{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:29:40Z","timestamp":1743128980230,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044731"},{"type":"electronic","value":"9783642044748"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04474-8_17","type":"book-chapter","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T11:25:17Z","timestamp":1251977117000},"page":"202-217","source":"Crossref","is-referenced-by-count":5,"title":["Automated Spyware Collection and Analysis"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Stamminger","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[]},{"given":"Engin","family":"Kirda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Good, N., Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D., Konstan, J.: Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware. In: Symposium On Usable Privacy and Security, SOUPS (2005)","DOI":"10.1145\/1073001.1073006"},{"key":"17_CR2","unstructured":"Moshchuk, A., Bragin, T., Gribble, S.D., Levy, H.M.: A Crawler-based Study of Spyware on the Web. In: Network and Distributed Systems Security Symposium, NDSS (2006)"},{"key":"17_CR3","unstructured":"Egele, M., Kruegel, C., Kirda, E., Yin, H., Song, D.: Dynamic Spyware Analysis. In: Usenix Annual Technical Conference (2007)"},{"key":"17_CR4","unstructured":"Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.: Behavior-based Spyware Detection. In: Usenix Security Symposium (2006)"},{"key":"17_CR5","unstructured":"Wang, Y., Roussev, R., Verbowski, C., Johnson, A., Wu, M., Huang, Y., Kuo, S.: Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. In: Large Installation System Administration Conference (2004)"},{"key":"17_CR6","unstructured":"Hackworth, A.: Spyware. US-CERT Publication (2005)"},{"key":"17_CR7","unstructured":"Lavasoft: Ad-Aware, http:\/\/www.lavasoftusa.com\/software\/adaware"},{"key":"17_CR8","unstructured":"Castlecops: The CLSID \/ BHO List \/ Toolbar Master List, http:\/\/www.castlecops.com\/CLSID.html"},{"key":"17_CR9","unstructured":"Mohr, G., Stack, M., Rnitovic, I., Avery, D., Kimpton, M.: Introduction to Heritrix. In: 4th International Web Archiving Workshop (2004)"},{"key":"17_CR10","unstructured":"Bellard, F.: QEMU, a Fast and Portable Dynamic Translator. In: Usenix Annual Technical Conference, Freenix Track (2005)"},{"key":"17_CR11","unstructured":"Trendmicro: HijackThis, http:\/\/www.trendsecure.com\/portal\/en-US\/tools\/security_tools\/hijackthis"},{"key":"17_CR12","unstructured":"Spybot: Spybot Search & Destroy, http:\/\/www.safer-networking.org\/"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Exploring Multiple Execution Paths for Malware Analysis. In: Symposium on Security and Privacy (2007)","DOI":"10.1109\/SP.2007.17"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In: ACM Conference on Computer and Communication Security, CCS (2007)","DOI":"10.1145\/1315245.1315261"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S., Song, D., Bryant, R.: Semantics-Aware Malware Detection. In: Symposium on Security and Privacy (2005)","DOI":"10.1109\/SP.2005.20"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Wang, H., Jha, S., Ganapathy, V.: NetSpy: Automatic Generation of Spyware Signatures for NIDS. In: Annual Computer Security Applications Conference, ACSAC (2006)","DOI":"10.1109\/ACSAC.2006.34"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04474-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,22]],"date-time":"2020-05-22T00:18:30Z","timestamp":1590106710000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04474-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044731","9783642044748"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04474-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}