{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:25:05Z","timestamp":1771064705244,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T00:00:00Z","timestamp":1667865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"AssureMOSS","award":["952647"],"award-info":[{"award-number":["952647"]}]},{"name":"SPARTA","award":["830892"],"award-info":[{"award-number":["830892"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,11]]},"DOI":"10.1145\/3560835.3564548","type":"proceedings-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T02:38:26Z","timestamp":1667961506000},"page":"63-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Towards the Detection of Malicious Java Packages"],"prefix":"10.1145","author":[{"given":"Piergiorgio","family":"Ladisa","sequence":"first","affiliation":[{"name":"SAP Security Research &amp; University of Rennes 1\/INRIA\/IRISA, Mougins, France"}]},{"given":"Henrik","family":"Plate","sequence":"additional","affiliation":[{"name":"SAP Security Research, Mougins, France"}]},{"given":"Matias","family":"Martinez","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Polytechnique Hauts-de-France, Valenciennes, France"}]},{"given":"Olivier","family":"Barais","sequence":"additional","affiliation":[{"name":"University of Rennes 1\/INRIA\/IRISA, Rennes, France"}]},{"given":"Serena Elisa","family":"Ponta","sequence":"additional","affiliation":[{"name":"SAP Security Research, Mougins, France"}]}],"member":"320","published-online":{"date-parts":[[2022,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Analyses. https:\/\/developers.virustotal.com\/reference\/analyses-object. [Accessed 07-Sep-2022]."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. ASMifier (ASM 9.3). https:\/\/asm.ow2.io\/javadoc\/org\/objectweb\/asm\/util\/ ASMifier.html. [Accessed 06-Sep-2022]."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Backstabber's Knife Collection. https:\/\/dasfreak.github.io\/BackstabbersKnife-Collection\/. [Accessed 07-Sep-2022]."},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. Compact Language Detector 2. https:\/\/github.com\/CLD2Owners\/cld2. [Accessed 03-Jul-2022]. 4https:\/\/maven.apache.org\/"},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. Get a URL\/file analysis. https:\/\/developers.virustotal.com\/reference\/ analysis. [Accessed 07-Sep-2022]."},{"key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. Java Platform Standard Edition Documentation. https:\/\/docs.oracle.com\/ en\/java\/javase\/index.html. [Accessed 12-Jul-2022]."},{"key":"e_1_3_2_1_7_1","unstructured":"[n.d.]. The Java Virtual Machine Instruction Set. https:\/\/docs.oracle.com\/javase\/ specs\/jvms\/se7\/html\/jvms-6.html. [Accessed 02-Jul-2022]."},{"key":"e_1_3_2_1_8_1","unstructured":"[n.d.]. Local File Inclusion. https:\/\/sushant747.gitbooks.io\/total-oscp-guide\/ content\/local_file_inclusion.html. [Accessed 26-Jun-2022]."},{"key":"e_1_3_2_1_9_1","unstructured":"[n.d.]. Reverse Shell Cheat Sheet. https:\/\/github.com\/swisskyrepo\/ PayloadsAllTheThings\/blob\/master\/MethodologyandResources\/ ReverseShellCheatsheet.md. [Accessed 26-Jun-2022]."},{"key":"e_1_3_2_1_10_1","volume-title":"The State of the Octoverse","year":"2021","unstructured":"[n.d.]. The State of the Octoverse 2021. https:\/\/octoverse.github.com\/#toplanguages-over-the-years. [Accessed 07-Jul-2022]."},{"key":"e_1_3_2_1_11_1","unstructured":"[n.d.]. TIOBE Index. https:\/\/www.tiobe.com\/tiobe-index\/. [Accessed 28-Jun2022]."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070262"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2011.6112328"},{"key":"e_1_3_2_1_15_1","volume-title":"URL: http:\/\/download. forge. objectweb. org\/asm\/asmguide. pdf","author":"Bruneton Eric","year":"2007","unstructured":"Eric Bruneton. 2007. ASM 3.0 A Java bytecode engineering library. URL: http:\/\/download. forge. objectweb. org\/asm\/asmguide. pdf (2007)."},{"key":"e_1_3_2_1_16_1","volume-title":"Ryan Elder, Brendan Saltaformaggio, and Wenke Lee.","author":"Duan Ruian","year":"2021","unstructured":"Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, and Wenke Lee. 2021. Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages. In 28th Annual Network and Distributed System Security Symposium, NDSS. https:\/\/www.ndss-symposium.org\/wpcontent\/uploads\/ndss2021_1B-1_23055_paper.pdf"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_14"},{"key":"e_1_3_2_1_18_1","volume-title":"Computer viruses: from theory to applications","author":"Filiol Eric","unstructured":"Eric Filiol. 