{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T06:30:15Z","timestamp":1769927415796,"version":"3.49.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,26]]},"DOI":"10.1109\/csr51186.2021.9527960","type":"proceedings-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T17:35:06Z","timestamp":1630949706000},"page":"121-128","source":"Crossref","is-referenced-by-count":15,"title":["Understanding and Mitigating Banking Trojans: From Zeus to Emotet"],"prefix":"10.1109","author":[{"given":"Konstantinos P.","family":"Grammatikakis","sequence":"first","affiliation":[]},{"given":"Ioannis","family":"Koufos","sequence":"additional","affiliation":[]},{"given":"Nicholas","family":"Kolokotronis","sequence":"additional","affiliation":[]},{"given":"Costas","family":"Vassilakis","sequence":"additional","affiliation":[]},{"given":"Stavros","family":"Shiaeles","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","first-page":"113","article-title":"MulVAL: A logic-based network security analyzer","volume":"8","author":"ou","year":"2005","journal-title":"USENIX Security Symposium"},{"key":"ref33","article-title":"ZeuS source code leaked, now what?","author":"paz","year":"2011","journal-title":"Trends in Microbiology"},{"key":"ref32","article-title":"Analysing the fall 2020 Emotet campaign","author":"patsakis","year":"2020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(19)30071-6"},{"key":"ref30","article-title":"Malware analysis: decoding Emotet, part 1","author":"thakur","year":"2018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1201\/9781003006145-8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409312"},{"key":"ref35","article-title":"ZertSecurity","author":"rogers","year":"2013","journal-title":"Lookout"},{"key":"ref34","article-title":"Dissection of Zertsecurity &#x2013; banking trojan","author":"gandhi","year":"2013"},{"key":"ref10","article-title":"Zeus: King of the bots","author":"falliere","year":"2009","journal-title":"Symantec Security Response"},{"key":"ref11","article-title":"ZeuS-in-the-Mobile &#x2013; facts and theories","author":"maslennikov","year":"2011"},{"key":"ref12","article-title":"On the effectiveness of malware protection on android","volume":"45","author":"fedler","year":"0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.12.006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2819967"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(09)70005-4"},{"key":"ref16","article-title":"What is Zeus?","author":"wyke","year":"2011","journal-title":"SOPHOS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.023"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2013.6703693"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"ref4","article-title":"VB2019 paper: Exploring emotet, an elaborate everyday enigma","author":"nagy","year":"2019","journal-title":"Virus Bulletin"},{"key":"ref27","article-title":"Dynamic analysis of Android malware","author":"van der veen","year":"2013","journal-title":"Master&#x2019;s thesis"},{"key":"ref3","article-title":"Internet organised crime threat assessment (IOCTA 2020)","year":"2020"},{"key":"ref6","article-title":"More than 100 arrests, as FBI uncovers cyber crime ring","year":"2010"},{"key":"ref29","article-title":"New banking malware uses network sniffing for data theft","author":"salvio","year":"2014","journal-title":"Trends in Microbiology"},{"key":"ref5","article-title":"Reverse engineering Emotet &#x2013; our approach to protect GRNET against the trojan","author":"kolotouros","year":"2021","journal-title":"GRNET CERT"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.535"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593240"},{"key":"ref2","article-title":"ENISA threat landscape 2020 &#x2013; malware","author":"louren\u00e7o","year":"2020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890933"},{"key":"ref1","article-title":"World&#x2019;s most dangerous malware EMOTET disrupted through global action","year":"2021"},{"key":"ref20","article-title":"An analysis of the zeus peer-to-peer protocol","author":"andriesse","year":"2014"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/2714576.2714579","article-title":"An Empirical Analysis of ZeuS C&C Lifetime","author":"ga\u00f1\u00e1n","year":"2015","journal-title":"Proc of the 10th ACM Symp on Information Computer and Communications Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2014.14"},{"key":"ref24","article-title":"New ZitMo for Android and Blackberry","author":"maslennikov","year":"2012"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2016.7888738"},{"key":"ref26","article-title":"Android security suite premium = new ZitMo","author":"maslennikov","year":"2012"},{"key":"ref25","first-page":"4","article-title":"Defeating mTANs for profit &#x2013; part one","volume":"7","author":"apvrille","year":"2011","journal-title":"Virus Bulletin"}],"event":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Rhodes, Greece","start":{"date-parts":[[2021,7,26]]},"end":{"date-parts":[[2021,7,28]]}},"container-title":["2021 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9527731\/9527900\/09527960.pdf?arnumber=9527960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:45:44Z","timestamp":1652183144000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527960\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,26]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/csr51186.2021.9527960","relation":{},"subject":[],"published":{"date-parts":[[2021,7,26]]}}}