{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:25Z","timestamp":1773511225070,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/pst.2012.6297926","type":"proceedings-article","created":{"date-parts":[[2012,9,17]],"date-time":"2012-09-17T20:45:25Z","timestamp":1347914725000},"page":"104-111","source":"Crossref","is-referenced-by-count":31,"title":["PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents"],"prefix":"10.1109","author":[{"given":"Florian","family":"Schmitt","sequence":"first","affiliation":[]},{"given":"Jan","family":"Gassen","sequence":"additional","affiliation":[]},{"given":"Elmar","family":"Gerhards-Padilla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0","journal-title":"\"Rhino JavaScript for Java \" [Online]"},{"key":"17","author":"laskov","year":"2011","journal-title":"Static Detection of Malicious JavaScriptbearing PDF Documents"},{"key":"18","year":"0","journal-title":"Apache PDFBox - Java PDF Library"},{"key":"15","author":"cova","year":"2010","journal-title":"Detection and Analysis of Drive-by-download Attacks and Malicious JavaScript Code"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972555"},{"key":"13","author":"delugre?","year":"2010","journal-title":"An Approach to PDF Shielding"},{"key":"14","year":"0","journal-title":"\"Wepawet \" [Online]"},{"key":"11","author":"zeltser","year":"2011","journal-title":"How to Extract Flash Objects from Malicious PDF Files"},{"key":"12","author":"porst","year":"2010","journal-title":"A Brief Analysis of A Malicious PDF File Which Exploits This Weeks Flash 0-day"},{"key":"21","author":"parkour","year":"2011","journal-title":"Version 4 April 2011 - 11 355+ Malicious Documents - Archive for Signature Testing and Research"},{"key":"3","year":"2011","journal-title":"Targeted Attacks on Arms Manufacturers Continue"},{"key":"20","author":"baecher","year":"0","journal-title":"\"Libemu - X86 Shellcode Emulation \" [Online]"},{"key":"2","author":"hypponen","year":"2011","journal-title":"Military Targets"},{"key":"1","author":"selvaraj","year":"2010","journal-title":"The Rise of PDF Malware"},{"key":"10","author":"sotirov","year":"2007","journal-title":"Heap Feng Shui in JavaScript"},{"key":"7","author":"sutton","year":"2011","journal-title":"State of the Web - Quarter 2 2011 Report"},{"key":"6","year":"2011","journal-title":"Six out of Every Ten Users Run Vulnerable Versions of Adobe Reader"},{"key":"5","author":"balunsat","year":"2011","journal-title":"How PDF Files Hide Malware Example PDF Scan from Xerox"},{"key":"4","author":"baccas","year":"2011","journal-title":"Who Ordered Spam? New Trick in PDF Malware Uncovered"},{"key":"9","year":"2008","journal-title":"ISO 32000-1 200 Document Management - Portable Document Format - Part 1 PDF 1 7"},{"key":"8","author":"johnson","year":"2007","journal-title":"PDF in Government"}],"event":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)","location":"Paris, France","start":{"date-parts":[[2012,7,16]]},"end":{"date-parts":[[2012,7,18]]}},"container-title":["2012 Tenth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6287257\/6297910\/06297926.pdf?arnumber=6297926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:12:51Z","timestamp":1490141571000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6297926\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/pst.2012.6297926","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}