{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T00:17:29Z","timestamp":1772151449046,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,28]],"date-time":"2011-03-28T00:00:00Z","timestamp":1301270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,28]]},"DOI":"10.1145\/1963405.1963436","type":"proceedings-article","created":{"date-parts":[[2011,3,29]],"date-time":"2011-03-29T12:02:18Z","timestamp":1301400138000},"page":"197-206","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":253,"title":["Prophiler"],"prefix":"10.1145","author":[{"given":"Davide","family":"Canali","sequence":"first","affiliation":[{"name":"Institute Eurecom, Sophia Antipolis, France"}]},{"given":"Marco","family":"Cova","sequence":"additional","affiliation":[{"name":"University of Birmingham, Birmingham, United Kingdom"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,3,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alexa.com. Alexa Top Global Sites. http:\/\/www.alexa.com\/topsites\/.  Alexa.com. Alexa Top Global Sites. http:\/\/www.alexa.com\/topsites\/."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/www.clamav.net\/","author":"AntiVirus Clam","year":"2010","unstructured":"Clam AntiVirus . http:\/\/www.clamav.net\/ , 2010 . Clam AntiVirus. http:\/\/www.clamav.net\/, 2010."},{"key":"e_1_3_2_1_3_1","unstructured":"A. Clark and M. Guillemot. CyberNeko HTML Parser. http:\/\/nekohtml.sourceforge.net\/.  A. Clark and M. Guillemot. CyberNeko HTML Parser. http:\/\/nekohtml.sourceforge.net\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"e_1_3_2_1_5_1","volume-title":"Detection and Analysis of Malicious JavaScript. In Proceedings of the Black Hat Security Conference","author":"Feinstein B.","year":"2007","unstructured":"B. Feinstein and D. Peck . Caffeine Monkey: Automated Collection , Detection and Analysis of Malicious JavaScript. In Proceedings of the Black Hat Security Conference , 2007 . B. Feinstein and D. Peck. Caffeine Monkey: Automated Collection, Detection and Analysis of Malicious JavaScript. In Proceedings of the Black Hat Security Conference, 2007."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314391"},{"key":"e_1_3_2_1_7_1","unstructured":"D. Goodin. SQL injection taints BusinessWeek.com. http:\/\/www.theregister.co.uk\/2008\/09\/16\/businessweek_hacked\/ September 2008.  D. Goodin. SQL injection taints BusinessWeek.com. http:\/\/www.theregister.co.uk\/2008\/09\/16\/businessweek_hacked\/ September 2008."},{"key":"e_1_3_2_1_8_1","unstructured":"D. Goodin. Potent malware link infects almost 300 000 webpages. http:\/\/www.theregister.co.uk\/2009\/12\/10\/mass_web_attack\/ December 2010.  D. Goodin. Potent malware link infects almost 300 000 webpages. http:\/\/www.theregister.co.uk\/2009\/12\/10\/mass_web_attack\/ December 2010."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_10_1","unstructured":"Heritrix. http:\/\/crawler.archive.org\/.  Heritrix. http:\/\/crawler.archive.org\/."},{"key":"e_1_3_2_1_11_1","unstructured":"M. Hines. Malware SEO: Gaming Google Trends and Big Bird. http:\/\/securitywatch.eweek.com\/seo\/malware_seo_gaming_google_trends_and_big_bird.html November 2009.  M. Hines. Malware SEO: Gaming Google Trends and Big Bird. http:\/\/securitywatch.eweek.com\/seo\/malware_seo_gaming_google_trends_and_big_bird.html November 2009."},{"key":"e_1_3_2_1_12_1","unstructured":"W. Hobson. Cyber-criminals use SEO on topical trends. http:\/\/www.vertical-leap.co.uk\/news\/cybercriminals-use-seo-on-topical-trends\/ February 2010.  W. Hobson. Cyber-criminals use SEO on topical trends. http:\/\/www.vertical-leap.co.uk\/news\/cybercriminals-use-seo-on-topical-trends\/ February 2010."},{"key":"e_1_3_2_1_13_1","volume-title":"http:\/\/www.honeyclient.org\/","author":"Project Team HoneyClient","year":"2010","unstructured":"HoneyClient Project Team . HoneyClient. http:\/\/www.honeyclient.org\/ , 2010 . HoneyClient Project Team. HoneyClient. http:\/\/www.honeyclient.org\/, 2010."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of Sicherheit, Schutz und Zuverl\u00e4ssigkeit","author":"Ikinci A.","year":"2008","unstructured":"A. Ikinci , T. Holz , and F. Freiling . Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients . In Proceedings of Sicherheit, Schutz und Zuverl\u00e4ssigkeit , 2008 . A. Ikinci, T. Holz, and F. Freiling. Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients. In Proceedings of Sicherheit, Schutz und Zuverl\u00e4ssigkeit, 2008."