{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T04:42:27Z","timestamp":1772772147629,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/cns.2018.8433199","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T22:09:06Z","timestamp":1534198146000},"page":"1-9","source":"Crossref","is-referenced-by-count":31,"title":["Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware"],"prefix":"10.1109","author":[{"given":"Stijn","family":"Pletinckx","sequence":"first","affiliation":[]},{"given":"Cyril","family":"Trap","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Doerr","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Analysis of the storm and nugache trojans: P2p is here","author":"stover","year":"2007","journal-title":"USENIX login"},{"key":"ref11","article-title":"Flashback botnet updated to include twitter as c&c","author":"prince","year":"2012","journal-title":"Security"},{"key":"ref12","article-title":"Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs","author":"mccoy","year":"2012","journal-title":"Usenix Security"},{"key":"ref13","author":"jain","year":"2017","journal-title":"The evolution of cerber ransomware"},{"key":"ref14","author":"cimpanu","year":"2017","journal-title":"Cerber ransomware version 6 gets anti-vm and antisandboxing features"},{"key":"ref15","author":"unuchek","year":"2017","journal-title":"A new era in mobile banking trojans"},{"key":"ref16","year":"0","journal-title":"Cerber configuration option file"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2579359"},{"key":"ref3","article-title":"From throw-away traffic to bots: detecting the rise of dga-based malware","author":"antonakakis","year":"2012","journal-title":"Usenix Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.198"},{"key":"ref5","year":"2006","journal-title":"W32\/sality m"},{"key":"ref8","article-title":"A comprehensive measurement study of domain generating malware","author":"plohmann","year":"2016","journal-title":"Usenix Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3107008"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879148"},{"key":"ref9","article-title":"Peerto-peer botnets: Overview and case study","author":"grizzard","year":"2007","journal-title":"First workshp on Hot Topics in Understanding Botnets"}],"event":{"name":"2018 IEEE Conference on Communications and Network Security (CNS)","location":"Beijing","start":{"date-parts":[[2018,5,30]]},"end":{"date-parts":[[2018,6,1]]}},"container-title":["2018 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410986\/8433121\/08433199.pdf?arnumber=8433199","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T02:55:02Z","timestamp":1561085702000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8433199\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cns.2018.8433199","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}