{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T16:34:13Z","timestamp":1751387653195,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,9,8]],"date-time":"2009-09-08T00:00:00Z","timestamp":1252368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,9,8]]},"DOI":"10.1145\/1719030.1719033","type":"proceedings-article","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T13:16:50Z","timestamp":1282655810000},"page":"11-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Server-side detection of malware infection"],"prefix":"10.1145","author":[{"given":"Markus","family":"Jakobsson","sequence":"first","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, CA"}]},{"given":"Ari","family":"Juels","sequence":"additional","affiliation":[{"name":"RSA Laboratories, Cambridge, MA"}]}],"member":"320","published-online":{"date-parts":[[2009,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The Australian Internet Security Initiative. www.acma.gov.au\/WEB\/STANDARD\/pc=PC_310317.  The Australian Internet Security Initiative. www.acma.gov.au\/WEB\/STANDARD\/pc=PC_310317."},{"key":"e_1_3_2_1_2_1","volume-title":"A Practical Approach to Managing Phishing","author":"Barrett M.","year":"2008","unstructured":"M. Barrett and D. Levy , \" A Practical Approach to Managing Phishing ,\" April 2008 . M. Barrett and D. Levy, \"A Practical Approach to Managing Phishing,\" April 2008."},{"key":"e_1_3_2_1_3_1","unstructured":"M. Barrett \"Cybercrime -- and What We will Have to do if We Want to Get it Under Control \" July 2008. publius. cc\/cybercrime_and_what_we_will_have_do_if_we_want_get_it_under_control.pdf.  M. Barrett \"Cybercrime -- and What We will Have to do if We Want to Get it Under Control \" July 2008. publius. cc\/cybercrime_and_what_we_will_have_do_if_we_want_get_it_under_control.pdf."},{"key":"e_1_3_2_1_4_1","unstructured":"Michael Barrett PayPal CSO personal communication.  Michael Barrett PayPal CSO personal communication."},{"key":"e_1_3_2_1_5_1","volume-title":"Keying Hash Functions for Message Authentication,\" Advances in Cryptology - Crypto 96 Proceedings","author":"Bellare M.","year":"1996","unstructured":"M. Bellare , R. Canetti and H. Krawczyk , \" Keying Hash Functions for Message Authentication,\" Advances in Cryptology - Crypto 96 Proceedings , 1996 . M. Bellare, R. Canetti and H. Krawczyk, \"Keying Hash Functions for Message Authentication,\" Advances in Cryptology - Crypto 96 Proceedings, 1996."},{"key":"e_1_3_2_1_6_1","first-page":"431","article-title":"A Forward-Secure Digital Signature Scheme","author":"Bellare M.","year":"1999","unstructured":"M. Bellare and S. K. Miner , \" A Forward-Secure Digital Signature Scheme ,\" Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology , p. 431 -- 448 , 1999 . M. Bellare and S. K. Miner, \"A Forward-Secure Digital Signature Scheme,\" Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, p.431--448, 1999.","journal-title":"Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology"},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"Forward-Security in Private-Key Cryptography","volume":"03","author":"Bellare M.","year":"2003","unstructured":"M. Bellare and B. Yee , \" Forward-Security in Private-Key Cryptography ,\" Topics in Cryptology - CT-RSA 03 , pp. 1 -- 18 , 2003 . M. Bellare and B. Yee, \"Forward-Security in Private-Key Cryptography,\" Topics in Cryptology - CT-RSA 03, pp. 1--18, 2003.","journal-title":"Topics in Cryptology - CT-RSA"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889663_9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2006.46"},{"key":"e_1_3_2_1_11_1","volume-title":"DOI 10.1007\/s12117-008-9038-9","author":"Choo K.-K. R.","year":"2008","unstructured":"K.-K. R. Choo , \"Organised crime groups in cyberspace : a typology,\" Trends in Organized Crime , DOI 10.1007\/s12117-008-9038-9 , 2008 . K.-K. R. Choo, \"Organised crime groups in cyberspace: a typology,\" Trends in Organized Crime, DOI 10.1007\/s12117-008-9038-9, 2008."