{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T08:15:04Z","timestamp":1769156104908,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,2,18]],"date-time":"2013-02-18T00:00:00Z","timestamp":1361145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,2,18]]},"DOI":"10.1145\/2435349.2435364","type":"proceedings-article","created":{"date-parts":[[2013,2,19]],"date-time":"2013-02-19T14:32:38Z","timestamp":1361284358000},"page":"117-128","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":61,"title":["JStill"],"prefix":"10.1145","author":[{"given":"Wei","family":"Xu","sequence":"first","affiliation":[{"name":"Pennsylvania State University, University Park, USA"}]},{"given":"Fangfang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, USA"}]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,2,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Online JavaScript Obfuscator. http:\/\/www.daftlogic.com\/projects-online-javascript-obfuscator.htm.  Online JavaScript Obfuscator. http:\/\/www.daftlogic.com\/projects-online-javascript-obfuscator.htm."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/javascript-reference.info\/javascript-obfuscators-review.htm","author":"Javascript","year":"2006","unstructured":"Javascript obfuscators review. http:\/\/javascript-reference.info\/javascript-obfuscators-review.htm , 2006 . Javascript obfuscators review. http:\/\/javascript-reference.info\/javascript-obfuscators-review.htm, 2006."},{"key":"e_1_3_2_1_3_1","volume-title":"http:\/\/www.w3schools.com\/browsers\/browsers_stats.asp","author":"Browser","year":"2011","unstructured":"Browser statistics. http:\/\/www.w3schools.com\/browsers\/browsers_stats.asp , 2011 . Browser statistics. http:\/\/www.w3schools.com\/browsers\/browsers_stats.asp, 2011."},{"key":"e_1_3_2_1_4_1","volume-title":"http:\/\/upsdell.com\/BrowserNews\/stat.htm","author":"Browser","year":"2011","unstructured":"Browser stats. http:\/\/upsdell.com\/BrowserNews\/stat.htm , 2011 . Browser stats. http:\/\/upsdell.com\/BrowserNews\/stat.htm, 2011."},{"key":"e_1_3_2_1_5_1","unstructured":"Alexa. Alexa top global sites. http:\/\/www.alexa.com\/topsites 2010.  Alexa. Alexa top global sites. http:\/\/www.alexa.com\/topsites 2010."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.22"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963436"},{"key":"e_1_3_2_1_8_1","unstructured":"Chenette S. ToorConX: The Ultimate Deobfuscator. http:\/\/securitylabs.websense.com\/content\/Blogs\/3198.aspx# 2010.  Chenette S. ToorConX: The Ultimate Deobfuscator. http:\/\/securitylabs.websense.com\/content\/Blogs\/3198.aspx# 2010."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10509-8_19"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"e_1_3_2_1_11_1","unstructured":"Crockford D. Minification v obfuscation. http:\/\/yuiblog.com\/blog\/2006\/03\/06\/minification-v-obfuscation\/ 2006.  Crockford D. Minification v obfuscation. http:\/\/yuiblog.com\/blog\/2006\/03\/06\/minification-v-obfuscation\/ 2006."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 20th conference on USENIX security symposium","author":"Curtsinger C.","year":"2011","unstructured":"Curtsinger , C. , Livshits , B. , Zorn , B. , and Seifert , C . Zozzle: Fast and precise in-browser javascript malware detection . In Proceedings of the 20th conference on USENIX security symposium ( 2011 ), USENIX Association. Curtsinger, C., Livshits, B., Zorn, B., and Seifert, C. Zozzle: Fast and precise in-browser javascript malware detection. In Proceedings of the 20th conference on USENIX security symposium (2011), USENIX Association."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02918-9_6"},{"key":"e_1_3_2_1_14_1","volume-title":"Symantec","author":"Fossi M.","year":"2009","unstructured":"Fossi , M. , Johnson , E. , and Mack , T . Symantec global internet security threat report. Tech. rep ., Symantec , 2009 . Fossi, M., Johnson, E., and Mack, T. Symantec global internet security threat report. Tech. rep., Symantec, 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2005.35"},{"key":"e_1_3_2_1_16_1","volume-title":"Sophos","author":"Howard F.","year":"2010","unstructured":"Howard , F. Malware with your mocha? obfuscation and anti emulation tricks in malicious javascript. Tech. rep ., Sophos , 2010 . Howard, F. Malware with your mocha? obfuscation and anti emulation tricks in malicious javascript. Tech. rep., Sophos, 2010."