{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:19Z","timestamp":1750306639918,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,25]],"date-time":"2014-06-25T00:00:00Z","timestamp":1403654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,25]]},"DOI":"10.1145\/2613087.2613103","type":"proceedings-article","created":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T14:23:03Z","timestamp":1404224583000},"page":"129-140","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Limiting access to unintentionally leaked sensitive documents using malware signatures"],"prefix":"10.1145","author":[{"given":"Mordechai","family":"Guri","sequence":"first","affiliation":[{"name":"Ben-Gurion University, Beer-Sheva, Israel"}]},{"given":"Gabi","family":"Kedma","sequence":"additional","affiliation":[{"name":"Ben-Gurion University, Beer-Sheva, Israel"}]},{"given":"Buky","family":"Carmeli","sequence":"additional","affiliation":[{"name":"Ben-Gurion University, Beer-Sheva, Israel"}]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[{"name":"Ben-Gurion University, Beer-Sheva, Israel"}]}],"member":"320","published-online":{"date-parts":[[2014,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"A. Shabtai Y. Elovici and L. Rokach \"A Survey of Data Leakage Detection and Prevention Solutions \" Springer 2012.   A. Shabtai Y. Elovici and L. Rokach \"A Survey of Data Leakage Detection and Prevention Solutions \" Springer 2012.","DOI":"10.1007\/978-1-4614-2053-8"},{"volume-title":"November 20, 2007. {Online}. Available: http:\/\/news.bbc.co.uk\/2\/hi\/uk_news\/politics\/7103566","author":"K's","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"K. Sack \"Patient Data Posted Online in Major Breach of Privacy \" The New York Times 8 September 201 {Online}. Available: http:\/\/www.nytimes.com\/2011\/09\/09\/us\/09breach.html?_r=2&ref=stanforduniversity&.  K. Sack \"Patient Data Posted Online in Major Breach of Privacy \" The New York Times 8 September 201 {Online}. Available: http:\/\/www.nytimes.com\/2011\/09\/09\/us\/09breach.html?_r=2&ref=stanforduniversity&."},{"key":"e_1_3_2_1_4_1","unstructured":"K. Stewart \"Utah Medicaid contractor loses job over data breach \" The Salt Lake tribune 17 Jan 2013 . {Online}. Available: http:\/\/www.sltrib.com\/sltrib\/news\/55650800--78\/health-medicaid-utah-breach.html.csp.  K. Stewart \"Utah Medicaid contractor loses job over data breach \" The Salt Lake tribune 17 Jan 2013 . {Online}. Available: http:\/\/www.sltrib.com\/sltrib\/news\/55650800--78\/health-medicaid-utah-breach.html.csp."},{"key":"e_1_3_2_1_5_1","unstructured":"Detica and Office of Cyber Security and Information Assurance \"The Cost of Cyber Crime \" 2011.  Detica and Office of Cyber Security and Information Assurance \"The Cost of Cyber Crime \" 2011."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"R. Anderson C. Barton R. Boehme R. Clayton M. van Eeten M. Levi T. Moore and S. Savage \"Measuring the Cost of Cybercrime \" 2012.  R. Anderson C. Barton R. Boehme R. Clayton M. van Eeten M. Levi T. Moore and S. Savage \"Measuring the Cost of Cybercrime \" 2012.","DOI":"10.1007\/978-3-642-39498-0_12"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2009.107"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(09)70011-9"},{"key":"e_1_3_2_1_9_1","unstructured":"Microsoft \"About Information Rights Management \" Microsoft Office Website 2013. {Online}. Available: http:\/\/office.microsoft.com\/en-us\/help\/about-information-rights-management-HP006220859.aspx.  Microsoft \"About Information Rights Management \" Microsoft Office Website 2013. {Online}. Available: http:\/\/office.microsoft.com\/en-us\/help\/about-information-rights-management-HP006220859.aspx."