{“状态”:“正常”,“消息类型”:“工作”,“消息版本”:“1.0.0”,“消息”:{“索引”:{“日期部分”:[[2022,4,5]],“日期时间”:“2022-04-05T10:57:56Z”,“时间戳”:1649156276211},“引用计数”:63,“发布者”:“电气和电子工程师协会(IEEE)”,“许可证”:[{“开始”:{“日期部分”:[[2021,1,1]],“日期时间”:“2021-01T00:00:00Z”,“timestamp”:1609459200000},“content-version”:“vor”,“delay-in-days”:0,“URL”:“https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode”}],“funder”:[{“DOI”:“10.13039\/501100004663”,“name”:“台湾科技部”,“DOI-asserted-by”:“publisher”,“award”:[“109-2221-E-005-046”],“id”:[}“id”3039\/501100004663“,”身份类型“:”DOI“,“asserted-by”:“publisher”}]}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},“short-container-title”:[“IEEE Access”],“published-print”:{“date-parts”:[[2021]]},”DOI“:”10.1109\/Access.2021.3103186“,”type“:”journal-article“,”created“:{”date-part“[2021,8,9]],”date-time“:”2021-08-09T20:25:56 Z“,”时间戳“:1628540756000},”页面“:“110811-110825”,“source”:“Crossref”,“is-referenced-by-count”:0,“title”:[“Version-Wide Software Birthmark via Machine Learning”],“prefix”:“10.1109”,”volume“:”9“,”author“:[{”ORCID“:“http://\/ORCID.org\/00000-0001-6392-9560”,“authenticated-ORCID”:false,“given”:”Chih-Ko“,”family“:”Chung“,”sequence“:”first“,”affiliation“:[]},{“OR”CID“:“http://\/orcid.org\/00000-0002-4220-2853”,“authenticated-orcid”:false,“given”:“Pi-Chang”,“family”:“Wang”,“sequence”:“additional”,“affiliation”:[]}],“member”:“263”,“reference”:[{“key”::“publisher”,“doi”:“10.1007\/978-1-4471-2909-7”},{“key”:“ref33”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3238147.3240480”},{“key”:“ref32”,“doi-assertd-by”:“publisher”,“DI:”10.1145\/3296957.3177157 publisher“,”doi“:”10.1145\/3175492“},{”key“:”ref37“,”author“:”grover“,”year“:“1992”,“期刊标题”:“计算机软件及其技术和应用的保护”},{“key”:“ref36”,“doi断言”:“publisher”,“doi”:“10.1145\/3395633397361”},{“key”:“ref35”,“doi断言”:“publisher”,“doi”:“10.1007\/978-3-030-22038-9_15”},{“key”:“ref34”,“文章标题”:“神经机器翻译启发的二进制代码相似性比较超越函数对”,“author”:“zuo”,“year”:“2018”,“journal-title”:“arXiv 1808 04706”},{“key”:“ref60”,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/j.eswa.2012.05.008”}、{“密钥”:“ref62”,“首页”:“2825”,“文章标题”:“Scikit-learn:Python中的机器学习”,“卷”:“12”,“author”:“pedregosa”,“year”:“2011”,“journal-title”:“J Mach Learn Res”},{“key”:“ref61”,“doi-asserted-by”:“publisher”,“doi”:“10.1080\/00437956.1954.11659520”}:“publisher”,“doi”:“10.1145\/3052973.3052974”},{“key”:“ref27”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ICPC.2017.22”},{“key”:“ref29”,“doo-asserted-by”:”publisher“,”doi“:”10.1109\/SP.2019.0003“},”{“key”:”ref2“,”author“:”khandelwal“,”year“2017”,”journal-title“:”超级秘密数字签名恶意交易的兴起“}”,{”key“:”ref1“,”年“:“2017”,“新闻标题”:“代码签名简介”},{“key”:“ref20”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/11533733_16”},“新闻标题”:“Proc 8th Workshop Softw Qual Anal Monit Improvement Appl”},{“key”:“ref24”,“article-title”:“了解公钥基础设施中的对手行为和安全威胁”,“author”:“kim”,“year”:“2020”}、{“key”:”ref23“,“year:”2018“,”journal-title“:”了解恶意软件活动中的代码签名滥用“},}“key:”ref26“,”doi-asserted-by“:“publisher”,“DOI”:“10.1145 \/2939672.2939719”},{“key”:“ref25”,“DOI-asserted-by”:“publicher”,“DOI”:”10.1145\/3446371“},}“key”:”ref50“,”first page“:”919“,”article-title“:”基于API调用的动态软件胎记的设计和评估“,”author“:”tamada“,”year“:”2007“}”,{”key“:“ref51”,”DOI-assert-by“:”publisher“,”DOI“:“10.1145\/1321631.1321672”},{“key”:“ref59”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TSE.2015.2418777”}“key”:“ref56”,“year”:“2021”,“journal-title”:“Software