{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T05:12:20Z","timestamp":1723698740741},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/malware.2011.6112320","type":"proceedings-article","created":{"date-parts":[[2011,12,29]],"date-time":"2011-12-29T21:04:25Z","timestamp":1325192665000},"source":"Crossref","is-referenced-by-count":15,"title":["Multiprocess malware"],"prefix":"10.1109","author":[{"given":"Marco","family":"Ramilli","sequence":"first","affiliation":[]},{"given":"Matt","family":"Bishop","sequence":"additional","affiliation":[]},{"given":"Shining","family":"Sun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366187"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665788"},{"key":"14","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1145\/1315245.1315313","article-title":"The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)","author":"shacham","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Securityecurity CCS'07"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920269"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1174909"},{"key":"3","year":"2009","journal-title":"Source Code of Computer Viruses Bullmoose"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413151"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179578"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1179542.1179554"},{"key":"7","first-page":"8","article-title":"Dichotomy: Double trouble","author":"kaspersky","year":"1994","journal-title":"Virus Bulletin"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36307"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2002.1039705"},{"key":"4","author":"cui","year":"2006","journal-title":"GQ Realizing a system to catch worms in a quarter million places"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(95)00012-W"},{"key":"8","first-page":"8","article-title":"RMNS - The perfect couple","author":"kaspersky","year":"1995","journal-title":"Virus Bulletin"}],"event":{"name":"2011 6th International Conference on Malicious and Unwanted Software (MALWARE)","location":"Fajardo, PR, USA","start":{"date-parts":[[2011,10,18]]},"end":{"date-parts":[[2011,10,19]]}},"container-title":["2011 6th International Conference on Malicious and Unwanted Software"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6104282\/6112317\/06112320.pdf?arnumber=6112320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T12:02:18Z","timestamp":1497960138000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6112320\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/malware.2011.6112320","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}