{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T23:59:00Z","timestamp":1768780740857,"version":"3.49.0"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Institute of Information and Communications Technology Planning and Evaluation"},{"name":"Korean Government through the Development of Automated Vulnerability Discovery Technologies for Blockchain Platform Security","award":["2019-0-01697"],"award-info":[{"award-number":["2019-0-01697"]}]},{"name":"Development of Software Bill of Materials (SBOM) Technologies for Securing Software Supply Chains","award":["2022-0-00277"],"award-info":[{"award-number":["2022-0-00277"]}]},{"name":"Convergence Security Core Talent Training Business","award":["2022-0-01198"],"award-info":[{"award-number":["2022-0-01198"]}]},{"name":"ICT Creative Consilience Program","award":["IITP-2022-2020-0-01819"],"award-info":[{"award-number":["IITP-2022-2020-0-01819"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3204814","type":"journal-article","created":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T19:24:51Z","timestamp":1662492291000},"page":"95356-95368","source":"Crossref","is-referenced-by-count":4,"title":["Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0600-606X","authenticated-orcid":false,"given":"Hyunji","family":"Hong","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Korea University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5455-0804","authenticated-orcid":false,"given":"Seunghoon","family":"Woo","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Korea University, Seoul, South Korea"}]},{"given":"Sunghan","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Korea University, Seoul, South Korea"}]},{"given":"Jeongwook","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Korea University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5831-0787","authenticated-orcid":false,"given":"Heejo","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Korea University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"The Wrapper Object","year":"2016"},{"key":"ref2","volume-title":"Execution Context, Scope Chain and Javascript Internals","year":"2017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-0035-2_2"},{"key":"ref4","volume-title":"UK ICO, USCourts.gov...Thousands of Websites Hijacked by Hidden Crypto-Mining Code After Popular Plugin Pwned","year":"2018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/s1361-3723(19)30004-1"},{"key":"ref6","volume-title":"What are Primitive and Reference Types in JavaScript?","year":"2019"},{"key":"ref7","volume-title":"Alexa the Top Sites on the Web","year":"2020"},{"key":"ref8","volume-title":"Alexa the Top Sites on the Web by Category","year":"2020"},{"key":"ref9","volume-title":"Developer Survey","year":"2021"},{"key":"ref10","volume-title":"About JavaScript","year":"2022"},{"key":"ref11","volume-title":"ArcGIS API for JavaScript, Class: VectorTileLayer","year":"2022"},{"key":"ref12","volume-title":"Chrome","year":"2022"},{"key":"ref13","volume-title":"Chrome Remote Interface","year":"2022"},{"key":"ref14","volume-title":"CoinBlockerLists","year":"2022"},{"key":"ref15","volume-title":"Concurrency Model and the Event Loop","year":"2022"},{"key":"ref16","volume-title":"Dr. Mine","year":"2022"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_57569"},{"key":"ref18","volume-title":"Hls.Js","year":"2022"},{"key":"ref19","volume-title":"How JavaScriptWorks: An Overview of JavaScript Engine, Heap, and Call Stack","year":"2022"},{"key":"ref20","volume-title":"Inheritance and the Prototype Chain","year":"2022"},{"key":"ref21","volume-title":"Javascript\u2014A Prototype Based Language","year":"2022"},{"key":"ref22","volume-title":"JavaScript Engine","year":"2022"},{"key":"ref23","volume-title":"Make Your Player Yours With the World\u2019s Most Popular Open Source HTML5 Player Framework","year":"2022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-13295-7_2"},{"key":"ref25","volume-title":"MinerBlock Github","year":"2022"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/9781009181358.022"},{"key":"ref27","volume-title":"Puppeteer","year":"2022"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5040\/9781350924390.2056"},{"key":"ref29","volume-title":"Visualizing Memory Management in V8 Engine (JavaScript, NodeJS, Deno, WebAssembly)","year":"2022"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4135\/9781483330860.n2"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-3865-2_10"},{"key":"ref32","volume-title":"WebAssembly","year":"2022"},{"key":"ref33","volume-title":"What is JavaScript?","year":"2022"},{"key":"ref34","volume-title":"Window: Load Event","year":"2022"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380085"},{"key":"ref36","first-page":"1627","article-title":"Inadvertently making cyber criminals rich: A comprehensive study of cryptojacking campaigns at internet scale","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Bijmans"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00014"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243840"},{"key":"ref39","first-page":"637","article-title":"Revolver: An automated approach to the detection of evasive web-based malware","volume-title":"Proc. 22nd USENIX Secur. Symp.","author":"Kapravelos"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.14722\/madweb.2020.23002"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313665"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243858"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_2"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278539"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09878335.pdf?arnumber=9878335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T06:30:43Z","timestamp":1709361043000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9878335\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3204814","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}