{"id":"https://openalex.org/W4402957775","doi":"https://doi.org/10.1145/3678890.3678892","title":"What do malware analysts want from academia? A survey on the state-of-the-practice to guide research developments","display_name":"What do malware analysts want from academia? A survey on the state-of-the-practice to guide research developments","publication_year":2024,"publication_date":"2024-09-29","ids":{"openalex":"https://openalex.org/W4402957775","doi":"https://doi.org/10.1145/3678890.3678892"},"language":"en","primary_location":{"id":"doi:10.1145/3678890.3678892","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678892","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3678890.3678892","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060510652","display_name":"Marcus Botacin","orcid":"https://orcid.org/0000-0001-6870-1178"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Marcus Botacin","raw_affiliation_strings":["Computer Science and Engineering, Texas A&amp;M University, United States of America"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Texas A&amp;M University, United States of America","institution_ids":["https://openalex.org/I91045830"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5060510652"],"corresponding_institution_ids":["https://openalex.org/I91045830"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.181935,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"77","last_page":"96"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7468347549438477},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5879950523376465},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5333139300346375},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5196393728256226},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3216424882411957},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09729686379432678}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7468347549438477},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5879950523376465},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5333139300346375},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5196393728256226},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3216424882411957},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09729686379432678}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3678890.3678892","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678892","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3678890.3678892","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678892","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4073929475","display_name":null,"funder_award_id":"CNS 2327427","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W48212787","https://openalex.org/W200653874","https://openalex.org/W928598251","https://openalex.org/W1515180657","https://openalex.org/W1892063863","https://openalex.org/W1966983929","https://openalex.org/W1984999133","https://openalex.org/W1986316433","https://openalex.org/W2001207791","https://openalex.org/W2001602611","https://openalex.org/W2004360894","https://openalex.org/W2014316112","https://openalex.org/W2033857234","https://openalex.org/W2036567844","https://openalex.org/W2053001225","https://openalex.org/W2096921767","https://openalex.org/W2117030266","https://openalex.org/W2405741155","https://openalex.org/W2464629196","https://openalex.org/W2489398155","https://openalex.org/W2509067210","https://openalex.org/W2514974017","https://openalex.org/W2621130533","https://openalex.org/W2621276321","https://openalex.org/W2712617220","https://openalex.org/W2843669218","https://openalex.org/W2887799690","https://openalex.org/W2890434219","https://openalex.org/W2912095101","https://openalex.org/W2942735926","https://openalex.org/W2950244443","https://openalex.org/W2980790296","https://openalex.org/W3007135727","https://openalex.org/W3008890513","https://openalex.org/W3042169959","https://openalex.org/W3084078945","https://openalex.org/W3093577626","https://openalex.org/W3095312831","https://openalex.org/W3105646798","https://openalex.org/W3125868980","https://openalex.org/W3128265165","https://openalex.org/W3138173041","https://openalex.org/W3153065797","https://openalex.org/W3168148707","https://openalex.org/W3213145987","https://openalex.org/W4242582838","https://openalex.org/W4280581456","https://openalex.org/W4286978553","https://openalex.org/W4295908585","https://openalex.org/W4308642425","https://openalex.org/W4311165756"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W2249809453"],"abstract_inverted_index":{"Malware":[0],"analysis":[1,23,49,218],"tasks":[2,24],"are":[3,11,53],"as":[4,9],"fundamental":[5],"for":[6],"modern":[7],"cybersecurity":[8],"they":[10,114],"challenging":[12],"to":[13,46,76,100,103,137,150,152,159,178,202,209],"perform.":[14],"More":[15],"than":[16],"depending":[17],"on":[18,26,43,172],"any":[19],"tool":[20],"capability,":[21],"malware":[22,48,60,92,135,167,217],"depend":[25],"human":[27],"analysts\u2019":[28],"abilities,":[29],"experiences,":[30],"and":[31,79,111,143,166],"practices":[32,75],"when":[33],"using":[34],"the":[35,70,112,131,138,144,146,161,173,179,181,185,195,203],"tools.":[36],"Academic":[37],"research":[38],"has":[39],"traditionally":[40],"been":[41],"focused":[42],"producing":[44],"solutions":[45,55,64,182],"overcome":[47],"technical":[50],"challenges,":[51],"but":[52],"these":[54,63,86],"adopted":[56],"in":[57,95,116,184],"practice":[58],"by":[59],"analysts?":[61],"Are":[62],"useful?":[65],"If":[66],"not,":[67],"how":[68],"can":[69],"academic":[71,164,204],"community":[72,205],"improve":[73],"its":[74],"foster":[77],"adoption":[78],"cause":[80],"a":[81,125],"greater":[82],"impact?":[83],"To":[84,169],"answer":[85],"questions,":[87,122],"we":[88,123,176,198],"surveyed":[89],"21":[90],"professional":[91],"analysts":[93,147,180],"working":[94],"different":[96],"companies,":[97,102],"from":[98,130],"CSIRTs":[99],"AV":[101],"hear":[104],"their":[105,117,154,192],"opinions":[106],"about":[107],"existing":[108,211],"tools,":[109],"practices,":[110],"challenges":[113],"face":[115],"daily":[118],"tasks.":[119],"In":[120],"31":[121],"cover":[124],"broad":[126],"range":[127],"of":[128,133,140],"aspects,":[129],"number":[132],"observed":[134],"variants":[136],"use":[139],"public":[141],"sandboxes":[142],"tools":[145],"would":[148],"like":[149],"exist":[151],"make":[153],"lives":[155],"easier.":[156],"We":[157],"aim":[158],"bridge":[160,210],"gap":[162],"between":[163],"developments":[165],"practices.":[168,193,219],"do":[170],"so,":[171],"one":[174],"hand,":[175,197],"suggest":[177],"proposed":[183],"literature":[186],"that":[187,214],"could":[188],"be":[189],"integrated":[190],"into":[191],"On":[194],"other":[196],"also":[199],"point":[200],"out":[201],"possible":[206],"future":[207],"directions":[208],"development":[212],"gaps":[213],"significantly":[215],"affect":[216]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