},{"key":"e_1_3_2_1_10_1","unstructured":"OPSWAT \"Security Industry Market Share Analysis \" OPSWAT Inc. March 2012.  OPSWAT \"Security Industry Market Share Analysis \" OPSWAT Inc. March 2012."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007518"},{"key":"e_1_3_2_1_12_1","unstructured":"P. Szor \"The art of computer virus research and defense \" Addison Wesley 2005.   P. Szor \"The art of computer virus research and defense \" Addison Wesley 2005."},{"key":"e_1_3_2_1_13_1","unstructured":"Microsoft \"Microsoft Portable Executable and Common Object File Format Specification \" Microsoft 2010.  Microsoft \"Microsoft Portable Executable and Common Object File Format Specification \" Microsoft 2010."},{"key":"e_1_3_2_1_14_1","unstructured":"\"elf - format of Executable and Linking Format (ELF) files \" The Linux man-pages project 2010. {Online}. Available: http:\/\/man7.org\/linux\/man-pages\/man5\/elf.5.html.  \"elf - format of Executable and Linking Format (ELF) files \" The Linux man-pages project 2010. {Online}. Available: http:\/\/man7.org\/linux\/man-pages\/man5\/elf.5.html."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"M. Sikorsky and A. Honig \"Practical malware analysis \" No Starch Press 2012.  M. Sikorsky and A. Honig \"Practical malware analysis \" No Starch Press 2012.","DOI":"10.1016\/S1353-4858(12)70109-5"},{"key":"e_1_3_2_1_16_1","unstructured":"Kaspersky \"File Anti-Virus: actions upon threat detection \" Kaspersky PURE 2.0 {Online}. Available: http:\/\/utils.kaspersky.com\/special\/pure_2\/46_pure_file_antivir_actions_upon_threat_en.pdf. {Accessed 17 March 2013}.  Kaspersky \"File Anti-Virus: actions upon threat detection \" Kaspersky PURE 2.0 {Online}. Available: http:\/\/utils.kaspersky.com\/special\/pure_2\/46_pure_file_antivir_actions_upon_threat_en.pdf. {Accessed 17 March 2013}."},{"key":"e_1_3_2_1_17_1","unstructured":"EICAR \"Anti-Malware testfile \" European Institute for Computer Antivirus Research 7 September 2006. {Online}. Available: http:\/\/www.eicar.org\/86-0-Intended-use.html.  EICAR \"Anti-Malware testfile \" European Institute for Computer Antivirus Research 7 September 2006. {Online}. Available: http:\/\/www.eicar.org\/86-0-Intended-use.html."},{"key":"e_1_3_2_1_18_1","unstructured":"VirusTotal \"VirusTotal Free online virus malware and URL scanner \" {Online}. Available: https:\/\/www.virustotal.com\/. {Accessed Feb. 2013}.  VirusTotal \"VirusTotal Free online virus malware and URL scanner \" {Online}. Available: https:\/\/www.virustotal.com\/. {Accessed Feb. 2013}."},{"key":"e_1_3_2_1_19_1","unstructured":"Kaspersky Lab \"Digital Consumer's Online Trends and Risks \" Kapersky Lab 2012.  Kaspersky Lab \"Digital Consumer's Online Trends and Risks \" Kapersky Lab 2012."},{"key":"e_1_3_2_1_20_1","unstructured":"Raschke T. \"The Forrester Wave : Data Leak Prevention Q2 2008 \" Technical report Forrester Research Inc. 2008.  Raschke T. \"The Forrester Wave : Data Leak Prevention Q2 2008 \" Technical report Forrester Research Inc. 2008."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.394"},{"volume-title":"Proceedings. 19th Annual. IEEE","year":"2003","author":"Spitzner L.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(09)70123-0"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.100"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.14"},{"key":"e_1_3_2_1_26_1","unstructured":"Microsoft \"The evolution of malware and the threat landscape -- a 10-year review \" Microsoft Security Intelligence Report special edition 2012.  Microsoft \"The evolution of malware and the threat landscape -- a 10-year review \" Microsoft Security Intelligence Report special edition 2012."