{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T21:10:19Z","timestamp":1740863419606,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642181771"},{"type":"electronic","value":"9783642181788"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18178-8_17","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T16:09:47Z","timestamp":1295107787000},"page":"196-202","source":"Crossref","is-referenced-by-count":1,"title":["Crimeware Swindling without Virtual Machines"],"prefix":"10.1007","author":[{"given":"Vasilis","family":"Pappas","sequence":"first","affiliation":[]},{"given":"Brian M.","family":"Bowen","sequence":"additional","affiliation":[]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Borders, K., Zhao, X., Prakash, A.: Siren: Catching evasive malware. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 78\u201385 (May 2006)","key":"17_CR1","DOI":"10.1109\/SP.2006.37"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-15512-3_7","volume-title":"Recent Advances in Intrusion Detection","author":"B.M. Bowen","year":"2010","unstructured":"Bowen, B.M., Prabhu, P., Kemerlis, V.P., Sidiroglou, S., Keromytis, A.D., Stolfo, S.J.: BotSwindler: Tamper resistant injection of believable decoys in VM-based hosts for crimeware detection. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol.\u00a06307, pp. 118\u2013137. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Chandrasekaran, M., Vidyaraman, S., Upadhyaya, S.: SpyCon: Emulating User Activities to Detect Evasive Spyware. In: Proc. of the Performance, Computing, and Communications Conference (IPCCC), pp. 502\u2013509 (May 2007)","key":"17_CR3","DOI":"10.1109\/PCCC.2007.358933"},{"unstructured":"RSA (EMC\u2019s\u00a0Security Division). Malware and enterprise. White paper (April 2010)","key":"17_CR4"},{"doi-asserted-by":"crossref","unstructured":"Pappas, V., Bowen, B.M., Keromytis, A.D.: Evaluation of a spyware detection system using thin client computing. In: ICISC (2010)","key":"17_CR5","DOI":"10.1007\/978-3-642-24209-0_15"},{"unstructured":"Schroeder, T., Moser, M.: Practical exploitation of modern wireless devices (March 2010), http:\/\/www.remote-exploit.org\/?p=437","key":"17_CR6"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18178-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T20:57:51Z","timestamp":1740862671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18178-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642181771","9783642181788"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18178-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}