<> <http://www.w3.org/2000/01/rdf-schema#comment> "The repository administrator has not yet configured an RDF license."^^<http://www.w3.org/2001/XMLSchema#string> .
<> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10133169> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://purl.org/dc/terms/title> "Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://purl.org/ontology/bibo/abstract> "Attributing a piece of malware to its creator typically requires threat intelligence. Binary attribution increases the level of difficulty as it mostly relies upon the ability to disassemble binaries to identify authorship style. Our survey explores malicious author style and the adversarial techniques used by them to remain anonymous. We examine the adversarial impact on the state-of-the-art methods. We identify key findings and explore the open research challenges. To mitigate the lack of ground truth datasets in this domain, we publish alongside this survey the largest and most diverse meta-information dataset of 15,660 malware labeled to 164 threat actor groups."^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://purl.org/dc/terms/date> "2021-01-18" .
<https://discovery.ucl.ac.uk/id/document/1358860> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Document> .
<https://discovery.ucl.ac.uk/id/org/ext-91b21bc7ed40b025418918cf96ff7092> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> .
<https://discovery.ucl.ac.uk/id/org/ext-91b21bc7ed40b025418918cf96ff7092> <http://xmlns.com/foaf/0.1/name> "ArXiv"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://purl.org/dc/terms/publisher> <https://discovery.ucl.ac.uk/id/org/ext-91b21bc7ed40b025418918cf96ff7092> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/published> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-55a4c102022e610cde36d8f9edba75f8> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10133169#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10133169#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-55a4c102022e610cde36d8f9edba75f8> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-31e00001acd57fced7327dbe5e9b1360> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10133169#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10133169#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_2> <https://discovery.ucl.ac.uk/id/person/ext-31e00001acd57fced7327dbe5e9b1360> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-77dd4be2c05d57bf58e2f3ce2e425f07> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10133169#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10133169#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_3> <https://discovery.ucl.ac.uk/id/person/ext-77dd4be2c05d57bf58e2f3ce2e425f07> .
<https://discovery.ucl.ac.uk/id/person/ext-77dd4be2c05d57bf58e2f3ce2e425f07> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-77dd4be2c05d57bf58e2f3ce2e425f07> <http://xmlns.com/foaf/0.1/givenName> "D"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-77dd4be2c05d57bf58e2f3ce2e425f07> <http://xmlns.com/foaf/0.1/familyName> "Sgandurra"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-77dd4be2c05d57bf58e2f3ce2e425f07> <http://xmlns.com/foaf/0.1/name> "D Sgandurra"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-31e00001acd57fced7327dbe5e9b1360> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-31e00001acd57fced7327dbe5e9b1360> <http://xmlns.com/foaf/0.1/givenName> "J"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-31e00001acd57fced7327dbe5e9b1360> <http://xmlns.com/foaf/0.1/familyName> "Gray"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-31e00001acd57fced7327dbe5e9b1360> <http://xmlns.com/foaf/0.1/name> "J Gray"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-55a4c102022e610cde36d8f9edba75f8> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-55a4c102022e610cde36d8f9edba75f8> <http://xmlns.com/foaf/0.1/givenName> "L"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-55a4c102022e610cde36d8f9edba75f8> <http://xmlns.com/foaf/0.1/familyName> "Cavallaro"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-55a4c102022e610cde36d8f9edba75f8> <http://xmlns.com/foaf/0.1/name> "L Cavallaro"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/EPrint> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/WorkingPaperEPrint> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/repository> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358860> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1358860> <http://www.w3.org/2000/01/rdf-schema#label> "Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets (Text)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://purl.org/dc/elements/1.1/hasVersion> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://eprints.org/ontology/hasSubmitted> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358860> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10133169/1/2101.06124.pdf> .
<https://discovery.ucl.ac.uk/id/document/1358860> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10133169/1/2101.06124.pdf> .
<https://discovery.ucl.ac.uk/id/eprint/10133169/1/2101.06124.pdf> <http://www.w3.org/2000/01/rdf-schema#label> "2101.06124.pdf"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1358861> .
<https://discovery.ucl.ac.uk/id/document/1358861> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1358861> <http://www.w3.org/2000/01/rdf-schema#label> "Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1358861> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358861> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358861> <http://eprints.org/relation/islightboxThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358861> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10133169/2/lightbox.jpg> .
<https://discovery.ucl.ac.uk/id/document/1358861> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10133169/2/lightbox.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10133169/2/lightbox.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "lightbox.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1358862> .
<https://discovery.ucl.ac.uk/id/document/1358862> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1358862> <http://www.w3.org/2000/01/rdf-schema#label> "Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1358862> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358862> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358862> <http://eprints.org/relation/ispreviewThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358862> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10133169/3/preview.jpg> .
<https://discovery.ucl.ac.uk/id/document/1358862> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10133169/3/preview.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10133169/3/preview.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "preview.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1358863> .
<https://discovery.ucl.ac.uk/id/document/1358863> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1358863> <http://www.w3.org/2000/01/rdf-schema#label> "Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1358863> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358863> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358863> <http://eprints.org/relation/ismediumThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358863> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10133169/4/medium.jpg> .
<https://discovery.ucl.ac.uk/id/document/1358863> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10133169/4/medium.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10133169/4/medium.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "medium.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1358864> .
<https://discovery.ucl.ac.uk/id/document/1358864> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1358864> <http://www.w3.org/2000/01/rdf-schema#label> "Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1358864> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358864> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358864> <http://eprints.org/relation/issmallThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358864> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10133169/5/small.jpg> .
<https://discovery.ucl.ac.uk/id/document/1358864> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10133169/5/small.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10133169/5/small.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "small.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1358865> .
<https://discovery.ucl.ac.uk/id/document/1358865> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1358865> <http://www.w3.org/2000/01/rdf-schema#label> "Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1358865> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358865> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358865> <http://eprints.org/relation/isIndexCodesVersionOf> <https://discovery.ucl.ac.uk/id/document/1358860> .
<https://discovery.ucl.ac.uk/id/document/1358865> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10133169/6/indexcodes.txt> .
<https://discovery.ucl.ac.uk/id/document/1358865> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10133169/6/indexcodes.txt> .
<https://discovery.ucl.ac.uk/id/eprint/10133169/6/indexcodes.txt> <http://www.w3.org/2000/01/rdf-schema#label> "indexcodes.txt"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10133169> <http://www.w3.org/2000/01/rdf-schema#seeAlso> <https://discovery.ucl.ac.uk/id/eprint/10133169/> .
<https://discovery.ucl.ac.uk/id/eprint/10133169/> <http://purl.org/dc/elements/1.1/title> "HTML Summary of #10133169 \n\nIdentifying Authorship Style in Malicious Binaries: Techniques, Challenges &amp; Datasets\n\n" .
<https://discovery.ucl.ac.uk/id/eprint/10133169/> <http://purl.org/dc/elements/1.1/format> "text/html" .
<https://discovery.ucl.ac.uk/id/eprint/10133169/> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10133169> .