{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T14:26:13Z","timestamp":1707834373714},"reference-count":24,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Digital Forensic Practice"],"published-print":{"date-parts":[[2006,9]]},"DOI":"10.1080\/15567280601049985","type":"journal-article","created":{"date-parts":[[2007,7,7]],"date-time":"2007-07-07T13:08:48Z","timestamp":1183813728000},"page":"245-260","source":"Crossref","is-referenced-by-count":17,"title":["The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond"],"prefix":"10.1080","volume":"1","author":[{"given":"Aaron","family":"Emigh","sequence":"first","affiliation":[]}],"member":"301","reference":[{"key":"CIT0003","unstructured":"Bellovin, Steven M. 1995. Using the Domain Name System for System Break-ins. Proceedings of the Fifth Usenix UNIX Security Symposium. June1995."},{"key":"CIT0004","author":"Berinato Scott","year":"2003","journal-title":"CSO Magazine Online"},{"key":"CIT0005","volume-title":"Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology","author":"Burr William E.","year":"2004"},{"key":"CIT0006","unstructured":"Chou, N., Ledesma, R., Teraguchi, Y. and Mitchell, J. C. 2004. Client-Side Defense against Web-Based Identity Theft. Paper presented at the 11th Annual Network and Distributed System Security Symposium (NDSS '04). February2004, San Diego."},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Cohen, Fred. 1995. \u201c50 Ways to Attack Your World Wide Web System. Paper presented at the Computer Security Institute Annual Conference. October1995, Washington, D.C.","DOI":"10.1016\/1353-4858(96)89770-4"},{"key":"CIT0009","unstructured":"De Paoli, F., DosSantos, A. L. and Kemmerer, R. A. 1997. Vulnerability of \u2018Secure\u2019 Web Browsers. Proceedings of the National Information Systems Security Conference. 1997."},{"key":"CIT0010","doi-asserted-by":"crossref","unstructured":"Dhamija, Rachna and Tygar, J. D. The Battle Against Phishing: Dynamic Security Skins. Proceedings of the 2005 ACM Symposium on Usable Security and Privacy.","DOI":"10.1145\/1073001.1073009"},{"key":"CIT0012","unstructured":"Emigh, Aaron. 2005. Trusted Path in Heterogeneous Environments. Paper presented at the First Workshop on Trustworthy Interfaces for Passwords and Personal Information. June132005."},{"key":"CIT0013","volume-title":"Anti-Phishing Technology","author":"Emigh Aaron","year":"2005"},{"key":"CIT0014","volume-title":"Putting an End to Account-Hijacking Identity Theft","year":"2004"},{"key":"CIT0015","unstructured":"Felten, Edward W., Balfanz, Dirk, Dean, Drew and Wallach, Dan S. 1997. Web Spoofing: An Internet Con Game. Paper presented at the 20th National Information Systems Security Conference. October1997, Baltimore, Maryland."},{"key":"CIT0017","volume-title":"Badvertisements: Stealthy Click-Fraud with Oblivious Accomplices","author":"Gandhi Mona","year":"2006"},{"key":"CIT0018","author":"Griffith Virgil","year":"2005","journal-title":"Applied Cryptography and Network Security"},{"key":"CIT0021","volume-title":"Rootkits: Subverting the Windows Kernel","author":"Hoglund Greg","year":"2005"},{"key":"CIT0028","unstructured":"J\u00f8sang, Audun and Anne Patton, Mary. 2003. User Interface Requirements for Authentication of Communication. Proceedings of the Fourth Australian User Interface Conference on User Interfaces. February182003."},{"key":"CIT0029","unstructured":"Kaminsky, Dan. 2004. \u201cBlack Ops of DNS\u201d. Black Hat Briefings."},{"key":"CIT0030","doi-asserted-by":"crossref","unstructured":"King, Samuel T., Chen, Peter M., Wang, Yi-Min, Verbowski, Chad, Wang, Helen J. and Lorch, Jacob R. 2006. SubVirt: Implementing Malware with Virtual Machines. Proceedings of the 2006 IEEE Symposium on Security and Privacy. May2006. To appear in,","DOI":"10.1109\/SP.2006.38"},{"key":"CIT0032","unstructured":"Livshits, V. Benjamin and Lam, Monica S. 2005. Finding Security Vulnerabilities in Java Programs Using Static Analysis. Proceedings of the 14th Usenix Security Symposium. August2005."},{"key":"CIT0037","unstructured":"Ross, Blake, Jackson, Collin, Miyake, Nick, Boneh, Dan and Mitchell, John C. 2005. Stronger Password Authentication Using Browser Extensions. Proceedings of the 14th Usenix Security Symposium. 2005."},{"key":"CIT0041","volume-title":"The Art of Computer Virus Research and Defense","author":"Szor Peter","year":"2005"},{"key":"CIT0042","unstructured":"Taylor, Lloyd. 2005. Botnets and Botherds. Presentation given at ISSA Cornerstones of Trust. January182005."},{"key":"CIT0044","unstructured":"Min, Wu, Miller, Robert and Garfinkel, Simpson. Do Security Toolbars Actually Present Phishing Attacks? Paper presented at the Symposium on Usable Privacy and Security."},{"key":"CIT0045","unstructured":"Min, Wu, Miller, Robert and Garfinkel, Simpson. Secure Web Authentication with Mobile Phones. Paper presented at the DIMACS Symposium on Usable Privacy and Security."},{"key":"CIT0046","unstructured":"Zishuang (Eileen), Ye and Smith, Sean W. 2002. Trusted Paths for Browsers. Proceedings of the 11th Usenix Security Symposium. August2002. San Diego"}],"container-title":["Journal of Digital Forensic Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10256018808623883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T10:29:20Z","timestamp":1556620160000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/15567280601049985"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,9]]}},"alternative-id":["10.1080\/15567280601049985"],"URL":"https:\/\/doi.org\/10.1080\/15567280601049985","relation":{},"ISSN":["1556-7281","1556-7346"],"issn-type":[{"value":"1556-7281","type":"print"},{"value":"1556-7346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,9]]}}}