{"id":"https://openalex.org/W2606136001","doi":"https://doi.org/10.1145/3058060.3058065","title":"MGeT","display_name":"MGeT","publication_year":2017,"publication_date":"2017-03-17","ids":{"openalex":"https://openalex.org/W2606136001","doi":"https://doi.org/10.1145/3058060.3058065","mag":"2606136001"},"language":"en","primary_location":{"id":"doi:10.1145/3058060.3058065","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3058060.3058065","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 International Conference on Cryptography, Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101941113","display_name":"Jianwei Ding","orcid":"https://orcid.org/0000-0003-1686-1940"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jianwei Ding","raw_affiliation_strings":["Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003071181","display_name":"Zhouguo Chen","orcid":"https://orcid.org/0000-0002-4063-963X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhouguo Chen","raw_affiliation_strings":["Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057711796","display_name":"Yue Zhao","orcid":"https://orcid.org/0000-0003-3401-4921"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yue Zhao","raw_affiliation_strings":["Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031030652","display_name":"Hong Su","orcid":"https://orcid.org/0000-0003-2750-7808"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hong Su","raw_affiliation_strings":["Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101615044","display_name":"Yubin Guo","orcid":"https://orcid.org/0000-0003-1491-9248"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yubin Guo","raw_affiliation_strings":["Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017596925","display_name":"Enbo Sun","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Enbo Sun","raw_affiliation_strings":["Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101941113"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1849,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.41578693,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"96","last_page":"101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9557999968528748,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9776838421821594},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8598417043685913},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.7685649394989014},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5799850225448608},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.5308481454849243},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5122234225273132},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46509256958961487},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.42624393105506897},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3000236749649048},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09532582759857178}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9776838421821594},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8598417043685913},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.7685649394989014},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5799850225448608},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.5308481454849243},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5122234225273132},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46509256958961487},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.42624393105506897},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3000236749649048},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09532582759857178}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3058060.3058065","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3058060.3058065","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 International Conference on Cryptography, Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5400000214576721,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1595564425","https://openalex.org/W1851403712","https://openalex.org/W1964406293","https://openalex.org/W1971139551","https://openalex.org/W1981229864","https://openalex.org/W2005662348","https://openalex.org/W2010065958","https://openalex.org/W2029438113","https://openalex.org/W2049867480","https://openalex.org/W2066220442","https://openalex.org/W2084979543","https://openalex.org/W2132874238","https://openalex.org/W2137964233","https://openalex.org/W2152442131","https://openalex.org/W2165335284","https://openalex.org/W2240935584","https://openalex.org/W2437679399"],"related_works":["https://openalex.org/W2469507153","https://openalex.org/W2008790809","https://openalex.org/W4285507391","https://openalex.org/W2768892939","https://openalex.org/W2160963033","https://openalex.org/W2610659201","https://openalex.org/W3107556205","https://openalex.org/W4234891089","https://openalex.org/W2067547021","https://openalex.org/W2805262980"],"abstract_inverted_index":{"Malware,":[0],"as":[1],"a":[2,20,69,100],"malicious":[3,63,136],"software,":[4],"or":[5,7,105,110,128],"applications":[6],"execution":[8,106,125],"codes,":[9],"has":[10],"become":[11],"the":[12,34,56,118,121,124,134,141,156,159,165,169],"centerpiece":[13],"of":[14,28,36,103,113,116,138,161,171],"most":[15],"security":[16],"threats":[17],"in":[18,55,123],"such":[19],"unceasing":[21],"open":[22],"Internet":[23],"environment.":[24],"The":[25,52],"essential":[26],"technology":[27],"malware":[29,57,70,73,98,122,139,145],"analysis":[30,58],"is":[31,59],"to":[32,39,42,61,67],"extract":[33],"characteristics":[35],"malware,":[37],"intended":[38],"supply":[40],"signatures":[41,119],"detection":[43],"systems":[44],"and":[45,50,155],"provide":[46],"evidence":[47],"for":[48],"recovery":[49],"cleanup.":[51],"focal":[53],"point":[54],"how":[60,66],"detect":[62,96],"behaviors":[64,137],"versus":[65],"hide":[68],"analyzer":[71],"from":[72,99,120],"during":[74],"runtime.":[75],"In":[76],"this":[77],"paper,":[78],"we":[79,132],"propose":[80],"an":[81],"approach":[82],"called":[83],"Malware":[84],"Gene":[85],"Topology":[86],"Model":[87],"(MGeT)":[88],"inspired":[89],"by":[90,140],"Biotechnological":[91],"Genomics":[92],"that":[93],"can":[94],"quickly":[95],"potential":[97],"large":[101],"amount":[102],"software":[104],"codes":[107],"including":[108],"metamorphic":[109],"new":[111],"variants":[112],"malware.":[114],"Instead":[115],"extracting":[117],"file":[126],"level":[127],"operating":[129],"system":[130],"level,":[131],"identify":[133],"key":[135],"underlying":[142],"instructions,":[143],"named":[144],"Gene.":[146],"We":[147],"evaluate":[148],"our":[149,162,172],"method":[150,163],"based":[151],"on":[152],"real-world":[153],"datasets":[154],"results":[157],"demonstrate":[158],"advantages":[160],"over":[164],"previous":[166],"studies,":[167],"validating":[168],"contribution":[170],"method.":[173]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2017-04-28T00:00:00"}