},{"key":"e_1_3_2_1_27_1","unstructured":"Lenny Seltzer \"Malware sample sources for researchers \" {Online}. Available: http:\/\/zeltser.com\/combating-malicious-software\/malware-sample-sources.html.  Lenny Seltzer \"Malware sample sources for researchers \" {Online}. Available: http:\/\/zeltser.com\/combating-malicious-software\/malware-sample-sources.html."},{"key":"e_1_3_2_1_28_1","unstructured":"Securelist \"Virus.DOS.Aids.552\" {Online}. Available: http:\/\/www.securelist.com\/en\/descriptions\/6880300\/Virus.DOS.Aids.552.  Securelist \"Virus.DOS.Aids.552\" {Online}. Available: http:\/\/www.securelist.com\/en\/descriptions\/6880300\/Virus.DOS.Aids.552."},{"key":"e_1_3_2_1_29_1","unstructured":"Symantec \"Understanding virus behavior under Windows NT \" Symantec Reasearch Center. {Online}. Available: http:\/\/www.symantec.com\/avcenter\/reference\/virus.behavior.under.win.nt.pdf.  Symantec \"Understanding virus behavior under Windows NT \" Symantec Reasearch Center. {Online}. Available: http:\/\/www.symantec.com\/avcenter\/reference\/virus.behavior.under.win.nt.pdf."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2009.03.003"},{"key":"e_1_3_2_1_31_1","first-page":"1869","volume-title":"Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 3","author":"Garetto M.","year":"2003"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Wang P. Gonz\u00e1lez M. C. Hidalgo C. A. & Barab\u00e1si A. L. 2009. \"Understanding the spreading patterns of mobile phone viruses \" Science 324(5930) 1071--1076.  Wang P. Gonz\u00e1lez M. C. Hidalgo C. A. & Barab\u00e1si A. L. 2009. \"Understanding the spreading patterns of mobile phone viruses \" Science 324(5930) 1071--1076.","DOI":"10.1126\/science.1167053"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Moreno Y. Nekovee M. & Pacheco A. F. 2004. \"Dynamics of rumor spreading in complex networks \" Physical Review E 69(6) 066130.  Moreno Y. Nekovee M. & Pacheco A. F. 2004. \"Dynamics of rumor spreading in complex networks \" Physical Review E 69(6) 066130.","DOI":"10.1103\/PhysRevE.69.066130"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02930-1_31"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Bordia P. & DiFonzo N. 2005. \"Psychological motivations \" in rumor spread. Rumor mills: The social impact of rumor and legend 87--101.  Bordia P. & DiFonzo N. 2005. \"Psychological motivations \" in rumor spread. Rumor mills: The social impact of rumor and legend 87--101.","DOI":"10.4324\/9781315128795-10"},{"key":"e_1_3_2_1_36_1","unstructured":"Evans K. M. & Kuenning G. H. 2002. \"A study of irregularities in file-size distributions \" In Proceedings of the 2002 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS).  Evans K. M. & Kuenning G. H. 2002. \"A study of irregularities in file-size distributions \" In Proceedings of the 2002 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2012.79"}],"event":{"name":"SACMAT '14: 19th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London Ontario Canada","acronym":"SACMAT '14"},"container-title":["Proceedings of the 19th ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2613087.2613103","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2613087.2613103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:57Z","timestamp":1750229757000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2613087.2613103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,25]]},"references-count":37,"alternative-id":["10.1145\/2613087.2613103","10.1145\/2613087"],"URL":"https:\/\/doi.org\/10.1145\/2613087.2613103","relation":{},"subject":[],"published":{"date-parts":[[2014,6,25]]},"assertion":[{"value":"2014-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}