{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:00:04Z","timestamp":1771516804288,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642315367","type":"print"},{"value":"9783642315374","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31537-4_40","type":"book-chapter","created":{"date-parts":[[2012,7,2]],"date-time":"2012-07-02T05:50:32Z","timestamp":1341208232000},"page":"510-524","source":"Crossref","is-referenced-by-count":65,"title":["A Pattern Recognition System for Malicious PDF Files Detection"],"prefix":"10.1007","author":[{"given":"Davide","family":"Maiorca","sequence":"first","affiliation":[]},{"given":"Giorgio","family":"Giacinto","sequence":"additional","affiliation":[]},{"given":"Igino","family":"Corona","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","unstructured":"Wepawet, \n                    \n                      http:\/\/wepawet.iseclab.org\/"},{"key":"40_CR2","unstructured":"IBM : IBM X-Force 2010 Mid-Year Trend and Risk Report (2010)"},{"key":"40_CR3","unstructured":"Symantec : Symantec Global Internet Security Threat Report. Trends for 2009 (2010)"},{"key":"40_CR4","unstructured":"Parker, T.: Navigating the Internal Structure of a PDF Document, \n                    \n                      http:\/\/www.planetpdf.com"},{"key":"40_CR5","unstructured":"Decalage: PDF Security Isseues, \n                    \n                      http:\/\/www.decalage.info"},{"key":"40_CR6","unstructured":"Ogorkiewicz, M., Frej, P.: Analysis of Buffer Overflow Attacks (2004), \n                    \n                      http:\/\/www.windowsecurity.com"},{"key":"40_CR7","unstructured":"Ramachandran, V.: Buffer Overflow Primer Video Series, \n                    \n                      http:\/\/www.securitytube.net"},{"key":"40_CR8","unstructured":"Ratanaworabhan, P., Livshits, B., Zorn, B.: NOZZLE: A Defense Against Heap-spraying Code Injection Attacks. In: SSYM 2009 Proceedings of the 18th Conference on USENIX Security Symposium (2009)"},{"key":"40_CR9","unstructured":"Bania, P.: JIT Spraying and Mitigations. CoRR (2010)"},{"key":"40_CR10","unstructured":"Stevens, D.: PDF tools, \n                    \n                      http:\/\/blog.didierstevens.com\/programs\/pdf-tools\/"},{"key":"40_CR11","unstructured":"Contagio, \n                    \n                      http:\/\/contagiodump.blogspot.com\/"},{"key":"40_CR12","unstructured":"Cova, M., \n                    \n                      http:\/\/www.cs.bham.ac.uk\/~covam\/blog\/pdf\/"},{"key":"40_CR13","unstructured":"Dixon, B., \n                    \n                      http:\/\/blog.9bplus.com"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Willems, C., Holz, T., Freiling, F.: Toward Automated Dynamic Malware Analysis Using CWSandbox. Journal IEEE Security and Privacy Archive 5(2) (2007)","DOI":"10.1109\/MSP.2007.45"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Cova, M., Kruegel, C., Vigna, G.: Detection and Analysis of Drive-by-Downloads Attacks and Malicious Javascript Code. In: Proceedings of International World Wide Web Conference, WWW 2010 (2010)","DOI":"10.1145\/1772690.1772720"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Tzermias, Z., Sykiotakis, G., Polychronakis, M., Markatos, E.P.: Combining Static and Dynamic Analysis for the Detection of Malicious Documents. In: EUROSEC 2011 Proceedings of the Fourth European Workshop on System Security (2011)","DOI":"10.1145\/1972551.1972555"},{"key":"40_CR17","doi-asserted-by":"crossref","unstructured":"Laskov, P., \u0160rndi\u0107, N.: Static Detection of Malicious JavaScript-Bearing PDF Documents. In: Annual Computer Security Applications Conference (2011)","DOI":"10.1145\/2076732.2076785"},{"key":"40_CR18","unstructured":"Yahoo, \n                    \n                      http:\/\/www.yahoo.com"},{"key":"40_CR19","unstructured":"Virus Total, \n                    \n                      http:\/\/www.virustotal.com\/"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Data Mining in Pattern Recognition"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31537-4_40.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:10:58Z","timestamp":1620115858000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31537-4_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642315367","9783642315374"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31537-4_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}