{"id":"https://openalex.org/W4281387691","doi":"https://doi.org/10.1145/3494110.3528244","title":"Position Paper","display_name":"Position Paper","publication_year":2022,"publication_date":"2022-05-24","ids":{"openalex":"https://openalex.org/W4281387691","doi":"https://doi.org/10.1145/3494110.3528244"},"language":"en","primary_location":{"id":"doi:10.1145/3494110.3528244","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3494110.3528244","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st Workshop on Robust Malware Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101760516","display_name":"Ali Mohammad Shafiei","orcid":"https://orcid.org/0000-0002-0860-9473"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Ali Shafiei","raw_affiliation_strings":["KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024905721","display_name":"Vera Rimmer","orcid":null},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Vera Rimmer","raw_affiliation_strings":["KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003959400","display_name":"Ilias Tsingenopoulos","orcid":"https://orcid.org/0000-0002-7714-5238"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Ilias Tsingenopoulos","raw_affiliation_strings":["KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081256404","display_name":"Lieven Desmet","orcid":"https://orcid.org/0000-0001-5155-7472"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Lieven Desmet","raw_affiliation_strings":["KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054031138","display_name":"Wouter Joosen","orcid":"https://orcid.org/0000-0002-7710-5092"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Wouter Joosen","raw_affiliation_strings":["KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101760516"],"corresponding_institution_ids":["https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":0.4462,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.56438564,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8721412420272827},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.8566875457763672},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8451589345932007},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7839244604110718},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7199471592903137},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6767882704734802},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6560893058776855},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.5094953179359436},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.46837741136550903},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.45871949195861816},{"id":"https://openalex.org/keywords/position-paper","display_name":"Position paper","score":0.43298542499542236},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.290229856967926},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12774842977523804}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8721412420272827},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.8566875457763672},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8451589345932007},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7839244604110718},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7199471592903137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6767882704734802},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6560893058776855},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.5094953179359436},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.46837741136550903},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.45871949195861816},{"id":"https://openalex.org/C78780964","wikidata":"https://www.wikidata.org/wiki/Q7233193","display_name":"Position paper","level":2,"score":0.43298542499542236},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.290229856967926},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12774842977523804},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3494110.3528244","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3494110.3528244","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st Workshop on Robust Malware Analysis","raw_type":"proceedings-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:20.500.12942/698315","is_oa":false,"landing_page_url":"https://lirias.kuleuven.be/bitstream/20.500.12942/698315/2/Position%20Paper-%20On%20Advancing%20Adversarial%20Malware%20Generation%20Using%20Dynamic%20Features.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Workshop on Robust Malware Analysis (WoRMA '22), Nagasaki, Japan, 30 May 2022","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2003568760","https://openalex.org/W2469346691","https://openalex.org/W2485666843","https://openalex.org/W2776884785","https://openalex.org/W2951450826","https://openalex.org/W2963539830","https://openalex.org/W2981446616","https://openalex.org/W2988961468","https://openalex.org/W3012161115","https://openalex.org/W3015481738","https://openalex.org/W3023141480","https://openalex.org/W3031351653","https://openalex.org/W3090219579","https://openalex.org/W3090497532","https://openalex.org/W3113062381","https://openalex.org/W3164220323","https://openalex.org/W3180933073","https://openalex.org/W3203652228","https://openalex.org/W4247200422","https://openalex.org/W4288072399","https://openalex.org/W4289038676","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W2620652965","https://openalex.org/W2024170198","https://openalex.org/W4296272594","https://openalex.org/W2900526031","https://openalex.org/W2128507946","https://openalex.org/W2728713145","https://openalex.org/W2131332603","https://openalex.org/W2072617132","https://openalex.org/W2470029541","https://openalex.org/W2470502009"],"abstract_inverted_index":{"Along":[0],"the":[1,74,106],"evolution":[2],"of":[3,42,76,108],"malware":[4,29,47,147],"detection":[5,20,127],"systems,":[6,21],"adversaries":[7],"develop":[8],"sophisticated":[9],"evasion":[10,57],"techniques":[11,58],"that":[12,51,119],"render":[13],"malicious":[14],"samples":[15,65],"undetectable.":[16],"Especially":[17],"for":[18,142],"ML-based":[19],"an":[22,82],"effective":[23],"approach":[24],"is":[25],"to":[26,30,66,85,92,121,135],"craft":[27],"adversarial":[28,44,63],"evade":[31,67],"detection.":[32],"In":[33,73],"this":[34,130],"position":[35],"paper,":[36],"we":[37,80,104,132],"conduct":[38],"a":[39],"critical":[40,114],"review":[41],"existing":[43],"attacks":[45],"against":[46,59],"detection,":[48],"and":[49,100,112,116,126,138],"conclude":[50],"current":[52],"research":[53,144],"focuses":[54],"mainly":[55],"on":[56,145],"static":[60],"analysis;":[61],"generating":[62],"Windows":[64],"dynamic":[68,109,149],"analysis":[69],"remains":[70],"largely":[71],"unexplored.":[72],"context":[75],"black-box":[77],"attack":[78],"scenarios,":[79],"investigate":[81,105],"adversary's":[83],"potential":[84],"carry":[86],"out":[87],"practical":[88],"transformations":[89,111],"in":[90],"order":[91],"influence":[93],"behavioral":[94],"features":[95],"observed":[96],"by":[97],"ML":[98],"systems":[99],"security":[101],"products.":[102],"Moreover,":[103],"range":[107],"behavior":[110],"identify":[113],"properties":[115],"associated":[117],"challenges":[118,137],"relate":[120],"feasibility,":[122],"automation,":[123],"technical":[124],"costs":[125],"risks.":[128],"Through":[129],"discussion,":[131],"propose":[133],"solutions":[134],"important":[136],"present":[139],"promising":[140],"paths":[141],"future":[143],"evasive":[146],"under":[148],"analysis.":[150]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-05-25T00:00:00"}
