{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T04:11:39Z","timestamp":1727928699237},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031157769"},{"type":"electronic","value":"9783031157776"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15777-6_22","type":"book-chapter","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:24:33Z","timestamp":1661268273000},"page":"394-414","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["DeepC2: AI-Powered Covert Command and\u00a0Control on\u00a0OSNs"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-4711-4251","authenticated-orcid":false,"given":"Zhi","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chaoge","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Jiaxi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Di","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Qixu","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"key":"22_CR1","unstructured":"Anderson, H.S., Kharkar, A., Filar, B., Evans, D., Roth, P.: Learning to evade static PE machine learning malware models via reinforcement learning. CoRR abs\/1801.08917 (2018). http:\/\/arxiv.org\/abs\/1801.08917"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Bailey, M., Cooke, E., Jahanian, F., Xu, Y., Karir, M.: A survey of botnet technology and defenses. In: 2009 Cybersecurity Applications Technology Conference for Homeland Security, pp. 299\u2013304 (2009)","DOI":"10.1109\/CATCH.2009.40"},{"issue":"4","key":"22_CR3","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1142\/S0218001493000339","volume":"7","author":"J Bromley","year":"1993","unstructured":"Bromley, J., et al.: Signature verification using a \u201cSiamese\u2019\u2019 time delay neural network. Int. J. Pattern Recogn. Artif. Intell. 7(4), 669\u2013688 (1993). https:\/\/doi.org\/10.1142\/S0218001493000339","journal-title":"Int. J. Pattern Recogn. Artif. Intell."},{"key":"22_CR4","unstructured":"Buchner, J.: ImageHash-PyPi (2020). https:\/\/pypi.org\/project\/ImageHash\/"},{"key":"22_CR5","doi-asserted-by":"publisher","unstructured":"Chatterjee, S., Zielinski, P.: On the generalization mystery in deep learning. CoRR abs\/2203.10036 (2022). https:\/\/doi.org\/10.48550\/arXiv.2203.10036","DOI":"10.48550\/arXiv.2203.10036"},{"key":"22_CR6","unstructured":"Faou, M.: From Agent.BTZ to ComRAT v4: a ten-year journey. Technical report, ESET, May 2020"},{"issue":"7","key":"22_CR7","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Commun. ACM 59(7), 96\u2013104 (2016)","journal-title":"Commun. ACM"},{"key":"22_CR8","unstructured":"FireEye: Uncovering a malware backdoor that uses twitter. Technical report, FireEye (2015)"},{"key":"22_CR9","unstructured":"Google: Google search (2021). https:\/\/www.google.com\/search?q=buy+twitter+accounts"},{"key":"22_CR10","unstructured":"Group-IB: Lazarus arisen: architecture, techniques and attribution. Technical report, Group-IB (2017)"},{"key":"22_CR11","unstructured":"Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th USENIX Security Symposium, pp. 139\u2013154. USENIX Association (2008)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Hadsell, R., Chopra, S., LeCun, Y.: Dimensionality reduction by learning an invariant mapping. In: 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2006), vol. 2, pp. 1735\u20131742 (2006)","DOI":"10.1109\/CVPR.2006.100"},{"key":"22_CR13","unstructured":"Hu, W., Tan, Y.: Generating adversarial malware examples for black-box attacks based on GAN. CoRR abs\/1702.05983 (2017). http:\/\/arxiv.org\/abs\/1702.05983"},{"key":"22_CR14","unstructured":"Kirat, D., Jang, J., Stoecklin, M.P.: Deeplocker - concealing targeted attacks with AI locksmithing. Technical report, IBM Research (2018)"},{"issue":"1","key":"22_CR15","doi-asserted-by":"publisher","first-page":"84","DOI":"10.3390\/sym13010084","volume":"13","author":"M Kwak","year":"2021","unstructured":"Kwak, M., Cho, Y.: A novel video steganography-based botnet communication model in telegram SNS messenger. Symmetry 13(1), 84 (2021). https:\/\/doi.org\/10.3390\/sym13010084","journal-title":"Symmetry"},{"key":"22_CR16","unstructured":"Lecue, F., et al.: Explainable AI: foundations, industrial applications, practical challenges, and lessons learned, February 2020. https:\/\/xaitutorial2020.github.io\/"},{"issue":"4","key":"22_CR17","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1162\/neco.1989.1.4.541","volume":"1","author":"Y LeCun","year":"1989","unstructured":"LeCun, Y., et al.: Backpropagation applied to handwritten zip code recognition. Neural Comput. 1(4), 541\u2013551 (1989). https:\/\/doi.org\/10.1162\/neco.1989.1.4.541","journal-title":"Neural Comput."},{"key":"22_CR18","doi-asserted-by":"publisher","unstructured":"Liu, T., Liu, Z., Liu, Q., Wen, W., Xu, W., Li, M.: StegoNet: turn deep neural network into a stegomalware. In: Annual Computer Security Applications Conference, ACSAC 2020, New York, NY, USA, pp. 928\u2013938. Association for Computing Machinery (2020). https:\/\/doi.org\/10.1145\/3427228.3427268","DOI":"10.1145\/3427228.3427268"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Trojaning attack on neural networks. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018 (2018)","DOI":"10.14722\/ndss.2018.23291"},{"key":"22_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-642-24178-9_21","volume-title":"Information Hiding","author":"S Nagaraja","year":"2011","unstructured":"Nagaraja, S., Houmansadr, A., Piyawongwisal, P., Singh, V., Agarwal, P., Borisov, N.: Stegobot: a covert social network botnet. