{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:15:05Z","timestamp":1763468105050},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642372995"},{"type":"electronic","value":"9783642373008"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37300-8_3","type":"book-chapter","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T08:53:59Z","timestamp":1363164839000},"page":"42-61","source":"Crossref","is-referenced-by-count":36,"title":["Large-Scale Analysis of Malware Downloaders"],"prefix":"10.1007","author":[{"given":"Christian","family":"Rossow","sequence":"first","affiliation":[]},{"given":"Christian","family":"Dietrich","sequence":"additional","affiliation":[]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Antivirus tracker, \n                    \n                      http:\/\/avtracker.info\/"},{"key":"3_CR2","unstructured":"yara-project - A malware identification and classification tool, \n                    \n                      http:\/\/code.google.com\/p\/yara-project\/"},{"key":"3_CR3","unstructured":"Lelli, A.: Zeusbot\/Spyeye P2P Updated, Fortifying the Botnet, \n                    \n                      http:\/\/www.symantec.com\/connect\/blogs\/zeusbotspyeye-p2p-updated-fortifying-botnet"},{"key":"3_CR4","unstructured":"Bayer, U., Kruegel, C., Kirda, E.: TTAnalyze: A Tool for Analyzing Malware. In: 15th EICAR Conference (2006)"},{"key":"3_CR5","unstructured":"Caballero, J., Grier, C., Kreibich, C., Paxson, V.: Measuring Pay-per-Install: The Commoditization of Malware Distribution. In: 20th USENIX Security Symposium, San Francisco, CA (August 2011)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Dinaburg, A., Royal, P., Sharif, M., Lee, W.: Ether: Malware Analysis via Hardware Virtualization Extensions. In: 15th ACM Computer and Communications Security Conference, Alexandria, VA (October 2008)","DOI":"10.1145\/1455770.1455779"},{"key":"3_CR7","unstructured":"John, J.P., Moshchuk, A., Gribble, S.D., Krishnamurthy, A.: Studying Spamming Botnets Using Botlab. In: NSDI (2009)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Kirat, D., Vigna, G., Kruegel, C.: BareBox: Efficient Malware Analysis on Bare-Metal. In: Proceedings of the Annual Computer Security Applications Conference, ACSAC (2011)","DOI":"10.1145\/2076732.2076790"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Nazario, J., Holz, T.: As the Net Churns: Fast-Flux Botnet Observations Tracking Fast-Flux Domains. In: 3rd International Conference on Malicious and Unwanted Software, Malware 2008 (2008)","DOI":"10.1109\/MALWARE.2008.4690854"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Neugschwandtner, M., Milani Comparetti, P., Platzer, C.: Detecting Malware\u2019s Failover C&C Strategies with SQUEEZE. In: 27th Annual Computer Security Applications Conference, ACSAC, Orlando, Florida (December 2011)","DOI":"10.1145\/2076732.2076736"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Newsome, J., Brumley, D., Franklin, J., Song, D.: Replayer: Automatic Protocol Replay by Binary Analysis. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006 (2006)","DOI":"10.1145\/1180405.1180444"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Rossow, C., Dietrich, C.J., Bos, H., Cavallaro, L., van Steen, M., Freiling, F.C., Pohlmann, N.: Sandnet: Network Traffic Analysis of Malicious Software. In: ACM EuroSys BADGERS (2011)","DOI":"10.1145\/1978672.1978682"},{"key":"3_CR13","unstructured":"Golovanov, S., Rusakov, V.: TDSS, \n                    \n                      http:\/\/www.securelist.com\/en\/analysis\/204792131\/TDSS"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., Vigna, G.: Your Botnet is My Botnet: Analysis of a Botnet Takeover. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009 (2009)","DOI":"10.1145\/1653662.1653738"},{"key":"3_CR15","unstructured":"ThreatExpert, \n                    \n                      http:\/\/www.threatexpert.com"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37300-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:28:39Z","timestamp":1558315719000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37300-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642372995","9783642373008"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37300-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}