{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:22:06Z","timestamp":1725906126940},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319641997"},{"type":"electronic","value":"9783319642000"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64200-0_8","type":"book-chapter","created":{"date-parts":[[2017,7,26]],"date-time":"2017-07-26T08:58:41Z","timestamp":1501059521000},"page":"121-137","source":"Crossref","is-referenced-by-count":0,"title":["Evasion Attacks Against Statistical Code Obfuscation Detectors"],"prefix":"10.1007","author":[{"given":"Jiawei","family":"Su","sequence":"first","affiliation":[]},{"given":"Danilo Vasconcellos","family":"Vargas","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,27]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Canali, D., Cova, M., Vigna, G., Kruegel, C.: Prophiler: a fast filter for the large-scale detection of malicious web pages. In: 20th International Conference on World Wide Web, pp. 197\u2013206. ACM(2011)","DOI":"10.1145\/1963405.1963436"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Wang, W., Lv, Y., Chen, H., Fang, Z.: A static malicious JavaScript detection using SVM. In: 2nd International Conference on Computer Science and Electronics Engineering, vol. 40, pp. 21\u201330 (2013)","DOI":"10.2991\/iccsee.2013.56"},{"key":"8_CR3","unstructured":"Nishida, M., et al.: Obfuscated malicious JavaScript detection using machine learning with character frequency. In: Information Processing Society of Japan SIG Technical Report, No. 21 (2014)"},{"key":"8_CR4","unstructured":"Kamizono, M., et al.: Datasets for anti-malware research - MWS datasets 2013. In: Anti Malware Engineering WorkShop (2013)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Laskov, P., Srndic, N.: Static detection of malicious JavaScript-bearing PDF documents. In: 27th Annual Computer Security Applications Conference, pp. 373\u2013382. ACM (2011)","DOI":"10.1145\/2076732.2076785"},{"key":"8_CR6","unstructured":"Al-Taharwa, I.A., et al.: Obfuscated malicious JavaScript detection by Causal Relations Finding. In: 2011 13th International Conference Advanced Communication Technology (ICACT), pp. 787\u2013792. IEEE (2011)"},{"key":"8_CR7","unstructured":"Kim, B., Im, C., Jung, H.: Suspicious malicious web site detection with strength analysis of a JavaScript obfuscation. Int. J. Adv. Sci. Technol. 26, 19\u201332 (2011)"},{"issue":"2","key":"8_CR8","first-page":"13","volume":"4","author":"Y Choi","year":"2010","unstructured":"Choi, Y., Kim, T., Choi, S.: Automatic detection for JavaScript obfuscation attacks in web pages through string pattern analysis. Int. J. Secur. Appl. 4(2), 13\u201326 (2010)","journal-title":"Int. J. Secur. Appl."},{"key":"8_CR9","unstructured":"Scholkopf, B., Williamson, R., Smola, A., Taylor, J., Platt, J.: Support vector method for novelty detection. In: Solla, S.A., Leen, T.K., Muller, K.-R. (eds.), pp. 582\u2013588. MIT Press (2000)"},{"key":"8_CR10","unstructured":"VirusTotal. \nhttps:\/\/www.virustotal.com"},{"key":"8_CR11","unstructured":"Alexa Top Sites. \nhttp:\/\/www.alexa.com\/topsites"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Shabtai, A., Moskovitch, R., Elovici, Y., Glezer, C.: Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey. In: Information Security Technical Report, vol. 14, pp. 16\u201329. Elsevier (2009)","DOI":"10.1016\/j.istr.2009.03.003"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-319-30840-1_18","volume-title":"Information Security and Cryptology - ICISC 2015","author":"J Su","year":"2016","unstructured":"Su, J., Yoshioka, K., Shikata, J., Matsumoto, T.: Detecting obfuscated suspicious JavaScript based on information-theoretic measures and\u00a0novelty detection. In: Kwon, S., Yun, A. (eds.) ICISC 2015. LNCS, vol. 9558, pp. 278\u2013293. Springer, Cham (2016). doi:\n10.1007\/978-3-319-30840-1_18"},{"key":"8_CR14","unstructured":"Daniel, L., Meek, C.: Good word attacks on statistical spam filter. In: CEAS (2015)"},{"key":"8_CR15","unstructured":"Visaggio, C., Canfora, G.: An empirical study of metric-based methods to detect obfuscated code. Int. J. Secur. Appl. 7(2) (2013)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Huang, L., et al.: Adversarial machine learning. In: 4th ACM Workshop on Artificial Intelligence and Security, pp. 43\u201358 (2011)","DOI":"10.1145\/2046684.2046692"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Kruskal, J.B.: Multidimensional Scaling by optimizing goodness of fit to a nonmetric hypothesis. Psychometrika 29(1), 1-27 (1964)","DOI":"10.1007\/BF02289565"},{"key":"8_CR18","unstructured":"Scholkopf, B., et al.: Support vector method for novelty detection. In: Conference on Neural Information Processing Systems 1999 (NIPS 1999), vol. 12, pp. 582\u2013588 (1999)"},{"key":"8_CR19","unstructured":"Tax, D.M.J., Duin, R.P.W.: Support vector data description. J. Mach. Learn. 54(1), 45\u201366 (2004)"},{"key":"8_CR20","unstructured":"Curtsinger, C., et al.: ZOZZLE: Fast and precise in-browser JavaScript malware detection. In: USENIX Security Symposium, pp. 33\u201348 (2011)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64200-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,26]],"date-time":"2017-07-26T09:00:38Z","timestamp":1501059638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64200-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319641997","9783319642000"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64200-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}