{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:33:50Z","timestamp":1725662030012},"reference-count":64,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/ase.2017.8115637","type":"proceedings-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T17:03:57Z","timestamp":1511456637000},"page":"240-251","source":"Crossref","is-referenced-by-count":2,"title":["PAD: Programming third-party web advertisement censorship"],"prefix":"10.1109","author":[{"given":"Weihang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yonghwi","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Yunhui","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yousra","family":"Aafer","sequence":"additional","affiliation":[]},{"given":"I-Luk","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Wen-Chuan","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Yingqi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Weijie","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Eugster","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2015","journal-title":"Cyphort Lab The Rise of Malvertising","key":"ref39"},{"year":"2013","journal-title":"Three Alleged International Cyber Criminals Responsible For Creating And Distributing Virus","key":"ref38"},{"year":"0","journal-title":"Readers of popular websites targeted by stealthy Stegano exploit kit hiding in pixels of malicious ads","key":"ref33"},{"year":"0","journal-title":"New wave of malvertising leverages latest Flash exploit","key":"ref32"},{"year":"0","journal-title":"Microsoft Patches CVE-2016&#x2013;3351 Zero-Day Exploited By AdGholas and GooNky Malvertising Groups","key":"ref31"},{"year":"0","journal-title":"Malvertising on Indonesian portal gopego com delivers Cryptowall 3 0","key":"ref30"},{"year":"2009","journal-title":"Anatomy of a Malware Ad on NYTimes com","key":"ref37"},{"year":"0","journal-title":"The Wild Wild Web YouTube ads serving malware","key":"ref36"},{"year":"0","journal-title":"Security Referer chain breaking by abusing src-less iframe body context","key":"ref35"},{"year":"0","journal-title":"Recent example of KaiXin exploit kit","key":"ref34"},{"key":"ref60","first-page":"215","author":"poornachandran","year":"2017","journal-title":"Demalvertising A Kernel Approach for Detecting Malwares in Advertising Networks"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1145\/2950290.2950352"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1145\/2508859.2516682"},{"doi-asserted-by":"publisher","key":"ref63","DOI":"10.1145\/2736277.2741630"},{"year":"0","journal-title":"DDoS Attacks - A new twist in Malvertisements","key":"ref28"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.1145\/2663716.2663719"},{"year":"0","journal-title":"CVE-2016&#x2013;7201 Type confusion in FillFromPrototypes in Chakra","key":"ref27"},{"year":"0","journal-title":"Malvertisement on FileServe delivers Password Stealer via Exploits","key":"ref29"},{"year":"0","journal-title":"2014&#x2013;06-28 - SWEET ORANGE EK FROM 94 185 80 43 PORT 8590","key":"ref2"},{"year":"0","journal-title":"2014&#x2013;06-19 - NUCLEAR EK FROM 5 135 28 118","key":"ref1"},{"year":"0","journal-title":"CVE-2015&#x2013;5560 Integer overflow in mp3 ID3 tag in Flash Player","key":"ref20"},{"year":"0","journal-title":"CVE-2016&#x2013;0162 An information-disclosure vulnerability in IE","key":"ref22"},{"year":"0","journal-title":"CVE-2015&#x2013;8651 Integer overflow in domainMemory in Flash Player","key":"ref21"},{"year":"0","journal-title":"CVE-2016&#x2013;4117 Out-of-bound read in DeleteRangeTimelineOperation in Flash","key":"ref24"},{"year":"0","journal-title":"CVE-2016&#x2013;1019 Type confusion in FileReference class's type checking in Flash","key":"ref23"},{"year":"0","journal-title":"CVE-2016&#x2013;7200 Info leak in Array filter in Chakra JavaScript engine","key":"ref26"},{"year":"0","journal-title":"CVE-2016&#x2013;7200 CVE-2016-7201 (Edge) and Exploit Kits","key":"ref25"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1109\/ACSAC.2009.41"},{"key":"ref51","first-page":"171","article-title":"Fine-Grained Role- and Attribute-Based Access Control for Web Applications","author":"ghotbi","year":"2012","journal-title":"The International Conference on Software and Data Technologies - ICSOFT"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1145\/1882362.1882413"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1109\/INFOCOM.2014.6848047"},{"key":"ref57","first-page":"24","article-title":"Adjail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements","author":"louw","year":"2010","journal-title":"Proceedings of the 19th USENIX Conference on Security Ser USENIX Security'10"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1145\/2382196.2382267"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1145\/2336717.2336720"},{"key":"ref54","article-title":"What Aspects of Mobile Ads Do Users Care About? An Empirical Study of Mobile In-app Ad Reviews","author":"gui","year":"2017","journal-title":"arXiv 1702 07681"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1109\/ICSE.2015.32"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1509\/jmr.13.0439"},{"year":"0","journal-title":"2016&#x2013;07-25 - MAGNITUDE EK FROM 51 254 181 39 SENDS CERBER RANSOMWARE","key":"ref10"},{"year":"0","journal-title":"2016&#x2013;07-25 - MAGNITUDE EK FROM 51 254 181 39 SENDS CERBER RANSOMWARE","key":"ref11"},{"year":"2016","journal-title":"Eset Research Readers of popular websites targeted by stealthy Stegano exploit kit hiding in pixels of malicious ads","key":"ref40"},{"year":"0","journal-title":"3 000 High-Profile Japanese Sites Hit By Massive Malvertising Campaign","key":"ref12"},{"year":"0","journal-title":"A Different Exploit Angle on Adobe's Recent Zero-Day","key":"ref13"},{"year":"0","journal-title":"Angler Exploit kit breaks Referer chain using HTTPS to HTTP redirection","key":"ref14"},{"year":"0","journal-title":"CVE-2013&#x2013;2551 Buffer overflow in the Pixel Bender parser in Flash Player","key":"ref15"},{"year":"0","journal-title":"CVE-2014&#x2013;0322 An use-after-free vulnerability in IE","key":"ref16"},{"year":"0","journal-title":"CVE-2014&#x2013;0515 Use-after-free involving the CMarkup object in IE","key":"ref17"},{"year":"0","journal-title":"CVE-2014&#x2013;0569 Interger Overflow in Sound toString() in Flash Player","key":"ref18"},{"year":"0","journal-title":"CVE-2015&#x2013;2419 Double-free in jscript9's JSON APIs","key":"ref19"},{"year":"0","journal-title":"2014&#x2013;08-22 - NUCLEAR EK FROM 87 117 255 66","key":"ref4"},{"year":"0","journal-title":"2014&#x2013;08-15 - NUCLEAR EK FROM 178 32 92 105","key":"ref3"},{"year":"0","journal-title":"2014&#x2013;09-11 - SWEET ORANGE EK FROM 87 118 126 94","key":"ref6"},{"year":"0","journal-title":"2014&#x2013;09-05 - SWEET ORANGE EK FROM 8 28 175 69","key":"ref5"},{"year":"0","journal-title":"2014&#x2013;10-06 - Sweet Orange EK","key":"ref8"},{"year":"0","journal-title":"2014&#x2013;09-29 - NUCLEAR EK Delivers Digitally-signed Cryptowall Malware","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1145\/2076732.2076774"},{"year":"0","journal-title":"2014&#x2013;11-11 - ANGLER EK USES DIFFERENT OBFUSCATION FOR THE MALWARE PAYLOAD","key":"ref9"},{"year":"2016","author":"zorz","journal-title":"Malvertising campaign hits MSN com NY Times BBC AOL","key":"ref46"},{"year":"2016","journal-title":"Usage of Advertising Networks for Websites","article-title":"W3Techs Web Technology Surveys","key":"ref45"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1007\/978-3-642-05408-2_32"},{"year":"2017","journal-title":"2017 Global Adblock Report","article-title":"PageFair","key":"ref47"},{"year":"2016","journal-title":"Massive AdGholas malvertising campaigns use Steganography and file whitelisting to hide in plain sight","key":"ref42"},{"year":"2016","journal-title":"Mimi An Why People Block Ads And What It Means for Marketers and Advertisers","key":"ref41"},{"year":"2016","journal-title":"2015 Internet Advertising Revenue Full-Year Report","article-title":"The Interactive Advertising Bureau (IAB)","key":"ref44"},{"year":"2016","journal-title":"The Guardian Major sites including New York Times and BBC hit by &#x2018;ransomware&#x2019; malvertising","key":"ref43"}],"event":{"name":"2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)","start":{"date-parts":[[2017,10,30]]},"location":"Urbana, IL","end":{"date-parts":[[2017,11,3]]}},"container-title":["2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8106906\/8115603\/08115637.pdf?arnumber=8115637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T17:47:25Z","timestamp":1515433645000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8115637\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/ase.2017.8115637","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}