},{"key":"e_1_3_2_1_12_1","first-page":"500","volume-title":"How To Forget a Secret,\" In STACS. LNCS 1563","author":"Di Crescenzo G.","year":"1999","unstructured":"G. Di Crescenzo , N. Ferguson , R. Impagliazzo , and M. Jakobsson , \" How To Forget a Secret,\" In STACS. LNCS 1563 . Springer-Verlag , pp. 500 -- 509 , 1999 . G. Di Crescenzo, N. Ferguson, R. Impagliazzo, and M. Jakobsson, \"How To Forget a Secret,\" In STACS. LNCS 1563. Springer-Verlag, pp. 500--509, 1999."},{"key":"e_1_3_2_1_14_1","volume-title":"Mitigating Drive-by Download Attacks: Challenges and Open Problems. In iNetSec","author":"Egele M.","year":"2009","unstructured":"M. Egele , E. Kirda , and C. Kruegel . Mitigating Drive-by Download Attacks: Challenges and Open Problems. In iNetSec , 2009 . M. Egele, E. Kirda, and C. Kruegel. Mitigating Drive-by Download Attacks: Challenges and Open Problems. In iNetSec, 2009."},{"key":"e_1_3_2_1_15_1","volume-title":"Mitigating Drive-by Download Attacks: Challenges and Open Problems. In iNetSec","author":"Egele M.","year":"2009","unstructured":"M. Egele , E. Kirda , and C. Kruegel . Mitigating Drive-by Download Attacks: Challenges and Open Problems. In iNetSec , 2009 . M. Egele, E. Kirda, and C. Kruegel. Mitigating Drive-by Download Attacks: Challenges and Open Problems. In iNetSec, 2009."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"e_1_3_2_1_17_1","unstructured":"Harris Interactive Public Relations Research \"A Study about Mobile Device Users \" June 2009. Abstract available at www.cloudmark.com\/en\/company\/mobile-survey.html full version at www.cloudmark.com\/releases\/docs\/harris_poll_stats.pdf.  Harris Interactive Public Relations Research \"A Study about Mobile Device Users \" June 2009. Abstract available at www.cloudmark.com\/en\/company\/mobile-survey.html full version at www.cloudmark.com\/releases\/docs\/harris_poll_stats.pdf."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1174658"},{"key":"e_1_3_2_1_19_1","unstructured":"G. Hughes and T. Coughlin \"Tutorial on Disk Drive Data Sanitization \" cmrr.ucsd.edu\/people\/Hughes\/DataSanitizationTutorial.pdf.  G. Hughes and T. Coughlin \"Tutorial on Disk Drive Data Sanitization \" cmrr.ucsd.edu\/people\/Hughes\/DataSanitizationTutorial.pdf."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1106-70"},{"key":"e_1_3_2_1_21_1","unstructured":"M. Jakobsson \"A Central Nervous System for Automatically Detecting Malware \" blogs.parc.com\/blog\/2009\/09\/a-central-nervous-system-for-automatically-detecting-malware\/ September 9 2009  M. Jakobsson \"A Central Nervous System for Automatically Detecting Malware \" blogs.parc.com\/blog\/2009\/09\/a-central-nervous-system-for-automatically-detecting-malware\/ September 9 2009"},{"volume-title":"October 13, 2009","author":"Jakobsson M.","key":"e_1_3_2_1_22_1","unstructured":"M. Jakobsson , \"Will mobile payments usher in a new era of crime?,\" blogs.parc.com\/blog\/2009\/10\/will-mobile-payments-usher-in-a-new-era-of-crime\/ , October 13, 2009 M. Jakobsson, \"Will mobile payments usher in a new era of crime?,\" blogs.parc.com\/blog\/2009\/10\/will-mobile-payments-usher-in-a-new-era-of-crime\/, October 13, 2009"},{"key":"e_1_3_2_1_23_1","unstructured":"M. Jakobsson T. Jagatic and S. Stamm \"Phishing for Clues: Inferring Context Using Cascading Style Sheets and Browser History \" www.browser-recon.info.  M. Jakobsson T. Jagatic and S. Stamm \"Phishing for Clues: Inferring Context Using Cascading Style Sheets and Browser History \" www.browser-recon.info."},{"key":"e_1_3_2_1_24_1","unstructured":"Javelin Strategy and Research \"2008 Identity Fraud Survey Report\" February 2008. www.javelinstrategy.com\/products\/F59339\/97\/delivery.pdf.  Javelin Strategy and Research \"2008 Identity Fraud Survey Report\" February 2008. www.javelinstrategy.com\/products\/F59339\/97\/delivery.pdf."},{"key":"e_1_3_2_1_25_1","volume-title":"PhishGuru: Lessons From a Real World Evaluation of Anti-Phishing Training,\" e-Crime Researchers Summit","author":"Kumaraguru P.","year":"2008","unstructured":"P. Kumaraguru , S. Sheng , A. Acquisti , L.F. Cranor , and J.I. Hong , \" PhishGuru: Lessons From a Real World Evaluation of Anti-Phishing Training,\" e-Crime Researchers Summit , Anti-Phishing Working Group , October 15-16, 2008 . P. Kumaraguru, S. Sheng, A. Acquisti, L.F. Cranor, and J.I. Hong, \"PhishGuru: Lessons From a Real World Evaluation of Anti-Phishing Training,\" e-Crime Researchers Summit, Anti-Phishing Working Group, October 15-16, 2008."