{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T05:04:59Z","timestamp":1735448699707,"version":"3.32.0"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1109\/wifs61860.2024.10810677","type":"proceedings-article","created":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T19:10:25Z","timestamp":1735326625000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Demo - Unmasking the Unseen: CryptojackingTrap, the Most Resilient Evasion-Proof Cryptojacking Malware Detection Algorithm"],"prefix":"10.1109","author":[{"given":"Atefeh Zareh","family":"Chahoki","sequence":"first","affiliation":[{"name":"University of Trento,Inf. Eng. and Computer Science Dept.,Trento,Italy"}]},{"given":"Hamid Reza","family":"Shahriari","sequence":"additional","affiliation":[{"name":"Amirkabir University of Technology,Computer Engineering Dept.,Tehran,Iran"}]},{"given":"Marco","family":"Roveri","sequence":"additional","affiliation":[{"name":"University of Trento,Inf. Eng. and Computer Science Dept.,Trento,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2018.8546867"},{"year":"2023","key":"ref2","article-title":"Pin - a dynamic binary instrumentation tool"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3353072"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/icict50521.2020.00068"},{"year":"2017","key":"ref6","article-title":"XMRig"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3379310.3379323"},{"year":"2023","key":"ref8","article-title":"Smart multicurrency mining pool & 1-click GUI miner"},{"year":"2011","key":"ref9","article-title":"pooler\/cpuminer"}],"event":{"name":"2024 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2024,12,2]]},"location":"Rome, Italy","end":{"date-parts":[[2024,12,5]]}},"container-title":["2024 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10810660\/10810670\/10810677.pdf?arnumber=10810677","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T06:08:12Z","timestamp":1735366092000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10810677\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/wifs61860.2024.10810677","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]}}}