{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T13:14:37Z","timestamp":1723036477440},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/cts.2013.6567221","type":"proceedings-article","created":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T20:13:02Z","timestamp":1375387982000},"source":"Crossref","is-referenced-by-count":14,"title":["Mobile malware visual analytics and similarities of Attack Toolkits (Malware gene analysis)"],"prefix":"10.1109","author":[{"given":"Anand","family":"Paturi","sequence":"first","affiliation":[]},{"given":"Manoj","family":"Cherukuri","sequence":"additional","affiliation":[]},{"given":"John","family":"Donahue","sequence":"additional","affiliation":[]},{"given":"Srinivas","family":"Mukkamala","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","year":"0"},{"key":"14","author":"pouik","year":"2012","journal-title":"Similarities for Fun & Profit Phrack Issue#68"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1145\/1920261.1920305","article-title":"Comprehensive shellcode detection using runtime heuristics","author":"polychronakis","year":"2010","journal-title":"Annual Computer Security Applications Conference (ACSAC)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_4"},{"key":"3","author":"jiang","year":"2012","journal-title":"An Evaluation of the Application (\"App\") Verification Service in Android 4 2 (JellyBean)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"1","author":"saita","year":"2012","journal-title":"Mobile Malware Is Up-Way Up-in McAfee Q2 Threat Report"},{"key":"10","year":"2011","journal-title":"Symantec Report on Attack Kit and Malicious Websites"},{"key":"7","author":"kolbitsch","year":"2011","journal-title":"Rozzle De-cloaking Internet Malware"},{"key":"6","article-title":"The ghost in the browser analysis of web-based malware","author":"provos","year":"2007","journal-title":"First workshop on hot topics in understanding botnets"},{"key":"5","article-title":"Juxtapp: A scalable system fordetecting code reuse among android applications","author":"hanna","year":"0","journal-title":"Proceedings of the 9th Conferenceon Detection of Intrusions and Malware & Vulnerability Assessment DIMVA'12"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"9","article-title":"All your iframes point to us","author":"provos","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"8","article-title":"Ghost turns zombie: Exploring the life cycle of web-based malware","author":"polychronakis","year":"2008","journal-title":"First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)"}],"event":{"name":"2013 International Conference on Collaboration Technologies and Systems (CTS)","location":"San Diego, CA, USA","start":{"date-parts":[[2013,5,20]]},"end":{"date-parts":[[2013,5,24]]}},"container-title":["2013 International Conference on Collaboration Technologies and Systems (CTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6558543\/6567186\/06567221.pdf?arnumber=6567221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T20:05:28Z","timestamp":1646251528000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6567221\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cts.2013.6567221","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}