{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:45:07Z","timestamp":1725623107384},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/infcom.2011.5935193","type":"proceedings-article","created":{"date-parts":[[2011,7,7]],"date-time":"2011-07-07T14:59:10Z","timestamp":1310050750000},"page":"411-415","source":"Crossref","is-referenced-by-count":9,"title":["Peering through the iframe"],"prefix":"10.1109","author":[{"given":"Brett","family":"Stone-Gross","sequence":"first","affiliation":[]},{"given":"Marco","family":"Cova","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware","author":"polychronakis","year":"2008","journal-title":"Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats"},{"key":"ref11","article-title":"All Your iFRAMEs Point to Us","author":"provos","year":"2008","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref12","article-title":"The Ghost in the Browser: Analysis of Web-based Malware","author":"provos","year":"2007","journal-title":"Proc Of the 1st USENIX Workshop on Hot Topics in Understanding Botnet(HotBots'07)"},{"key":"ref13","article-title":"Nozzle: A Defense Against Heap-spraying Code Injection Attacks","author":"ratanaworabhan","year":"2009","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"ref15","article-title":"Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities","author":"wang","year":"2006","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref4","article-title":"Why Silent Updates Boost Security","author":"duebendorfer","year":"2009","journal-title":"Technical Report"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"journal-title":"Analysis of Sinowal","year":"2008","author":"kleissner","key":"ref6"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-02918-9_6","article-title":"Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks","author":"egele","year":"2009","journal-title":"Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)"},{"journal-title":"Security Development Lifecycle (SDL)","year":"2009","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"year":"0","key":"ref2","article-title":"URLclassifier-Classify a Web Page Using Advanced Semantic Analysis"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455782"},{"journal-title":"Netscape","article-title":"ODP-Open Directory Project","year":"0","key":"ref9"}],"event":{"name":"IEEE INFOCOM 2011 - IEEE Conference on Computer Communications","start":{"date-parts":[[2011,4,10]]},"location":"Shanghai, China","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5888673\/5934870\/05935193.pdf?arnumber=5935193","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T02:56:13Z","timestamp":1497927373000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5935193\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/infcom.2011.5935193","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}