{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:21:31Z","timestamp":1740172891234,"version":"3.37.3"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T00:00:00Z","timestamp":1603670400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T00:00:00Z","timestamp":1603670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11416-020-00370-y","type":"journal-article","created":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T20:02:35Z","timestamp":1603742555000},"page":"91-104","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Superfetch: the famous unknown spy"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9746-5917","authenticated-orcid":false,"given":"Mathilde","family":"Venault","sequence":"first","affiliation":[]},{"given":"Baptiste","family":"David","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,26]]},"reference":[{"key":"370_CR1","unstructured":"Zwiegincew, A., Walsh, J.E.: Prefetching of pages prior to a hard page fault sequence. U.S. Patent (2001)"},{"key":"370_CR2","unstructured":"suat.cini: Superfetch service has been promoted to sysmain. congratulations! [Online]. Available: https:\/\/answers.microsoft.com\/en-us\/insider\/forum\/all\/superfetch-service-has-been-promoted-to-sysmain\/395cd8b7-7a02-44fa-af91-dd6b358b7276. Accessed 07 2018"},{"key":"370_CR3","unstructured":"Shashidhar, N.K., Novak, D.: Digital forensic analysis on prefetch files. Int. J. Inf. Secur. Sci. 4(2), 39\u201349 (2015). https:\/\/pdfs.semanticscholar.org\/2e5e\/bffd41661a4ca85420be881f70b2162a4638.pdf"},{"key":"370_CR4","unstructured":"Metz, J.: Superfetch databases [Online]. Available: https:\/\/github.com\/libyal\/libscca\/blob\/master\/documentation\/Windows%20Prefetch%20File%20%28PF%29%20format.asciidocc. Accessed 02 2020"},{"key":"370_CR5","unstructured":"Blog, R.: Windows superfetch file format-partial specification [Online]. Available: http:\/\/blog.rewolf.pl\/blog\/?p=214. Accessed 10 2011"},{"key":"370_CR6","unstructured":"Metz, J.: Superfetch databases [Online]. Available: https:\/\/github.com\/libyal\/libagdb\/blob\/master\/documentation\/Windows%20SuperFetch%20(DB)%20format.asciidoc. Accessed 04 2014"},{"key":"370_CR7","unstructured":"Blog, H.: Prefetch hash calculator [Online]. Available: http:\/\/www.hexacorn.com\/blog\/2012\/06\/13\/prefetch-hash-calculator-a-hash-lookup-table-xpvistaw7w2k3w2k8. Accessed 06 2012"},{"key":"370_CR8","unstructured":"Hiddenillusion Blog: Go prefetch yourself [Online]. Available: https:\/\/hiddenillusion.github.io\/2016\/05\/10\/go-prefetch-yourself\/. Accessed 05 2016"},{"key":"370_CR9","unstructured":"Yosifovich, S., Russinovich, M.E., Ionescu, A.: Windows Internals, Part 2 (6th edn.). Microsoft Press, Redmond, Washington (2017)"},{"key":"370_CR10","doi-asserted-by":"crossref","unstructured":"Margosis, A., Rusisnovich, M.: Windows Sysinternal Administrator\u2019s Reference. Microsoft Press, Redmond, Washington (2011)","DOI":"10.1016\/S1353-4858(11)70035-6"},{"key":"370_CR11","unstructured":"Blog, I.: Windows dll hijacking (hopefully) clarified [Online]. Available: https:\/\/itm4n.github.io\/windows-dll-hijacking-clarified. Accessed 04 2020"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-020-00370-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-020-00370-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-020-00370-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T10:39:29Z","timestamp":1635244769000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-020-00370-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,26]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["370"],"URL":"https:\/\/doi.org\/10.1007\/s11416-020-00370-y","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2020,10,26]]},"assertion":[{"value":"11 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}