{"id":"https://openalex.org/W4292158726","doi":"https://doi.org/10.1145/3538969.3544469","title":"Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit","display_name":"Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit","publication_year":2022,"publication_date":"2022-08-17","ids":{"openalex":"https://openalex.org/W4292158726","doi":"https://doi.org/10.1145/3538969.3544469"},"language":"en","primary_location":{"id":"doi:10.1145/3538969.3544469","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3538969.3544469","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3538969.3544469","source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3538969.3544469","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082854095","display_name":"Luca Caviglione","orcid":"https://orcid.org/0000-0001-6466-3354"},"institutions":[{"id":"https://openalex.org/I4210165157","display_name":"Confederazione Nazionale dell'Artigianato e Della Piccola e Media Impresa","ror":"https://ror.org/05fa80v88","country_code":"IT","type":"other","lineage":["https://openalex.org/I4210165157"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Luca Caviglione","raw_affiliation_strings":["CNR, Italy"],"affiliations":[{"raw_affiliation_string":"CNR, Italy","institution_ids":["https://openalex.org/I4210165157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109583763","display_name":"Martin Grabowski","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136860","display_name":"FormFactor (Germany)","ror":"https://ror.org/04jpd4145","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210129144","https://openalex.org/I4210136860"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Martin Grabowski","raw_affiliation_strings":["Netzfactor GmbH, Germany"],"affiliations":[{"raw_affiliation_string":"Netzfactor GmbH, Germany","institution_ids":["https://openalex.org/I4210136860"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060879094","display_name":"Kai Gutberlet","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136860","display_name":"FormFactor (Germany)","ror":"https://ror.org/04jpd4145","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210129144","https://openalex.org/I4210136860"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Kai Gutberlet","raw_affiliation_strings":["Netzfactor GmbH, Germany"],"affiliations":[{"raw_affiliation_string":"Netzfactor GmbH, Germany","institution_ids":["https://openalex.org/I4210136860"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012972659","display_name":"Adrian Marzecki","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Adrian Marzecki","raw_affiliation_strings":["Orange Polska, Poland"],"affiliations":[{"raw_affiliation_string":"Orange Polska, Poland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036413712","display_name":"Marco Zuppelli","orcid":"https://orcid.org/0000-0001-6932-3199"},"institutions":[{"id":"https://openalex.org/I4210165157","display_name":"Confederazione Nazionale dell'Artigianato e Della Piccola e Media Impresa","ror":"https://ror.org/05fa80v88","country_code":"IT","type":"other","lineage":["https://openalex.org/I4210165157"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Marco Zuppelli","raw_affiliation_strings":["CNR, Italy"],"affiliations":[{"raw_affiliation_string":"CNR, Italy","institution_ids":["https://openalex.org/I4210165157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032016607","display_name":"Andreas Schaffhauser","orcid":"https://orcid.org/0000-0001-7578-9294"},"institutions":[{"id":"https://openalex.org/I120691247","display_name":"University of Hagen","ror":"https://ror.org/04tkkr536","country_code":"DE","type":"education","lineage":["https://openalex.org/I120691247"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Andreas Schaffhauser","raw_affiliation_strings":["FernUniversit\u00e4t in Hagen, Germany"],"affiliations":[{"raw_affiliation_string":"FernUniversit\u00e4t in Hagen, Germany","institution_ids":["https://openalex.org/I120691247"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089469997","display_name":"Wojciech Mazurczyk","orcid":"https://orcid.org/0000-0002-8509-4127"},"institutions":[{"id":"https://openalex.org/I108403487","display_name":"Warsaw University of Technology","ror":"https://ror.org/00y0xnp53","country_code":"PL","type":"education","lineage":["https://openalex.org/I108403487"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Wojciech Mazurczyk","raw_affiliation_strings":["Warsaw University of Technology, Poland"],"affiliations":[{"raw_affiliation_string":"Warsaw University of