{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:32:00Z","timestamp":1761129120540},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/malware.2013.6703694","type":"proceedings-article","created":{"date-parts":[[2014,1,10]],"date-time":"2014-01-10T20:05:37Z","timestamp":1389384337000},"page":"124-131","source":"Crossref","is-referenced-by-count":1,"title":["A simple client-side defense against environment-dependent web-based malware"],"prefix":"10.1109","author":[{"given":"Gen","family":"Lu","sequence":"first","affiliation":[]},{"given":"Karan","family":"Chadha","sequence":"additional","affiliation":[]},{"given":"Saumya","family":"Debray","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920267"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.38"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.17"},{"key":"16","first-page":"169","article-title":"Nozzle: A defense against heap-spraying code injection attacks","author":"ratanaworabhan","year":"2009","journal-title":"Proceedings of the 18th Conference on USENIX Security Symposium"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39235-1_8"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.48"},{"key":"12","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/978-3-642-23644-0_18","article-title":"Detecting environment-sensitive malware","author":"lindorfer","year":"2011","journal-title":"Proc 14th International Symposium on Recent Advances in Intrusion Detection (RAID)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68768-1_4"},{"key":"2","article-title":"Efficient detection of split personalities in malware","author":"balzarotti","year":"2010","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93576"},{"key":"10","first-page":"191","article-title":"Secure execution via program shepherding","author":"kiriansky","year":"2002","journal-title":"Proc 11th USENIX Security Symposium"},{"key":"7","article-title":"Zozzle: Fast and precise in-browser javascript malware detection","author":"curtsinger","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168862"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963436"},{"key":"9","article-title":"Malware with your mocha: Obfuscation and anti emulation tricks in malicious javascript","author":"howard","year":"2010","journal-title":"Sophos Technical Papers"},{"key":"8","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/978-3-642-02918-9_6","article-title":"Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks","author":"egele","year":"2009","journal-title":"Proc 6th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment"}],"event":{"name":"2013 8th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","start":{"date-parts":[[2013,10,22]]},"location":"Fajardo, PR, USA","end":{"date-parts":[[2013,10,24]]}},"container-title":["2013 8th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6693154\/6703677\/06703694.pdf?arnumber=6703694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:50:23Z","timestamp":1498110623000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6703694\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/malware.2013.6703694","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}