],"not":[79],"only":[80],"are":[85,91],"detected,":[86],"but":[87],"also":[88],"these":[89],"localized":[92,110],"within":[93],"file;":[95],"especially":[98],"useful":[99],"virus":[102,138,167],"diagnostics":[103],"can":[105],"then":[106],"rather":[115],"than":[116],"entire":[118],"This":[120],"implicitly":[121],"defines":[122],"apparently":[124],"new":[125],"problem,":[126],"call":[129],"``virus":[130],"localization''.":[131],"design":[133],"localization":[139],"based":[141],"repeated":[143],"efficient":[144],"applications":[145],"hashing":[148],"carefully":[150],"chosen":[151],"subsets":[152],"set":[155],"blocks,":[158],"for":[159],"each":[160],"most":[163],"known":[166],"infection":[168],"techniques,":[169,173,177],"such":[170],"as":[171],"rewriting":[172],"appending":[174],"prepending":[176],"insertion":[179],"techniques.":[180]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