Technology, Poland","institution_ids":["https://openalex.org/I108403487"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5082854095"],"corresponding_institution_ids":["https://openalex.org/I4210165157"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05917532,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8442197442054749},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6908265948295593},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6671300530433655},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6214184165000916},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5196743607521057},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.51031893491745},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.4667527973651886},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4623526334762573},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.43953731656074524},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.43277353048324585},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4192153215408325},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34064924716949463}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8442197442054749},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6908265948295593},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6671300530433655},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6214184165000916},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5196743607521057},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.51031893491745},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.4667527973651886},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4623526334762573},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.43953731656074524},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.43277353048324585},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4192153215408325},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34064924716949463},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3538969.3544469","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3538969.3544469","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3538969.3544469","source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3538969.3544469","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3538969.3544469","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3538969.3544469","source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3076231580","display_name":null,"funder_award_id":"833042","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G4956428346","display_name":null,"funder_award_id":"Horizon 2020 research and innovatio","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4292158726.pdf","grobid_xml":"https://content.openalex.org/works/W4292158726.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W16708063","https://openalex.org/W2011224223","https://openalex.org/W2018576906","https://openalex.org/W2132068130","https://openalex.org/W2284296087","https://openalex.org/W2797678261","https://openalex.org/W2860433205","https://openalex.org/W2902900716","https://openalex.org/W2963678934","https://openalex.org/W2968580482","https://openalex.org/W2991799930","https://openalex.org/W3002335747","https://openalex.org/W3082731807","https://openalex.org/W3082735423","https://openalex.org/W3103457769","https://openalex.org/W3114468998","https://openalex.org/W3133411111","https://openalex.org/W3137686326","https://openalex.org/W3176609646"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W1966145327","https://openalex.org/W1995118279","https://openalex.org/W4240624848"],"abstract_inverted_index":{"An":[0,40],"increasing":[1],"trend":[2],"exploits":[3],"steganography":[4],"to":[5,12,17,22,49,56,145],"conceal":[6],"payloads":[7],"in":[8,75,110,125],"digital":[9,76],"images,":[10],"e.g.,":[11],"drop":[13],"malicious":[14,72],"executables":[15],"or":[16],"retrieve":[18],"configuration":[19],"files.":[20],"Due":[21],"the":[23,28,44,65,79,83,96,105,132,135,140,147],"very":[24],"attack-specific":[25],"nature":[26],"of":[27,46,67,90,99,107,134,142,150],"exploited":[29],"hiding":[30],"mechanisms,":[31],"developing":[32],"general":[33,53],"detection":[34],"methods":[35],"is":[36],"a":[37,68,121,126],"hard":[38],"task.":[39],"effective":[41],"approach":[42,136],"concerns":[43],"creation":[45],"ad-hoc":[47,108],"solutions":[48,109],"be":[50],"integrated":[51],"within":[52,82],"toolkits,":[54],"also":[55,119,138],"holistically":[57],"face":[58,146],"unknown":[59,115],"threats.":[60,152],"Therefore,":[61],"this":[62,117],"paper":[63],"discusses":[64],"integration":[66],"tool":[69],"for":[70,87],"detecting":[71],"contents":[73],"hidden":[74],"images":[77,100],"via":[78],"Invoke-PSImage":[80],"technique":[81],"Secure":[84],"Intelligent":[85],"Methods":[86],"Advanced":[88],"Recognition":[89],"Malware":[91],"and":[92,104,137],"Stegomalware":[93],"framework.":[94],"Since":[95],"real":[97],"impact":[98],"embedding":[101],"steganographic":[102],"threats":[103],"behavior":[106],"realistic":[111],"scenarios":[112],"are":[113],"still":[114],"territories,":[116],"work":[118],"showcases":[120],"performance":[122],"evaluation":[123],"conducted":[124],"nation-wide":[127],"telecommunication":[128],"provider.":[129],"Results":[130],"demonstrated":[131],"effectiveness":[133],"support":[139],"need":[141],"modular":[143],"architectures":[144],"emerging":[148],"wave":[149],"highly-specialized":[151]},"counts_by_year":[],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