},{"key":"e_1_3_2_1_15_1","volume-title":"http:\/\/jsunpack.jeek.org","year":"2010","unstructured":"JSUnpack. http:\/\/jsunpack.jeek.org , 2010 . JSUnpack. http:\/\/jsunpack.jeek.org, 2010."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403020"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS)","author":"Moshchuk A.","year":"2006","unstructured":"A. Moshchuk , T. Bragin , S. Gribble , and H. Levy . A Crawler-based Study of Spyware in the Web . In Proceedings of the Symposium on Network and Distributed System Security (NDSS) , 2006 . A. Moshchuk, T. Bragin, S. Gribble, and H. Levy. A Crawler-based Study of Spyware in the Web. In Proceedings of the Symposium on Network and Distributed System Security (NDSS), 2006."},{"key":"e_1_3_2_1_19_1","unstructured":"Mozilla Foundation. Rhino: JavaScript for Java. http:\/\/www.mozilla.org\/rhino\/.  Mozilla Foundation. Rhino: JavaScript for Java. http:\/\/www.mozilla.org\/rhino\/."},{"key":"e_1_3_2_1_20_1","volume-title":"PhoneyC: A Virtual Client Honeypot. In Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)","author":"Nazario J.","year":"2009","unstructured":"J. Nazario . PhoneyC: A Virtual Client Honeypot. In Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) , 2009 . J. Nazario. PhoneyC: A Virtual Client Honeypot. In Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2009."},{"key":"e_1_3_2_1_21_1","unstructured":"D. Oswald. HTMLParser. http:\/\/htmlparser.sourceforge.net\/.  D. Oswald. HTMLParser. http:\/\/htmlparser.sourceforge.net\/."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Provos N.","year":"2008","unstructured":"N. Provos , P. Mavrommatis , M. A. Rajab , and F. Monrose . All Your iFrames Point to Us . In Proceedings of the USENIX Security Symposium , 2008 . N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All Your iFrames Point to Us. In Proceedings of the USENIX Security Symposium, 2008."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Ratanaworabhan P.","year":"2009","unstructured":"P. Ratanaworabhan , B. Livshits , B., and Zorn. Nozzle : a defense against heap-spraying code injection attacks . In Proceedings of the USENIX Security Symposium , 2009 . P. Ratanaworabhan, B. Livshits, B., and Zorn. Nozzle: a defense against heap-spraying code injection attacks. In Proceedings of the USENIX Security Symposium, 2009."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920267"},{"key":"e_1_3_2_1_25_1","volume-title":"Capture-HPC. https:\/\/projects.honeynet.org\/capture-hpc","author":"Seifert C.","year":"2008","unstructured":"C. Seifert and R. Steenson . Capture-HPC. https:\/\/projects.honeynet.org\/capture-hpc , 2008 . C. Seifert and R. Steenson. Capture-HPC. https:\/\/projects.honeynet.org\/capture-hpc, 2008."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2008.4664306"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2008.4783302"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS)","author":"Wang Y.-M.","year":"2006","unstructured":"Y.-M. Wang , D. Beck , X. Jiang , R. Roussev , C. Verbowski , S. Chen , and S. King . Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites that Exploit Browser Vulnerabilities . In Proceedings of the Symposium on Network and Distributed System Security (NDSS) , 2006 . Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites that Exploit Browser Vulnerabilities. In Proceedings of the Symposium on Network and Distributed System Security (NDSS), 2006."}],"event":{"name":"WWW '11: 20th International World Wide Web Conference","location":"Hyderabad India","acronym":"WWW '11","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","The International Institute of Information Technology Bangalore The International Institute of Information Technology Bangalore"]},"container-title":["Proceedings of the 20th international conference on World wide web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1963405.1963436","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1963405.1963436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:18Z","timestamp":1750243938000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1963405.1963436"}},"subtitle":["a fast filter for the large-scale detection of malicious web pages"],"short-title":[],"issued":{"date-parts":[[2011,3,28]]},"references-count":30,"alternative-id":["10.1145\/1963405.1963436","10.1145\/1963405"],"URL":"https:\/\/doi.org\/10.1145\/1963405.1963436","relation":{},"subject":[],"published":{"date-parts":[[2011,3,28]]},"assertion":[{"value":"2011-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}