{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:41Z","timestamp":1763468081875,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,16]],"date-time":"2012-10-16T00:00:00Z","timestamp":1350345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,16]]},"DOI":"10.1145\/2382196.2382283","type":"proceedings-article","created":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T17:13:12Z","timestamp":1350321192000},"page":"821-832","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":131,"title":["Manufacturing compromise"],"prefix":"10.1145","author":[{"given":"Chris","family":"Grier","sequence":"first","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Lucas","family":"Ballard","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountain View, CA, USA"}]},{"given":"Juan","family":"Caballero","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]},{"given":"Neha","family":"Chachra","sequence":"additional","affiliation":[{"name":"UC San Diego, San Diego, CA, USA"}]},{"given":"Christian J.","family":"Dietrich","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Gelsenkirchen, Gelsenkirchen, Germany"}]},{"given":"Kirill","family":"Levchenko","sequence":"additional","affiliation":[{"name":"UC San Diego, San Diego, CA, USA"}]},{"given":"Panayiotis","family":"Mavrommatis","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountain View, CA, USA"}]},{"given":"Damon","family":"McCoy","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Antonio","family":"Nappa","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]},{"given":"Andreas","family":"Pitsillidis","sequence":"additional","affiliation":[{"name":"UC San Diego, San Diego, CA, USA"}]},{"given":"Niels","family":"Provos","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountain View, CA, USA"}]},{"given":"M. Zubair","family":"Rafique","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]},{"given":"Moheeb Abu","family":"Rajab","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountain View, CA, USA"}]},{"given":"Christian","family":"Rossow","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Gelsenkirchen, Gelsenkirchen, Germany"}]},{"given":"Kurt","family":"Thomas","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[{"name":"UC San Diego, San Diego, CA, USA"}]},{"given":"Geoffrey M.","family":"Voelker","sequence":"additional","affiliation":[{"name":"UC San Diego, San Diego, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Security","author":"Anderson D.","year":"2007","unstructured":"D. Anderson , C. Fleizach , S. Savage , and G. Voelker . Spamscatter: Characterizing internet scam hosting infrastructure . In USENIX Security , 2007 . D. Anderson, C. Fleizach, S. Savage, and G. Voelker. Spamscatter: Characterizing internet scam hosting infrastructure. In USENIX Security, 2007."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1776434.1776449"},{"key":"e_1_3_2_1_3_1","volume-title":"Behavior-Based Malware Clustering. In Network and Distributed System Security Symposium (NDSS)","author":"Bayer U.","year":"2009","unstructured":"U. Bayer , P. Comparetti , C. Hlauschek , C. Kruegel , and E. Kirda . Scalable , Behavior-Based Malware Clustering. In Network and Distributed System Security Symposium (NDSS) , 2009 . U. Bayer, P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, Behavior-Based Malware Clustering. In Network and Distributed System Security Symposium (NDSS), 2009."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of USENIX Security","author":"Caballero J.","year":"2011","unstructured":"J. Caballero , C. Grier , C. Kreibich , and V. Paxson . Measuring Pay-per-Install: The Commoditization of Malware Distribution . In Proceedings of USENIX Security , 2011 . J. Caballero, C. Grier, C. Kreibich, and V. Paxson. Measuring Pay-per-Install: The Commoditization of Malware Distribution. In Proceedings of USENIX Security, 2011."},{"key":"e_1_3_2_1_5_1","volume-title":"Large Scale Malware Collection: Lessons Learned. In Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems","author":"Canto J.","year":"2008","unstructured":"J. Canto , M. Dacier , E. Kirda , and C. Leita . Large Scale Malware Collection: Lessons Learned. In Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems , 2008 . J. Canto, M. Dacier, E. Kirda, and C. Leita. Large Scale Malware Collection: Lessons Learned. In Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems, 2008."