{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T13:32:51Z","timestamp":1747747971496},"reference-count":5,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/malware.2014.6999416","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:44:39Z","timestamp":1421703879000},"page":"26-31","source":"Crossref","is-referenced-by-count":7,"title":["Protection against remote code execution exploits of popular applications in Windows"],"prefix":"10.1109","author":[{"given":"Jeffrey","family":"Wu","sequence":"first","affiliation":[]},{"given":"Anthony","family":"Arrott","sequence":"additional","affiliation":[]},{"given":"Fernando C.","family":"Colon Osorio","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"China Internet Network Information Center (CNNIC) Statistical Report on Internet Development in China","year":"2012","key":"3"},{"journal-title":"Security Solution Review on Windows 8 Platform","year":"2013","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2013.6703682"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2013.6703695"},{"journal-title":"Metasploit Toolkit for Penetration Testing Exploit Development and Vulnerability Research","year":"2011","author":"david","key":"4"}],"event":{"name":"2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)","start":{"date-parts":[[2014,10,28]]},"location":"Fajardo, PR","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6987537\/6999400\/06999416.pdf?arnumber=6999416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T14:00:47Z","timestamp":1603288847000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6999416\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/malware.2014.6999416","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}