{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T14:35:47Z","timestamp":1767969347194,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642372995","type":"print"},{"value":"9783642373008","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37300-8_12","type":"book-chapter","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T04:53:59Z","timestamp":1363150439000},"page":"204-213","source":"Crossref","is-referenced-by-count":12,"title":["BISSAM: Automatic Vulnerability Identification of Office Documents"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Schreck","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Berger","sequence":"additional","affiliation":[]},{"given":"Jan","family":"G\u00f6bel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Boldewin, F.: OfficeMalScanner (2011), \n                    \n                      http:\/\/www.reconstructer.org\/code.html"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: Generalizing return-oriented programming to RISC. In: Syverson, P., Jha, S. (eds.) Proceedings of CCS 2008, pp. 27\u201338. ACM Press (October 2008)","DOI":"10.1145\/1455770.1455776"},{"key":"12_CR3","unstructured":"Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V., Hazelwood, K.: Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. In: Proceedings of ACM SIGPLAN Conf. Programming Language Design and Implementation, PLDI 2005 (June 2005)"},{"key":"12_CR4","unstructured":"Microsoft: Microsoft Security Intelligence Report (SIR), vol. 7 (January-June 2009)"},{"key":"12_CR5","unstructured":"Microsoft: OffVis 1.1 (2009), \n                    \n                      http:\/\/blogs.technet.com\/b\/srd\/archive\/2009\/09\/14\/offvis-updated-office-file-format-training-video-created.aspx"},{"key":"12_CR6","unstructured":"Oh, J.: DarunGrim: A Patch Analysis and Binary Diffing Tool (2011), \n                    \n                      http:\/\/www.darungrim.org"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In: De Capitani di Vimercati, S., Syverson, P. (eds.) Proceedings of CCS 2007, pp. 552\u2013561. ACM Press (October 2007)","DOI":"10.1145\/1315245.1315313"},{"key":"12_CR8","unstructured":"Snort Project: OfficeCat (2010), \n                    \n                      http:\/\/www.snort.org\/vrt\/vrt-resources\/officecat"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37300-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T14:54:58Z","timestamp":1557586498000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37300-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642372995","9783642373008"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37300-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}