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats","author":"Cho C. Y.","year":"2010","unstructured":"C. Y. Cho , J. Caballero , C. Grier , V. Paxson , and D. Song . Insights from the Inside: A View of Botnet Management from Infiltration . In Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats , April 2010 . C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song. Insights from the Inside: A View of Botnet Management from Infiltration. In Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats, April 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Usenix Security Symposium","author":"Curtsinger C.","year":"2011","unstructured":"C. Curtsinger , B. Livshits , B. Zorn , and C. Seifert . Zozzle: Low-overhead Mostly Static JavaScript Malware Detection . In Proceedings of the Usenix Security Symposium , 2011 . C. Curtsinger, B. Livshits, B. Zorn, and C. Seifert. Zozzle: Low-overhead Mostly Static JavaScript Malware Detection. In Proceedings of the Usenix Security Symposium, 2011."},{"key":"e_1_3_2_1_9_1","unstructured":"T. Cymru. A Criminal Perpsective on Exploit Packs. http:\/\/www.team-cymru.com\/ReadingRoom\/Whitepapers\/2011\/Criminal-Perspective-On-Exploit-Packs.pdf May 2011.  T. Cymru. A Criminal Perpsective on Exploit Packs. http:\/\/www.team-cymru.com\/ReadingRoom\/Whitepapers\/2011\/Criminal-Perspective-On-Exploit-Packs.pdf May 2011."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315292"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 15th Annual Network and Distributed System Security Symposium","author":"Holz T.","year":"2008","unstructured":"T. Holz , C. Gorecki , F. Freiling , and K. Rieck . Detection and Mitigation of Fast-Flux Service Networks . In Proceedings of the 15th Annual Network and Distributed System Security Symposium , 2008 . T. Holz, C. Gorecki, F. Freiling, and K. Rieck. Detection and Mitigation of Fast-Flux Service Networks. In Proceedings of the 15th Annual Network and Distributed System Security Symposium, 2008."},{"key":"e_1_3_2_1_13_1","unstructured":"eF. Howard. Exploring the Blackhole Exploit Kit. http:\/\/nakedsecurity.sophos.com\/exploring-theblackhole-exploit-kit-3\/ March 2012.  eF. Howard. Exploring the Blackhole Exploit Kit. http:\/\/nakedsecurity.sophos.com\/exploring-theblackhole-exploit-kit-3\/ March 2012."},{"key":"e_1_3_2_1_14_1","unstructured":"W. Huang C. Hsiao and N. Lin. mysql.com hacked infecting visitors with malware. http:\/\/blog.armorize.com\/2011\/09\/mysqlcom-hackedinfecting-visitors-with.html September 2011.  W. Huang C. Hsiao and N. Lin. mysql.com hacked infecting visitors with malware. http:\/\/blog.armorize.com\/2011\/09\/mysqlcom-hackedinfecting-visitors-with.html September 2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.33"},{"key":"e_1_3_2_1_16_1","volume-title":"Studying Spamming Botnets Using Botlab. In Usenix Symposium on Networked Systems Design and Implementation (NSDI)","author":"John J.","year":"2009","unstructured":"J. John , A. Moshchuk , S. Gribble , and A. Krishnamurthy . Studying Spamming Botnets Using Botlab. In Usenix Symposium on Networked Systems Design and Implementation (NSDI) , 2009 . J. John, A. Moshchuk, S. Gribble, and A. Krishnamurthy. Studying Spamming Botnets Using Botlab. In Usenix Symposium on Networked Systems Design and Implementation (NSDI), 2009."},{"key":"e_1_3_2_1_17_1","volume-title":"BlackHat Las Vegas","author":"Jones J.","year":"2012","unstructured":"J. Jones . The State of Web Exploit Kits . BlackHat Las Vegas , July 2012 . J. Jones. The State of Web Exploit Kits. BlackHat Las Vegas, July 2012."},{"key":"e_1_3_2_1_18_1","volume-title":"January","author":"Kharouni L.","year":"2012","unstructured":"L. Kharouni . SpyEye\/Zeu S Toolkit v1.3.05 Beta . http:\/\/blog.trendmicro.com\/spyeyezeus-toolkit-v1-3-05-beta\/ , January 2012 . L. Kharouni. SpyEye\/ZeuS Toolkit v1.3.05 Beta. http:\/\/blog.trendmicro.com\/spyeyezeus-toolkit-v1-3-05-beta\/, January 2012."},{"key":"e_1_3_2_1_19_1","volume-title":"Spamcraft: An Inside Look At Spam Campaign Orchestration. In USENIX Workshop on Large-Scale Exploits and Emergent Threats","author":"Kreibich C.","year":"2009","unstructured":"C. Kreibich , C. Kanich , K. Levchenko , B. Enright , G. Voelker , V. Paxson , and S. Savage . Spamcraft: An Inside Look At Spam Campaign Orchestration. In USENIX Workshop on Large-Scale Exploits and Emergent Threats , 2009 . C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamcraft: An Inside Look At Spam Campaign Orchestration. In USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068854"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866356"},{"key":"e_1_3_2_1_23_1","unstructured":"MalwareIntelligence. Inside Phoenix Exploit's Kit 2.8 mini version. http:\/\/malwareint.blogspot.com.es\/2011\/10\/insidephoenix-exploits-kit-28-mini.html October 2011.  