{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:18:37Z","timestamp":1769728717789,"version":"3.49.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031514753","type":"print"},{"value":"9783031514760","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51476-0_13","type":"book-chapter","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T07:02:29Z","timestamp":1704870149000},"page":"255-276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Static Semantics Reconstruction for\u00a0Enhancing JavaScript-WebAssembly Multilingual Malware Detection"],"prefix":"10.1007","author":[{"given":"Yifan","family":"Xia","sequence":"first","affiliation":[]},{"given":"Ping","family":"He","sequence":"additional","affiliation":[]},{"given":"Xuhong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Peiyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Wenhai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,11]]},"reference":[{"key":"13_CR1","unstructured":"Npm (2021). https:\/\/www.npmjs.com\/"},{"key":"13_CR2","unstructured":"The year in web threats: web skimmers take advantage of cloud hosting and more (2021). https:\/\/unit42.paloaltonetworks.com\/web-threats-trends-web-skimmers\/"},{"key":"13_CR3","unstructured":"Github top programming languages (2022). https:\/\/octoverse.github.com\/2022\/top-programming-languages"},{"key":"13_CR4","unstructured":"150k Javascript dataset (2023). https:\/\/www.sri.inf.ethz.ch\/js150"},{"key":"13_CR5","unstructured":"Bitdefender (2023). https:\/\/www.bitdefender.com\/"},{"key":"13_CR6","unstructured":"Box.js, a sandbox to analyze malicious Javascript (2023). https:\/\/github.com\/CapacitorSet\/box-js"},{"key":"13_CR7","unstructured":"De4js, Javascript deobfuscator and unpacker (2023). https:\/\/lelinhtinh.github.io\/de4js\/"},{"key":"13_CR8","unstructured":"Escodegen (2023). https:\/\/github.com\/estools\/escodegen"},{"key":"13_CR9","unstructured":"Esprima (2023). https:\/\/esprima.org\/"},{"key":"13_CR10","unstructured":"Geeks on security malicious Javascript dataset (2023). https:\/\/github.com\/geeksonsecurity\/js-malicious-dataset"},{"key":"13_CR11","unstructured":"Petrak, H.: Javascript malware collection (2023). https:\/\/github.com\/HynekPetrak\/javascript-malware-collection"},{"key":"13_CR12","unstructured":"Javascript deobfuscator (2023). https:\/\/deobfuscate.io\/"},{"key":"13_CR13","unstructured":"Javascript es6 standard (2023). https:\/\/www.w3schools.com\/js\/js_es6.asp"},{"key":"13_CR14","unstructured":"Jwbinder source code and data (2023). https:\/\/github.com\/JWBinderRepository\/JWBinder"},{"key":"13_CR15","unstructured":"Mcafee (2023). https:\/\/www.mcafee.com\/"},{"key":"13_CR16","unstructured":"Mdn web docs (2023). https:\/\/developer.mozilla.org\/en-US\/docs\/WebAssembly\/JavaScript_interface"},{"key":"13_CR17","unstructured":"Microsoft defender antivirus (2023). https:\/\/www.microsoft.com\/"},{"key":"13_CR18","unstructured":"Microsoft, internet explorer (2023). https:\/\/www.microsoft.com\/download\/internet-explorer"},{"key":"13_CR19","unstructured":"Nodejs (2023). https:\/\/nodejs.org\/"},{"key":"13_CR20","unstructured":"Sandbox for semi-automatic Javascript malware analysis (2023). https:\/\/github.com\/HynekPetrak\/malware-jail"},{"key":"13_CR21","unstructured":"Virustotal (2023). https:\/\/www.virustotal.com\/"},{"key":"13_CR22","unstructured":"Webassembly (2023). https:\/\/webassembly.org\/"},{"key":"13_CR23","unstructured":"Webassembly core specification (2023). https:\/\/www.w3.org\/TR\/2022\/WD-wasm-core-2-20220419\/syntax\/instructions.html"},{"key":"13_CR24","unstructured":"Webassembly is abused by ecriminals to hide malware (2023). https:\/\/www.crowdstrike.com\/blog\/ecriminals-increasingly-use-webassembly-to-hide-malware\/"},{"key":"13_CR25","unstructured":"Yara (2023). https:\/\/virustotal.github.io\/yara\/"},{"key":"13_CR26","unstructured":"Curtsinger, C., Livshits, B., Zorn, B.G., Seifert, C.: ZOZZLE: fast and precise in-browser Javascript malware detection. In: 20th USENIX Security Symposium (USENIX Security 11) (2011)"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Fass, A., Backes, M., Stock, B.: Hidenoseek: camouflaging malicious Javascript in benign asts. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1899\u20131913 (2019)","DOI":"10.1145\/3319535.3345656"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Fass, A., Backes, M., Stock, B.: Jstap: a static pre-filter for malicious Javascript detection, pp. 257\u2013269 (2019)","DOI":"10.1145\/3359789.3359813"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Fass, A., Som\u00e9, D.F., Backes, M., Stock, B.: Doublex: statically detecting vulnerable data flows in browser extensions at scale. