{"id":"https://openalex.org/W4386033770","doi":"https://doi.org/10.1145/3607505.3607513","title":"An Attacker\u2019s Dream? Exploring the Capabilities of ChatGPT for Developing Malware","display_name":"An Attacker\u2019s Dream? Exploring the Capabilities of ChatGPT for Developing Malware","publication_year":2023,"publication_date":"2023-08-07","ids":{"openalex":"https://openalex.org/W4386033770","doi":"https://doi.org/10.1145/3607505.3607513"},"language":"en","primary_location":{"id":"doi:10.1145/3607505.3607513","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3607505.3607513","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 Cyber Security Experimentation and Test Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://repository.tudelft.nl/file/File_d6264279-ac15-498b-88d6-343358ce400e","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037933743","display_name":"Yin Minn Pa Pa","orcid":null},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Yin Minn Pa Pa","raw_affiliation_strings":["Yokohama National University, Japan"],"raw_orcid":"https://orcid.org/0009-0004-3252-2249","affiliations":[{"raw_affiliation_string":"Yokohama National University, Japan","institution_ids":["https://openalex.org/I180203408"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092669382","display_name":"Shunsuke Tanizaki","orcid":"https://orcid.org/0009-0006-7019-3006"},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Shunsuke Tanizaki","raw_affiliation_strings":["Yokohama National University, Japan"],"raw_orcid":"https://orcid.org/0009-0006-7019-3006","affiliations":[{"raw_affiliation_string":"Yokohama National University, Japan","institution_ids":["https://openalex.org/I180203408"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040961180","display_name":"Tetsui Kou","orcid":null},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tetsui Kou","raw_affiliation_strings":["Yokohama National University, Japan"],"raw_orcid":"https://orcid.org/0009-0001-3469-7155","affiliations":[{"raw_affiliation_string":"Yokohama National University, Japan","institution_ids":["https://openalex.org/I180203408"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012946294","display_name":"Michel van Eeten","orcid":"https://orcid.org/0000-0002-0338-2812"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Michel van Eeten","raw_affiliation_strings":["Delft University of Technology/ Yokohama National University, Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-0338-2812","affiliations":[{"raw_affiliation_string":"Delft University of Technology/ Yokohama National University, Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028367744","display_name":"Katsunari Yoshioka","orcid":"https://orcid.org/0000-0003-0964-8631"},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Katsunari Yoshioka","raw_affiliation_strings":["Yokohama National University, Japan"],"raw_orcid":"https://orcid.org/0000-0003-0964-8631","affiliations":[{"raw_affiliation_string":"Yokohama National University, Japan","institution_ids":["https://openalex.org/I180203408"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057843702","display_name":"Tsutomu Matsumoto","orcid":"https://orcid.org/0000-0002-7965-4888"},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tsutomu Matsumoto","raw_affiliation_strings":["Yokohama National University, Japan"],"raw_orcid":"https://orcid.org/0000-0002-7965-4888","affiliations":[{"raw_affiliation_string":"Yokohama National University, Japan","institution_ids":["https://openalex.org/I180203408"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5037933743"],"corresponding_institution_ids":["https://openalex.org/I180203408"],"apc_list":null,"apc_paid":null,"fwci":13.4234,"has_fulltext":true,"cited_by_count":71,"citation_normalized_percentile":{"value":0.99324534,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"10","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9785000085830688,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9765999913215637,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8529212474822998},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7070276737213135},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6892185807228088},{"id":"https://openalex.org/keywords/dream","display_name":"Dream","score":0.5461841225624084},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.06424880027770996}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8529212474822998},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7070276737213135},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6892185807228088},{"id":"https://openalex.org/C2781095916","wikidata":"https://www.wikidata.org/wiki/Q36348","display_name":"Dream","level":2,"score":0.5461841225624084},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.06424880027770996},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3607505.3607513","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3607505.3607513","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 