MalwareIntelligence. Inside Phoenix Exploit's Kit 2.8 mini version. http:\/\/malwareint.blogspot.com.es\/2011\/10\/insidephoenix-exploits-kit-28-mini.html October 2011."},{"key":"e_1_3_2_1_24_1","volume-title":"July","author":"List Malware Domain","year":"2012","unstructured":"Malware Domain List . http:\/\/www.malwaredomainlist.com , July 2012 . Malware Domain List. http:\/\/www.malwaredomainlist.com, July 2012."},{"key":"e_1_3_2_1_25_1","first-page":"164","volume-title":"What's Clicking What? Techniques and Innovations of Today's Clickbots. Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Miller B.","year":"2011","unstructured":"B. Miller , P. Pearce , C. Grier , C. Kreibich , and V. Paxson . What's Clicking What? Techniques and Innovations of Today's Clickbots. Detection of Intrusions and Malware, and Vulnerability Assessment , pages 164 -- 183 , 2011 . B. Miller, P. Pearce, C. Grier, C. Kreibich, and V. Paxson. What's Clicking What? Techniques and Innovations of Today's Clickbots. Detection of Intrusions and Malware, and Vulnerability Assessment, pages 164--183, 2011."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS)","author":"Moshchuk A.","year":"2006","unstructured":"A. Moshchuk , T. Bragin , S. D. Gribble , and H. M. Levy . A crawler-based study of spyware on the web . In Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS) , February 2006 . A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy. A crawler-based study of spyware on the web. In Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS), February 2006."},{"key":"e_1_3_2_1_27_1","volume-title":"An Overview of Exploit Packs. https:\/\/blogs.mcafee.com\/mcafee-labs\/an-overviewof-exploit-packs","author":"Paget F.","year":"2010","unstructured":"F. Paget . An Overview of Exploit Packs. https:\/\/blogs.mcafee.com\/mcafee-labs\/an-overviewof-exploit-packs , 2010 . F. Paget. An Overview of Exploit Packs. https:\/\/blogs.mcafee.com\/mcafee-labs\/an-overviewof-exploit-packs, 2010."},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats","author":"Polychronakis M.","year":"2008","unstructured":"M. Polychronakis , P. Mavrommatis , and N. Provos . Ghost turns Zombie: Exploring the Life Cycle of Web-based Malware . In Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats , pages 1 -- 8 . USENIX Association , 2008 . M. Polychronakis, P. Mavrommatis, and N. Provos. Ghost turns Zombie: Exploring the Life Cycle of Web-based Malware. In Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats, pages 1--8. USENIX Association, 2008."},{"key":"e_1_3_2_1_29_1","first-page":"1","volume-title":"Proceedings of the 17th Usenix Security Symposium","author":"Provos N.","year":"2008","unstructured":"N. Provos , P. Mavrommatis , M. A. Rajab , and F. Monrose . All Your iFRAMEs Point to Us . In Proceedings of the 17th Usenix Security Symposium , pages 1 -- 15 , July 2008 . N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All Your iFRAMEs Point to Us. In Proceedings of the 17th Usenix Security Symposium, pages 1--15, July 2008."},{"key":"e_1_3_2_1_30_1","volume-title":"Google","author":"Rajab M.","year":"2011","unstructured":"M. Rajab , L. Ballard , N. Jagpal , P. Mavrommatis , D. Nojiri , N. Provos , and L. Schmidt . Trends in Circumventing Web-Malware Detection. Technical report , Google , July 2011 . M. Rajab, L. Ballard, N. Jagpal, P. Mavrommatis, D. Nojiri, N. Provos, and L. Schmidt. Trends in Circumventing Web-Malware Detection. Technical report, Google, July 2011."},{"key":"e_1_3_2_1_31_1","volume-title":"The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)","author":"Rajab M.","year":"2010","unstructured":"M. Rajab , L. Ballard , P. Mavrommatis , N. Provos , and X. Zhao . The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) , 2010 . M. Rajab, L. Ballard, P. Mavrommatis, N. Provos, and X. Zhao. The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2010."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788857.1788859"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_6"},{"key":"e_1_3_2_1_34_1","unstructured":"Robert Lemos. MPack developer on automated infection kit (interview). http:\/\/www.theregister.co.uk\/2007\/07\/23\/mpack_developer_interview July 2007.  