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p. 1789\u20131804 (2021)","DOI":"10.1145\/3460120.3484745"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Kolbitsch, C., Livshits, B., Zorn, B.G., Seifert, C.: Rozzle: de-cloaking internet malware. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 443\u2013457 (2012)","DOI":"10.1109\/SP.2012.48"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Konoth, R.K., et al.: Minesweeper: an in-depth look into drive-by cryptocurrency mining and its defense. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1714\u20131730 (2018)","DOI":"10.1145\/3243734.3243858"},{"key":"13_CR32","unstructured":"Li, S., Kang, M., Hou, J., Cao, Y.: Mining node.js vulnerabilities via object dependence graph and query. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 143\u2013160 (2022)"},{"key":"13_CR33","unstructured":"Li, W., Ming, J., Luo, X., Cai, H.: $$\\{$$PolyCruise$$\\}$$: A $$\\{$$Cross-Language$$\\}$$ dynamic information flow analysis. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 2513\u20132530 (2022)"},{"key":"13_CR34","unstructured":"Provos, N., McNamee, D., Mavrommatis, P., Wang, K., Modadugu, N.: The ghost in the browser: analysis of web-based malware. In: First Workshop on Hot Topics in Understanding Botnets (HotBots 07) (2007)"},{"key":"13_CR35","doi-asserted-by":"crossref","unstructured":"Quarta, D., Salvioni, F., Continella, A., Zanero, S.: Toward systematically exploring antivirus engines. In: Detection of Intrusions and Malware, and Vulnerability Assessment: 15th International Conference, pp. 393\u2013403 (2018)","DOI":"10.1007\/978-3-319-93411-2_18"},{"key":"13_CR36","doi-asserted-by":"crossref","unstructured":"Rieck, K., Krueger, T., Dewald, A.: Cujo: efficient detection and prevention of drive-by-download attacks. In: ACSAC \u201910: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 31\u201339 (2010)","DOI":"10.1145\/1920261.1920267"},{"key":"13_CR37","doi-asserted-by":"crossref","unstructured":"Romano, A., Lehmann, D., Pradel, M., Wang, W.: Wobfuscator: obfuscating Javascript malware via opportunistic translation to webassembly. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 1574\u20131589 (2022)","DOI":"10.1109\/SP46214.2022.9833626"},{"key":"13_CR38","doi-asserted-by":"crossref","unstructured":"Romano, A., Zheng, Y., Wang, W.: Minerray: Semantics-aware analysis for ever-evolving cryptojacking detection. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1129\u20131140 (2020)","DOI":"10.1145\/3324884.3416580"},{"key":"13_CR39","doi-asserted-by":"crossref","unstructured":"Shen, S., Zhu, X., Dong, Y., Guo, Q., Zhen, Y., Li, G.: Incorporating domain knowledge through task augmentation for front-end Javascript code generation. In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1533\u20131543 (2022)","DOI":"10.1145\/3540250.3558965"},{"key":"13_CR40","doi-asserted-by":"crossref","unstructured":"Srndic, N., Laskov, P.: Practical evasion of a learning-based classifier: a case study. In: 2014 IEEE Symposium on Security and Privacy, pp. 197\u2013211 (2014)","DOI":"10.1109\/SP.2014.20"},{"key":"13_CR41","doi-asserted-by":"crossref","unstructured":"Wang, J., Xue, Y., Liu, Y., Tan, T.H.: JSDC: a hybrid approach for Javascript malware detection and classification. In: ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 109\u2013120 (2015)","DOI":"10.1145\/2714576.2714620"},{"key":"13_CR42","unstructured":"Xiao, F., et al.: Abusing hidden properties to attack the node.js ecosystem. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 2951\u20132968 (2021)"},{"key":"13_CR43","doi-asserted-by":"crossref","unstructured":"Xue, Y., Wang, J., Liu, Y., Xiao, H., Sun, J., Chandramohan, M.: Detection and classification of malicious Javascript via attack behavior modelling. In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, pp. 48\u201359 (2015)","DOI":"10.1145\/2771783.2771814"},{"key":"13_CR44","unstructured":"Zhu, S., et al.: Measuring and modeling the label dynamics of online anti-malware engines. In: 29st USENIX Security Symposium (USENIX Security 20), pp. 2361\u20132378 (2020)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51476-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T07:05:52Z","timestamp":1704870352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51476-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031514753","9783031514760"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51476-0_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}