{"id":"https://openalex.org/W2093050213","doi":"https://doi.org/10.1145/2714576.2714620","title":"JSDC","display_name":"JSDC","publication_year":2015,"publication_date":"2015-04-03","ids":{"openalex":"https://openalex.org/W2093050213","doi":"https://doi.org/10.1145/2714576.2714620","mag":"2093050213"},"language":"en","primary_location":{"id":"doi:10.1145/2714576.2714620","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2714576.2714620","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108814327","display_name":"Junjie Wang","orcid":"https://orcid.org/0000-0002-9941-6713"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Junjie Wang","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore","Nanyang Technological University, Singapore, SINGAPORE#TAB#"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Nanyang Technological University, Singapore, SINGAPORE#TAB#","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083669929","display_name":"Yinxing Xue","orcid":"https://orcid.org/0000-0002-2979-7151"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yinxing Xue","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore","Nanyang Technological University, Singapore, SINGAPORE#TAB#"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Nanyang Technological University, Singapore, SINGAPORE#TAB#","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100355692","display_name":"Yang Liu","orcid":"https://orcid.org/0000-0001-7300-9215"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yang Liu","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore","Nanyang Technological University, Singapore, SINGAPORE#TAB#"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Nanyang Technological University, Singapore, SINGAPORE#TAB#","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007391734","display_name":"Tian Tan","orcid":"https://orcid.org/0009-0009-3792-1237"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Tian Huat Tan","raw_affiliation_strings":["Singapore University of Technology and Design, Singapore, Singapore","Singapore University of Technology & Design, Singapore, Singapore#TAB#"],"affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design, Singapore, Singapore","institution_ids":["https://openalex.org/I152815399"]},{"raw_affiliation_string":"Singapore University of Technology & Design, Singapore, Singapore#TAB#","institution_ids":["https://openalex.org/I152815399"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5108814327"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":2.8719,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.91557836,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"109","last_page":"120"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9419060349464417},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.892320990562439},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8306167721748352},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.5640984773635864},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5091392397880554},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5052414536476135},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4349157214164734},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43166443705558777},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.22622239589691162}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9419060349464417},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.892320990562439},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8306167721748352},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.5640984773635864},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5091392397880554},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5052414536476135},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4349157214164734},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43166443705558777},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.22622239589691162}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2714576.2714620","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2714576.2714620","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W58852127","https://openalex.org/W74995240","https://openalex.org/W77717277","https://openalex.org/W140384553","https://openalex.org/W200926709","https://openalex.org/W1519699895","https://openalex.org/W1520941164","https://openalex.org/W1538001410","https://openalex.org/W1674877186","https://openalex.org/W1761672165","https://openalex.org/W1970867218","https://openalex.org/W1987644478","https://openalex.org/W1993651556","https://openalex.org/W2039999720","https://openalex.org/W2044675702","https://openalex.org/W2066220442","https://openalex.org/W2075344129","https://openalex.org/W2106649514","https://openalex.org/W2111165162","https://openalex.org/W2133990480","https://openalex.org/W2140409350","https://openalex.org/W2156250856","https://openalex.org/W2160289821","https://openalex.org/W2401831929","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W4256304280","https://openalex.org/W4249009605","https://openalex.org/W2900526031","https://openalex.org/W1566603754","https://openalex.org/W4234891089","https://openalex.org/W4387456547","https://openalex.org/W2067547021","https://openalex.org/W2805262980","https://openalex.org/W3107556205","https://openalex.org/W2610659201"],"abstract_inverted_index":{"Malicious":[0],"JavaScript":[1,21,74,112,206],"is":[2],"one":[3,54],"of":[4,20,117],"the":[5,27,32,43,47,60,90,127],"biggest":[6],"threats":[7],"in":[8,79,161],"cyber":[9],"security.":[10],"Existing":[11],"research":[12],"and":[13,77,82,100,122,152,166,189,222],"anti-virus":[14,215],"products":[15],"mainly":[16],"focus":[17],"on":[18,203],"detection":[19,28,76],"malware":[22,33,75,98,113,210],"rather":[23],"than":[24],"classification.":[25],"Usually,":[26],"will":[29],"simply":[30],"report":[31],"family":[34,49],"name":[35,50],"without":[36],"elaborating":[37],"details":[38],"about":[39],"attacks":[40],"conducted":[41],"by":[42,148],"malware.":[44],"Worse":[45],"yet,":[46],"reported":[48],"may":[51],"differ":[52],"from":[53],"tool":[55,163],"to":[56,59,72,110,139,170],"another":[57],"due":[58],"different":[61],"naming":[62],"conventions.":[63],"In":[64],"this":[65],"paper,":[66],"we":[67,130],"propose":[68],"a":[69,162],"hybrid":[70],"approach":[71,104,160],"perform":[73],"classification":[78],"an":[80],"accurate":[81],"efficient":[83],"way,":[84],"which":[85,213],"could":[86],"not":[87],"only":[88],"explain":[89],"attack":[91,136,141,230],"model":[92],"but":[93],"also":[94],"potentially":[95],"discover":[96],"new":[97,101],"variants":[99],"vulnerabilities.":[102],"Our":[103],"starts":[105],"with":[106,196,207],"machine":[107,150],"learning":[108,151],"techniques":[109],"detect":[111],"using":[114,149],"predicative":[115],"features":[116],"textual":[118],"information,":[119],"program":[120,154],"structures":[121],"risky":[123],"function":[124],"calls.":[125],"For":[126],"detected":[128,226],"malware,":[129],"classify":[131,224],"them":[132],"into":[133,228],"eight":[134],"known":[135],"types":[137],"according":[138],"their":[140],"feature":[142],"vector":[143],"or":[144],"dynamic":[145,153],"execution":[146],"traces":[147],"analysis":[155],"respectively.":[156],"We":[157,199],"implement":[158],"our":[159],"named":[164],"JSDC,":[165],"conduct":[167],"large-scale":[168],"evaluations":[169],"show":[171,180],"its":[172],"effectiveness.":[173],"The":[174],"controlled":[175],"experiments":[176],"(with":[177],"942":[178],"malware)":[179],"that":[181],"JSDC":[182,202,219],"gives":[183],"low":[184,190],"false":[185,191],"positive":[186],"rate":[187,193],"(0.2123%)":[188],"negative":[192],"(0.8492%),":[194],"compared":[195],"other":[197],"tools.":[198],"further":[200],"apply":[201],"1,400,000":[204],"real-world":[205],"over":[208],"1,500":[209],"reported,":[211],"for":[212],"many":[214],"tools":[216],"failed.":[217],"Lastly,":[218],"can":[220],"effectively":[221],"accurately":[223],"these":[225],"malwares":[227],"either":[229],"types.":[231]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