},{"key":"e_1_3_2_1_17_1","volume-title":"Microsoft Research","author":"Kaplan S.","year":"2011","unstructured":"Kaplan , S. , Livshits , B. , Zorn , B. , Siefert , C. , and Curtsinger , C . \" nofus: Automatically detecting\" string.fromcharcode(32)\"obfuscated \".tolowercase() + \"javascript code\". Tech. rep ., Microsoft Research , 2011 . Kaplan, S., Livshits, B., Zorn, B., Siefert, C., and Curtsinger, C. \"nofus: Automatically detecting\" string.fromcharcode(32)\"obfuscated \".tolowercase() + \"javascript code\". Tech. rep., Microsoft Research, 2011."},{"key":"e_1_3_2_1_18_1","volume-title":"International Journal of Advanced Science and Technology","author":"Kim B.-I.","year":"2011","unstructured":"Kim , B.-I. , Im , C.-T. , and Jung , H . -C. Suspicious malicious web site detection with strength analysis of a javascript obfuscation . In International Journal of Advanced Science and Technology ( 2011 ). Kim, B.-I., Im, C.-T., and Jung, H.-C. Suspicious malicious web site detection with strength analysis of a javascript obfuscation. In International Journal of Advanced Science and Technology (2011)."},{"key":"e_1_3_2_1_19_1","first-page":"47","volume-title":"Proceedings of the 4th International Conference on Malicious and Unwanted Software (Oct 2009), MALWARE'09","author":"Likarish P.","unstructured":"Likarish , P. , Jung , E. , and Jo , I . Obfuscated malicious javascript detection using classification techniques . In Proceedings of the 4th International Conference on Malicious and Unwanted Software (Oct 2009), MALWARE'09 , pp. 47 -- 54 . Likarish, P., Jung, E., and Jo, I. Obfuscated malicious javascript detection using classification techniques. In Proceedings of the 4th International Conference on Malicious and Unwanted Software (Oct 2009), MALWARE'09, pp. 47--54."},{"key":"e_1_3_2_1_20_1","volume-title":"SpiderLabs","author":"Percoco N. J.","year":"2010","unstructured":"Percoco , N. J. Global security report 2010 analysis of investigations and penetration tests. Tech. rep ., SpiderLabs , 2010 . Percoco, N. J. Global security report 2010 analysis of investigations and penetration tests. Tech. rep., SpiderLabs, 2010."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948201"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 18th conference on USENIX security symposium","author":"Ratanaworabhan P.","year":"2009","unstructured":"Ratanaworabhan , P. , Livshits , B. , and Zorn , B . Nozzle: a defense against heap-spraying code injection attacks . In Proceedings of the 18th conference on USENIX security symposium ( Berkeley, CA, USA , 2009 ), USENIX Association, pp. 169--186. Ratanaworabhan, P., Livshits, B., and Zorn, B. Nozzle: a defense against heap-spraying code injection attacks. In Proceedings of the 18th conference on USENIX security symposium (Berkeley, CA, USA, 2009), USENIX Association, pp. 169--186."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920267"},{"key":"e_1_3_2_1_24_1","unstructured":"Symantec. ActiveX file overwrite delete vulnerabilities. http:\/\/www.symantec.com\/connect\/blogs\/activex-file-overwritedelete-vulnerabilities-continued 2008.  Symantec. ActiveX file overwrite delete vulnerabilities. http:\/\/www.symantec.com\/connect\/blogs\/activex-file-overwritedelete-vulnerabilities-continued 2008."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526838"}],"event":{"name":"CODASPY'13: Third ACM Conference on Data and Application Security and Privacy","location":"San Antonio Texas USA","acronym":"CODASPY'13","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the third ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2435349.2435364","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2435349.2435364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:57Z","timestamp":1750234737000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2435349.2435364"}},"subtitle":["mostly static detection of obfuscated malicious JavaScript code"],"short-title":[],"issued":{"date-parts":[[2013,2,18]]},"references-count":25,"alternative-id":["10.1145\/2435349.2435364","10.1145\/2435349"],"URL":"https:\/\/doi.org\/10.1145\/2435349.2435364","relation":{},"subject":[],"published":{"date-parts":[[2013,2,18]]},"assertion":[{"value":"2013-02-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}