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_30"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1267000"},{"key":"e_1_3_2_1_28_1","unstructured":"Kaspersky Lab forecasts ten-fold increase in new malware for 2008. www.kaspersky.com\/news?id=207575629.  Kaspersky Lab forecasts ten-fold increase in new malware for 2008. www.kaspersky.com\/news?id=207575629."},{"key":"e_1_3_2_1_29_1","unstructured":"E. Mills \"Microsoft to offer free consumer security suite \" November 2008. news.cnet.com\/8301-1009_3-10101582-83.html.  E. Mills \"Microsoft to offer free consumer security suite \" November 2008. news.cnet.com\/8301-1009_3-10101582-83.html."},{"key":"e_1_3_2_1_30_1","volume-title":"CloudAV: N-Version Antivirus in the Network Cloud,\" Proceedings of the 17th USENIX Security Symposium (Security'08)","author":"Oberheide J.","year":"2008","unstructured":"J. Oberheide , E. Cooke and F. Jahanian , \" CloudAV: N-Version Antivirus in the Network Cloud,\" Proceedings of the 17th USENIX Security Symposium (Security'08) , 2008 . J. Oberheide, E. Cooke and F. Jahanian, \"CloudAV: N-Version Antivirus in the Network Cloud,\" Proceedings of the 17th USENIX Security Symposium (Security'08), 2008."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317089"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611190701743724"},{"key":"e_1_3_2_1_33_1","unstructured":"Symantec Report on the Underground Economy Published November 2008 eval.symantec.com\/mktginfo\/enterprise\/white_papers\/b-whitepaper_underground_economy_report_11-2008-14525717.en-us.pdf.  Symantec Report on the Underground Economy Published November 2008 eval.symantec.com\/mktginfo\/enterprise\/white_papers\/b-whitepaper_underground_economy_report_11-2008-14525717.en-us.pdf."},{"key":"e_1_3_2_1_34_1","first-page":"103","article-title":"Trusted platform module main specification","volume":"2","author":"Trusted Computing Group","year":"2007","unstructured":"Trusted Computing Group . Trusted platform module main specification . Version 1 . 2 , Revision 103 , July 2007 . Trusted Computing Group. Trusted platform module main specification. Version 1.2, Revision 103, July 2007.","journal-title":"Version 1"},{"key":"e_1_3_2_1_35_1","unstructured":"P. Wang M. C. Gonzalez C. A. Hidalgo and A.-L. Barabasi \"Understanding the Spreading Patterns of Mobile Phone Viruses \" Science 2 April 2009.  P. Wang M. C. Gonzalez C. A. Hidalgo and A.-L. Barabasi \"Understanding the Spreading Patterns of Mobile Phone Viruses \" Science 2 April 2009."},{"key":"e_1_3_2_1_36_1","unstructured":"J. Wiens. A Tipping Point For The Trusted Platform Module? InformationWeek. 28 June 2008. www.informationweek.com\/news\/security\/encryption\/ showArticle.jhtml?articleID=208800939.  J. Wiens. A Tipping Point For The Trusted Platform Module? InformationWeek. 28 June 2008. www.informationweek.com\/news\/security\/encryption\/ showArticle.jhtml?articleID=208800939."}],"event":{"name":"NSPW '09: 2009 New Security Paradigms Workshop","sponsor":["NSF National Science Foundation","Computer Associates Inc.","Microsoft Research Microsoft Research","U.S. Department of Homeland Security","U.S. Department of Defense"],"location":"Oxford United Kingdom","acronym":"NSPW '09"},"container-title":["Proceedings of the 2009 workshop on New security paradigms workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1719030.1719033","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1719030.1719033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:25Z","timestamp":1750250485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1719030.1719033"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,8]]},"references-count":34,"alternative-id":["10.1145\/1719030.1719033","10.1145\/1719030"],"URL":"https:\/\/doi.org\/10.1145\/1719030.1719033","relation":{},"subject":[],"published":{"date-parts":[[2009,9,8]]},"assertion":[{"value":"2009-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}