Cyber Security Experimentation and Test Workshop","raw_type":"proceedings-article"},{"id":"pmh:oai:tudelft.nl:uuid:10bcf718-4433-4b85-801d-1ebdcda0434b","is_oa":true,"landing_page_url":"http://resolver.tudelft.nl/uuid:10bcf718-4433-4b85-801d-1ebdcda0434b","pdf_url":"https://repository.tudelft.nl/file/File_d6264279-ac15-498b-88d6-343358ce400e","source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference paper"}],"best_oa_location":{"id":"pmh:oai:tudelft.nl:uuid:10bcf718-4433-4b85-801d-1ebdcda0434b","is_oa":true,"landing_page_url":"http://resolver.tudelft.nl/uuid:10bcf718-4433-4b85-801d-1ebdcda0434b","pdf_url":"https://repository.tudelft.nl/file/File_d6264279-ac15-498b-88d6-343358ce400e","source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference paper"},"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1981433366","display_name":null,"funder_award_id":"JPJSA3F20200001","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G547025805","display_name":null,"funder_award_id":"05201","funder_id":"https://openalex.org/F4320335839","funder_display_name":"National Institute of Information and Communications Technology"},{"id":"https://openalex.org/G6343804092","display_name":"Refinement of Cyberattack Generation Process Model by Using Machine Learning and Domain Knowledge","funder_award_id":"21KK0178","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320324891","display_name":"Iran Telecommunication Research Center","ror":"https://ror.org/01a3g2z22"},{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"},{"id":"https://openalex.org/F4320335839","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4386033770.pdf","grobid_xml":"https://content.openalex.org/works/W4386033770.grobid-xml"},"referenced_works_count":1,"referenced_works":["https://openalex.org/W4385270173"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1762480892","https://openalex.org/W597599663","https://openalex.org/W3194824274","https://openalex.org/W4205387075","https://openalex.org/W1537165133","https://openalex.org/W2390579330","https://openalex.org/W1578892932"],"abstract_inverted_index":{"We":[0,39],"investigate":[1],"the":[2,44,58,75,83,87,96,114,133,145,162,176],"potential":[3,163],"for":[4,90,144,164,178],"abuse":[5],"of":[6,31,49,69,85,99,118,138],"recent":[7,50,153],"AI":[8,28,51,154,187],"advances":[9],"by":[10],"developing":[11],"seven":[12],"malware":[13,60,91,120,166],"programs":[14],"and":[15,25,46,61,121,135,140,159,167,172,182],"two":[16],"attack":[17,62,122,168],"tools":[18,63,123,169],"using":[19],"ChatGPT,":[20,157],"OpenAI":[21,100],"Playground\u2019s":[22],"\"text-davinci-003\"":[23],"model,":[24,142],"Auto-GPT\u2014an":[26],"open-source":[27],"agent":[29],"capable":[30],"generating":[32,86,165],"automated":[33],"prompts":[34,89],"to":[35,56,65,131],"accomplish":[36],"user-defined":[37],"goals.":[38],"confirm":[40],"that:":[41],"1)":[42],"Under":[43],"safety":[45,97,136,171,180,184],"moderation":[47,134,173],"control":[48],"systems,":[52],"it":[53,94,112],"is":[54,128],"possible":[55],"generate":[57],"functional":[59],"(up":[64],"about":[66],"400":[67],"lines":[68],"code)":[70],"within":[71],"90":[72],"minutes,":[73],"including":[74,156],"debugging":[76],"time.":[77],"2)":[78],"Auto-GPT":[79],"does":[80],"not":[81],"ease":[82],"hurdle":[84],"right":[88],"generation,":[92],"but":[93],"evades":[95],"controls":[98,137,185],"with":[101,109],"its":[102],"automatically":[103],"generated":[104],"prompts.":[105,148],"When":[106],"given":[107],"goals":[108],"sufficient":[110],"details,":[111],"writes":[113],"code":[115],"in":[116,186],"nine":[117,119],"we":[124,150],"tested.":[125],"3)":[126],"There":[127],"still":[129],"room":[130],"improve":[132],"ChatGPT":[139],"text-davinci-003":[141],"especially":[143],"growing":[146],"jailbreak":[147],"Overall,":[149],"find":[151],"that":[152],"advances,":[155],"Auto-GPT,":[158],"text-davinci-003,":[160],"demonstrate":[161],"under":[170],"control,":[174],"highlighting":[175],"need":[177],"improved":[179],"measures":[181],"enhanced":[183],"systems.":[188]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":32},{"year":2023,"cited_by_count":10}],"updated_date":"2026-05-10T08:33:47.465468","created_date":"2025-10-10T00:00:00"}