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 299\u2013313. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24178-9_21"},{"key":"22_CR21","doi-asserted-by":"publisher","unstructured":"Pantic, N., Husain, M.I.: Covert botnet command and control using twitter. In: Proceedings of the 31st Annual Computer Security Applications Conference, ACSAC 2015, pp. 171\u2013180. ACM (2015). https:\/\/doi.org\/10.1145\/2818000.2818047","DOI":"10.1145\/2818000.2818047"},{"key":"22_CR22","unstructured":"Plohmann, D., Yakdan, K., Klatt, M., Bader, J., Gerhards-Padilla, E.: A comprehensive measurement study of domain generating malware. In: 25th USENIX Security Symposium, Austin, TX, pp. 263\u2013278. USENIX Association, August 2016"},{"issue":"5","key":"22_CR23","doi-asserted-by":"publisher","first-page":"909","DOI":"10.3390\/app9050909","volume":"9","author":"S Qiu","year":"2019","unstructured":"Qiu, S., Liu, Q., Zhou, S., Wu, C.: Review of artificial intelligence adversarial attack and defense technologies. Appl. Sci. 9(5), 909 (2019)","journal-title":"Appl. Sci."},{"key":"22_CR24","unstructured":"Quora: How can I create bulk twitter accounts automatically? (2020). https:\/\/www.quora.com\/How-can-I-create-bulk-Twitter-accounts-automatically"},{"key":"22_CR25","doi-asserted-by":"publisher","unstructured":"Rigaki, M., Garcia, S.: Bringing a GAN to a knife-fight: adapting malware communication to avoid detection. In: 2018 IEEE Security and Privacy Workshops, SP Workshops 2018, San Francisco, CA, USA, pp. 70\u201375. IEEE Computer Society (2018). https:\/\/doi.org\/10.1109\/SPW.2018.00019","DOI":"10.1109\/SPW.2018.00019"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Sebastian, S., Ayyappan, S., Vinod, P.: Framework for design of graybot in social network. In: 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2331\u20132336. IEEE (2014)","DOI":"10.1109\/ICACCI.2014.6968575"},{"key":"22_CR27","unstructured":"Stefanko, L.: New telegram-abusing android rat discovered in the wild, June 2018. https:\/\/www.welivesecurity.com\/2018\/06\/18\/new-telegram-abusing-android-rat\/"},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Taniguchi, T., Griffioen, H., Doerr, C.: Analysis and takeover of the bitcoin-coordinated pony malware. In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, pp. 916\u2013930. ACM (2021)","DOI":"10.1145\/3433210.3437520"},{"key":"22_CR29","unstructured":"Twitter: Twitter terms of service (2020). https:\/\/twitter.com\/en\/tos"},{"key":"22_CR30","doi-asserted-by":"publisher","unstructured":"Wang, J., Liu, Q., Wu, D., Dong, Y., Cui, X.: Crafting adversarial example to bypass flow- &ML-based botnet detector via RL. In: RAID 2021: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, 6\u20138 October 2021, pp. 193\u2013204. ACM (2021). https:\/\/doi.org\/10.1145\/3471621.3471841","DOI":"10.1145\/3471621.3471841"},{"key":"22_CR31","doi-asserted-by":"publisher","unstructured":"Wang, Z., Liu, C., Cui, X.: EvilModel: hiding malware inside of neural network models. In: IEEE Symposium on Computers and Communications, ISCC 2021, Athens, Greece, 5\u20138 September 2021, pp. 1\u20137. IEEE (2021). https:\/\/doi.org\/10.1109\/ISCC53001.2021.9631425","DOI":"10.1109\/ISCC53001.2021.9631425"},{"key":"22_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/3-540-39799-X_41","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings","author":"AF Webster","year":"1986","unstructured":"Webster, A.F., Tavares, S.E.: On the design of S-Boxes. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 523\u2013534. Springer, Heidelberg (1986). https:\/\/doi.org\/10.1007\/3-540-39799-X_41"},{"key":"22_CR33","doi-asserted-by":"publisher","unstructured":"Wei, J.W., Zou, K.: EDA: easy data augmentation techniques for boosting performance on text classification tasks. In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, EMNLP-IJCNLP 2019, Hong Kong, China, pp. 6381\u20136387 (2019). https:\/\/doi.org\/10.18653\/v1\/D19-1670","DOI":"10.18653\/v1\/D19-1670"},{"key":"22_CR34","doi-asserted-by":"crossref","unstructured":"Xia, R., Pan, Y., Lai, H., Liu, C., Yan, S.: Supervised hashing for image retrieval via image representation learning. In: Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, pp. 2156\u20132162. AAAI Press (2014)","DOI":"10.1609\/aaai.v28i1.8952"},{"key":"22_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-030-01950-1_4","volume-title":"Information and Communications Security","author":"J Yin","year":"2018","unstructured":"Yin, J., Lv, H., Zhang, F., Tian, Z., Cui, X.: Study on advanced botnet based on publicly available resources. In: Naccache, D., et al. (eds.) ICICS 2018. LNCS, vol. 11149, pp. 57\u201374. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01950-1_4"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15777-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T10:28:35Z","timestamp":1727864915000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15777-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031157769","9783031157776"],"references-count":35,"URL":"http:\/\/dx.doi.org\/10.1007\/978-3-031-15777-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}