{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T07:16:48Z","timestamp":1761981408213,"version":"build-2065373602"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icics.2013.6782846","type":"proceedings-article","created":{"date-parts":[[2014,4,16]],"date-time":"2014-04-16T21:22:05Z","timestamp":1397683325000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["Take a bite - Finding the worm in the Apple"],"prefix":"10.1109","author":[{"given":"Martina","family":"Lindorfer","sequence":"first","affiliation":[]},{"given":"Bernhard","family":"Miller","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Neugschwandtner","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Platzer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Malware Patrol","year":"0","key":"19"},{"key":"17","article-title":"Client honeypots: Approaches and challenges","author":"qassrawi","year":"2010","journal-title":"International Conference on New Trends in Information Science and Service Science (NISS)"},{"journal-title":"Malware Domain List","year":"0","key":"18"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-23644-0_18","article-title":"Detecting environment-sensitive malware","author":"lindorfer","year":"2011","journal-title":"International Symposium on Recent Advances in Intrusion Detection (RAID)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.15"},{"key":"14","article-title":"Automatic generation of remediation procedures for malware infections","author":"paleari","year":"2010","journal-title":"USENIX Security Symposium"},{"key":"11","article-title":"FIRE: Finding roguen etworks","author":"stone-gross","year":"2009","journal-title":"Annual Computer Security Applications Conference (ACSAC)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314399"},{"journal-title":"Dynamic Tracing in Oracle Solaris Mac OS X and FreeBSD","year":"2011","author":"gregg","key":"21"},{"journal-title":"CLEAN MX","year":"0","key":"20"},{"journal-title":"Fixing Ptrace(pt Deny Attach ) on Mac OS X 10 5 Leopard","year":"2008","author":"fuller","key":"22"},{"journal-title":"Metasploit","year":"0","key":"23"},{"year":"0","key":"24"},{"journal-title":"OSX\/Lamadai A The Mac Payload","year":"2012","author":"dorais-joncas","key":"25"},{"journal-title":"Microsoft Malware Protection Center","year":"2012","key":"26"},{"journal-title":"New Flashback Variant Continues Java Attack","year":"2012","author":"james","key":"27"},{"journal-title":"VirusTotal","year":"0","key":"28"},{"journal-title":"DynDNS","year":"0","key":"29"},{"journal-title":"OS Statistics","year":"0","key":"3"},{"journal-title":"Windows Has Fallen behind Apple IOS and Google Android","year":"2012","author":"vaughan-nichols","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.78"},{"journal-title":"Anubis","year":"0","key":"30"},{"year":"0","key":"7"},{"journal-title":"Latest Mac Malware Adds to 'Troubling Trend Says Security Expert","year":"2012","author":"whittaker","key":"6"},{"journal-title":"Apple '10 Years' behind Microsoft on Security Kaspersky","year":"2012","author":"evans","key":"5"},{"journal-title":"MacDefender Malware A Sign of the Macpocalypse","year":"2011","author":"bradley","key":"4"},{"journal-title":"OSX\/Flashback","year":"2012","author":"le?veille?","key":"9"},{"key":"8","article-title":"The anatomy of Flashfake. Part 1","author":"gostev","year":"2012","journal-title":"The Anatomy of Flashfake Part 1"}],"event":{"name":"2013 9th International Conference on Information, Communications & Signal Processing (ICICS)","start":{"date-parts":[[2013,12,10]]},"location":"Tainan, Taiwan","end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 9th International Conference on Information, Communications &amp; Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6777690\/6782769\/06782846.pdf?arnumber=6782846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T11:43:21Z","timestamp":1498131801000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6782846\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icics.2013.6782846","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}