Robert Lemos. MPack developer on automated infection kit (interview). http:\/\/www.theregister.co.uk\/2007\/07\/23\/mpack_developer_interview July 2007."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_3"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978682"},{"volume-title":"May","year":"2012","key":"e_1_3_2_1_37_1","unstructured":"SellMeYourTraffic.com. http:\/\/www.sellmeyourtraffic.com , May 2012 . SellMeYourTraffic.com. http:\/\/www.sellmeyourtraffic.com, May 2012."},{"key":"e_1_3_2_1_38_1","volume-title":"May","author":"Query URL","year":"2012","unstructured":"URL Query . http:\/\/urlquery.net\/report.php?id=40035 , May 2012 . URL Query. http:\/\/urlquery.net\/report.php?id=40035, May 2012."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the Workshop on Economics of Information Security (WEIS)","author":"Stone-Gross B.","year":"2011","unstructured":"B. Stone-Gross , R. Abman , R. Kemmerer , C. Kruegel , D. Steigerwald , and G. Vigna . The Underground Economy of Fake Antivirus Software . In Proceedings of the Workshop on Economics of Information Security (WEIS) , 2011 . B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, D. Steigerwald, and G. Vigna. The Underground Economy of Fake Antivirus Software. In Proceedings of the Workshop on Economics of Information Security (WEIS), 2011."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"e_1_3_2_1_41_1","volume-title":"USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)","author":"Stone-Gross B.","year":"2011","unstructured":"B. Stone-Gross , T. Holz , G. Stringhini , and G. Vigna . The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns . In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) , 2011 . B. Stone-Gross, T. Holz, G. Stringhini, and G. Vigna. The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2011."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068843"},{"key":"e_1_3_2_1_43_1","volume-title":"February","author":"Suri H.","year":"2011","unstructured":"H. Suri . The BlackHole Theory . http:\/\/www.symantec.com\/connect\/blogs\/blackhole-theory , February 2011 . H. Suri. The BlackHole Theory. http:\/\/www.symantec.com\/connect\/blogs\/blackhole-theory, February 2011."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_1_45_1","volume-title":"May","author":"Traffbiz","year":"2012","unstructured":"Traffbiz : A new malicious twist on affiliate partnerka schemes? http:\/\/nakedsecurity.sophos.com\/2012\/03\/01\/traffbiza-new-malicious-twist-on-affiliate-partnerkaschemes\/ , May 2012 . Traffbiz: A new malicious twist on affiliate partnerka schemes? http:\/\/nakedsecurity.sophos.com\/2012\/03\/01\/traffbiza-new-malicious-twist-on-affiliate-partnerkaschemes\/, May 2012."},{"key":"e_1_3_2_1_46_1","unstructured":"Trustwave Spider Labs. Catch Me If You Can Trojan Banker Strikes Again. http:\/\/blog.spiderlabs.com\/2012\/05\/catch-meif-you-can-trojan-banker-zeus-strikes-again-part-2-of-5-1.html May 2012.  Trustwave Spider Labs. Catch Me If You Can Trojan Banker Strikes Again. http:\/\/blog.spiderlabs.com\/2012\/05\/catch-meif-you-can-trojan-banker-zeus-strikes-again-part-2-of-5-1.html May 2012."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS)","author":"Wang Y.-M.","year":"2006","unstructured":"Y.-M. Wang , D. Beck , X. Jiang , R. Roussev , C. Verbowski , S. Chen , and S. King . Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities . In Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS) , 2006 . Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS), 2006."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879148"}],"event":{"name":"CCS'12: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Raleigh North Carolina USA","acronym":"CCS'12"},"container-title":["Proceedings of the 2012 ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2382196.2382283","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2382196.2382283","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:48Z","timestamp":1750239288000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2382196.2382283"}},"subtitle":["the emergence of exploit-as-a-service"],"short-title":[],"issued":{"date-parts":[[2012,10,16]]},"references-count":48,"alternative-id":["10.1145\/2382196.2382283","10.1145\/2382196"],"URL":"https:\/\/doi.org\/10.1145\/2382196.2382283","relation":{},"subject":[],"published":{"date-parts":[[2012,10,16]]},"assertion":[{"value":"2012-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}