{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:18:21Z","timestamp":1729642701554,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/lcn.2013.6761254","type":"proceedings-article","created":{"date-parts":[[2014,3,13]],"date-time":"2014-03-13T22:14:59Z","timestamp":1394748899000},"page":"300-303","source":"Crossref","is-referenced-by-count":0,"title":["Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand"],"prefix":"10.1109","author":[{"family":"Van Lam Le","sequence":"first","affiliation":[]},{"given":"Ian","family":"Welch","sequence":"additional","affiliation":[]},{"family":"Xiaoying Gao","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Komisarczuk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E95.B.1711"},{"year":"2012","key":"2"},{"key":"10","article-title":"Drive-by-download","author":"narvaez","year":"2008","journal-title":"Victoria Univ Wellington"},{"key":"1","article-title":"Stride: Polymorphic sled detection through instruction sequence analysis","author":"akritidis","year":"2005","journal-title":"20th IFIP International Information Security Conference"},{"key":"7","first-page":"1","article-title":"Bubble: A javascript engine level countermeasure against heap-spraying attacks","volume":"2010","author":"gadaleta","year":"0","journal-title":"Proceedings of the Second international conference on Engineering Secure Software and Systems"},{"key":"6","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/978-3-642-02918-9_6","article-title":"Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks","author":"egele","year":"2009","journal-title":"Proceedings of the 6th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment ser DIMVA '09 Berlin Heidelberg Springer"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920310"},{"key":"4","article-title":"Detection and analysis of drive-bydownload attacks and malicious javascript code","author":"cova","year":"2010","journal-title":"WWW2010"},{"journal-title":"Meatasploit Penatration testing software","year":"2012","key":"9"},{"key":"8","first-page":"2013","article-title":"Anatomy of driveby download attack","author":"le","year":"0","journal-title":"Australasian Information Security Conference 2013 (ACSW-AISC 2013"},{"key":"11","article-title":"Nozzle: A defense against heap-spraying code injection attacks","author":"ratanaworabhan","year":"2009","journal-title":"Proceedings of the 18th Conference on USENIX Security Symposium"},{"journal-title":"Capture-hpc v3 0 beta","year":"2009","author":"seifert","key":"12"}],"event":{"name":"38th Annual IEEE Conference on Local Computer Networks (LCN 2013)","start":{"date-parts":[[2013,10,21]]},"location":"Sydney, NSW","end":{"date-parts":[[2013,10,24]]}},"container-title":["38th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745315\/6761208\/06761254.pdf?arnumber=6761254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T09:34:45Z","timestamp":1498124085000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6761254\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/lcn.2013.6761254","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}