Versioning”},{“key“:”ref55“,“first page”:“55”,“article-title”:“Untang-parametric schemata:Enhanced collaboration through modular programming”,“author”:“davis”,“year”:“2011”,“journal-title“:”Proc 14th Int Conf Compute Aided Architectural Design“},{“key”:”ref54“,“doi-asserted-by”:“publisher”,”doi“:”10.1016\/j.ipm.2018.01.003,“DOI”:“10.1145\\361219.361220”},{“key”:“ref52”,“DOI断言者”:“publisher”,“DOI”:“10.1007\\BFb0026683”},{“key”:“ref10”,“DOI断言者”:“publisher”,“DOI”:“10.1007\\BFb0055720”},{“key”:“ref11”,“首页”:“17”,“文章标题”:“在完整的SHA-1中寻找冲突”,“作者”:“晓云”,“年份”:“2005”,“期刊title“:”Proc Crypto“},{“key”:“ref40”,“first page”:“1”,“article-title”:“使用机器学习算法进行源代码转换的软件胎记可用性”,“volume”:”2021“,“author”:“guan”,“year”:“2021”,”journal-title“:”Sci Program“},{“key”:“ref12”,“au作者”:“stevens”,“年份”:“2017”,“journal-title”:“Announcing the first SHA1 collection”},}“key:”ref13“,“author”:“burszetein”,“year”:“2017”,“journal-title”:“How we Create the First SHA-1 Collision and What it Measures for Hash Security”},{“key”:“ref14”,“author”:“nipravsky”,“year:”2016“,”journal-title“:”Certificate bypass Hiding and executing malware from a digital signed executable“},”{“密钥”:“ref15”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/978-3-540-30144-8_34”},{“key”:“ref16”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/s13369-019-03718-9”}“新闻标题”:“Int J Adv Res Compute Eng Technol”},{“key”:“ref19”,“year”:“2008”,“journal-title”:“Windows Authenticode可移植可执行签名格式(2008年3月21日10版)”}:“ROSCO:签名代码库”,“author”:“papp”,“year”:“2015”,“journal-title”:“Proc Virus Bull Conf”},{“key”:“ref6”,“年份”:“2021”,“日记标题”:“McAfee Labs Threats Report”}10.1109\/COMSIG.1997.629999“},{“key”:“ref7”,“first-page”:“851”,“article-title”:“The breaked shield:Measurement revocation effectives in The windows code-signing PKI”,“author”:“kim”,“year”:“2018”,“journal-tittle:”Proc 27th USENIX Secur Symp“},{”key:“ref49”,“doi-asserted-by”:“publisher”,“doi”:“10.1109 \/IMIS.2013.30”},“key“:”ref9”,“首页”:“223”,“文章标题“:“How to find weak input difference for MD5 collision attacks”,“author”:“xie”,“year”:“2009”,“journal-title”:“Proc IACR Cryptol ePrint Arch”},{“key”:“ref46”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/IMIS.2013.159”},“doi-asserted-by”:“publisher”,“doi”:“10.1145\/106677.1066753”},{“key”:“ref47”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ICISYS.2010.5658584”}{“key”:“ref44”,“首页”:“171”,“文章标题”:“使用模糊层次分析法评估软件胎记”,“author”:“nazir”,“year”:“2015”,“journal-title”:“Proc 4th Int Multi-Topic Conf”},{“key”:“ref43”,“doi-asserted-by”:“publisher”,“doi”:“10.1155\/2015\/579390”}],“container-title“:[”IEEE Access“],“original-tittle”:[],“link”:[{“URL”:“http://\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09509024.pdf?arnumber=9509024”,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2021,12,17]],“date-time”:”2021-12-17T19:57:24Z“,“timestamp”:163977104000},“score”:1,“resource”:{“primary”(主要):{“URL”(URL):“https:\/\/ieeexplore.iee.org\/document\/9509024\/”}},“副标题”:[],“短标题”:[],“发布”:{“日期-部件”:[[2021]]},”引用计数“:63,”URL“:”http://\/dx.doi.org\/10.109\/access.2021.3103186“,”关系“:{},36“,”type“:”electronic“}],”subject“:[],”published“:{”date-parts“:[[2021]]}}}