{"id":"https://openalex.org/W2034463896","doi":"https://doi.org/10.1145/2663761.2664222","title":"Similarity calculation method for user-define functions to detect malware variants","display_name":"Similarity calculation method for user-define functions to detect malware variants","publication_year":2014,"publication_date":"2014-10-05","ids":{"openalex":"https://openalex.org/W2034463896","doi":"https://doi.org/10.1145/2663761.2664222","mag":"2034463896"},"language":"en","primary_location":{"id":"doi:10.1145/2663761.2664222","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2663761.2664222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044407047","display_name":"TaeGuen Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"TaeGuen Kim","raw_affiliation_strings":["Hanyang University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Hanyang University, Seoul, Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044642662","display_name":"Jung\u2010Bin Park","orcid":"https://orcid.org/0000-0002-8816-5605"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jung Bin Park","raw_affiliation_strings":["Hanyang University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Hanyang University, Seoul, Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005225238","display_name":"In Gyeom Cho","orcid":null},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"In Gyeom Cho","raw_affiliation_strings":["Hanyang University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Hanyang University, Seoul, Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007577685","display_name":"BooJoong Kang","orcid":"https://orcid.org/0000-0001-5984-9867"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Boojoong Kang","raw_affiliation_strings":["Queen's University of Belfast, Ireland, Belfast"],"affiliations":[{"raw_affiliation_string":"Queen's University of Belfast, Ireland, Belfast","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009979103","display_name":"Eul Gyu Im","orcid":"https://orcid.org/0000-0002-4130-513X"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Eul Gyu Im","raw_affiliation_strings":["Hanyang University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Hanyang University, Seoul, Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059925471","display_name":"Sooyong Kang","orcid":"https://orcid.org/0000-0002-5332-7846"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"SooYong Kang","raw_affiliation_strings":["Hanyang University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Hanyang University, Seoul, Korea","institution_ids":["https://openalex.org/I4575257"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5044407047"],"corresponding_institution_ids":["https://openalex.org/I4575257"],"apc_list":null,"apc_paid":null,"fwci":0.5823,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.66689815,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"12","issue":null,"first_page":"236","last_page":"241"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.975600004196167,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9491000175476074,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.953377366065979},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8069339990615845},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.6413457989692688},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5732743740081787},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5342532396316528},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.44330811500549316},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.44097888469696045},{"id":"https://openalex.org/keywords/pattern-matching","display_name":"Pattern matching","score":0.42986780405044556},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4288368821144104},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.42282554507255554},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.31574857234954834},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13592571020126343},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10798448324203491},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10686236619949341},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.07808667421340942}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.953377366065979},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8069339990615845},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.6413457989692688},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5732743740081787},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5342532396316528},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.44330811500549316},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.44097888469696045},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.42986780405044556},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4288368821144104},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.42282554507255554},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31574857234954834},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13592571020126343},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10798448324203491},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10686236619949341},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.07808667421340942},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2663761.2664222","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2663761.2664222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3000808466","display_name":null,"funder_award_id":"20110029924","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W36091977","https://openalex.org/W165688198","https://openalex.org/W192227941","https://openalex.org/W1482228399","https://openalex.org/W1544837488","https://openalex.org/W1594784410","https://openalex.org/W1916732574","https://openalex.org/W1956767865","https://openalex.org/W1965297308","https://openalex.org/W1994020507","https://openalex.org/W2021673689","https://openalex.org/W2034938003","https://openalex.org/W2042058229","https://openalex.org/W2044660163","https://openalex.org/W2047167450","https://openalex.org/W2065311994","https://openalex.org/W2066220442","https://openalex.org/W2068224601","https://openalex.org/W2071119859","https://openalex.org/W2087064593","https://openalex.org/W2104495462","https://openalex.org/W2107750811","https://openalex.org/W2111038628","https://openalex.org/W2126753728","https://openalex.org/W2132874238","https://openalex.org/W2144083192","https://openalex.org/W2782559577","https://openalex.org/W4238295473"],"related_works":["https://openalex.org/W2469507153","https://openalex.org/W2008790809","https://openalex.org/W2768892939","https://openalex.org/W2160963033","https://openalex.org/W3022706011","https://openalex.org/W2909615516","https://openalex.org/W2249256574","https://openalex.org/W2397240470","https://openalex.org/W4210907385","https://openalex.org/W2065339563"],"abstract_inverted_index":{"The":[0],"number":[1],"of":[2,76,110,128],"malware":[3,27,33,39,41,44,71,81,84,111,142],"has":[4],"sharply":[5],"increased":[6],"over":[7],"years,":[8],"and":[9,17,65,144],"it":[10,145],"caused":[11],"various":[12],"damages":[13],"on":[14,58],"computing":[15],"systems":[16],"data.":[18],"In":[19],"this":[20,59,63,95],"paper,":[21],"we":[22,97,119],"propose":[23],"techniques":[24,68],"to":[25,69,92,107],"detect":[26,70,141],"variants.":[28,42],"Malware":[29],"authors":[30],"usually":[31],"reuse":[32],"modules":[34],"when":[35],"they":[36],"generate":[37],"new":[38],"or":[40],"Therefore,":[43],"variants":[45,72,82],"have":[46],"common":[47,60],"code":[48,61],"for":[49,102],"some":[50],"functions":[51,129],"in":[52,62,105],"their":[53,89],"binary":[54,112],"files.":[55,113],"We":[56],"focused":[57],"research,":[64],"proposed":[66,138],"the":[67,115,122],"through":[73],"similarity":[74,108,143],"calculation":[75,109],"user-defined":[77],"function.":[78],"Since":[79,114],"many":[80],"evade":[83],"detection":[85],"system":[86],"by":[87],"transforming":[88],"static":[90],"signatures,":[91],"cope":[93],"with":[94],"problem,":[96],"applied":[98],"pattern":[99,116],"matching":[100,117],"algorithms":[101],"DNA":[103],"variations":[104],"Bioinformatics":[106],"algorithm":[118],"used":[120],"provides":[121],"local":[123],"alignment":[124],"function,":[125],"small":[126],"modification":[127],"can":[130,140],"be":[131],"overcome.":[132],"Experimental":[133],"results":[134],"show":[135],"that":[136],"our":[137],"method":[139],"is":[146],"more":[147],"resilient":[148],"than":[149],"other":[150],"methods.":[151]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