2006. Computer viruses: from theory to applications. Springer Science & Business Media."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00012"},{"key":"e_1_3_2_1_20_1","volume-title":"On information and sufficiency. The annals of mathematical statistics 22, 1","author":"Kullback Solomon","year":"1951","unstructured":"Solomon Kullback and Richard A Leibler. 1951. On information and sufficiency. The annals of mathematical statistics 22, 1 (1951), 79--86."},{"key":"e_1_3_2_1_21_1","volume-title":"SoK: Taxonomy of Attacks on Open-Source Software Supply Chains. IEEE Symposium on Security and Privacy (SP) (forthcoming","author":"Ladisa Piergiorgio","year":"2023","unstructured":"Piergiorgio Ladisa, Henrik Plate, Matias Martinez, and Olivier Barais. forthcoming 2023. SoK: Taxonomy of Attacks on Open-Source Software Supply Chains. IEEE Symposium on Security and Privacy (SP) (forthcoming 2023)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-017-1786-z"},{"key":"e_1_3_2_1_23_1","volume-title":"Droidetec: Android malware detection and malicious code localization through deep learning. arXiv preprint arXiv:2002.03594","author":"Ma Zhuo","year":"2020","unstructured":"Zhuo Ma, Haoran Ge, Zhuzhu Wang, Yang Liu, and Ximeng Liu. 2020. Droidetec: Android malware detection and malicious code localization through deep learning. arXiv preprint arXiv:2002.03594 (2020)."},{"key":"e_1_3_2_1_24_1","unstructured":"Glen McCluskey. 1998. Using Java Reflection. https:\/\/www.oracle.com\/technicalresources\/articles\/java\/javareflection.html. [Accessed 25-Jun-2022]."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","unstructured":"Marc Ohm Lukas Kempf Felix Boes and Michael Meier. 2020. Supporting the Detection of Software Supply Chain Attacks through Unsupervised Signature Generation. https:\/\/doi.org\/10.48550\/ARXIV.2011.02235","DOI":"10.48550\/ARXIV.2011.02235"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Marc Ohm Henrik Plate Arnold Sykosch and Michael Meier. 2020. Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks. arXiv:2005.09535 [cs.CR]","DOI":"10.1007\/978-3-030-52683-2_2"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409183"},{"key":"e_1_3_2_1_29_1","unstructured":"Oracle. [n.d.]. The Java Scripting API - Java Documentation. https:\/\/docs.oracle. com\/javase\/8\/docs\/technotes\/guides\/scripting\/prog_guide\/api.html. [Accessed 25-Jun-2022]."},{"key":"e_1_3_2_1_30_1","unstructured":"Oracle. [n.d.]. What Is an Exception? - Java Documentation. https:\/\/docs.oracle. com\/javase\/tutorial\/essential\/exceptions\/definition.html. [Accessed 25-Jun2022]."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-05921-5"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Simone Scalco Duc-Ly Vu Ranindya Paramitha and Fabio Massacci. 2022. On the feasibility of detecting injections in malicious npm packages. https:\/\/doi. org\/10.1145\/3538969.3543815","DOI":"10.1145\/3538969.3543815"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420988"},{"key":"e_1_3_2_1_34_1","volume-title":"Practical Automated Detection of Malicious npm Packages. arXiv preprint arXiv:2202.13953","author":"Sejfia Adriana","year":"2022","unstructured":"Adriana Sejfia and Max Sch\u00e4fer. 2022. Practical Automated Detection of Malicious npm Packages. arXiv preprint arXiv:2202.13953 (2022)."},{"key":"e_1_3_2_1_35_1","volume-title":"A mathematical theory of communication. The Bell system technical journal 27, 3","author":"Shannon Claude Elwood","year":"1948","unstructured":"Claude Elwood Shannon. 1948. A mathematical theory of communication. The Bell system technical journal 27, 3 (1948), 379--423."},{"key":"e_1_3_2_1_36_1","unstructured":"Michael Sikorski and Andrew Honig. 2012. Practical malware analysis: the handson guide to dissecting malicious software. no starch press."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468592"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560835.3564548","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3560835.3564548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:09Z","timestamp":1750182549000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560835.3564548"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,8]]},"references-count":37,"alternative-id":["10.1145\/3560835.3564548","10.1145\/3560835"],"URL":"https:\/\/doi.org\/10.1145\/3560835.3564548","relation":{},"subject":[],"published":{"date-parts":[[2022,11,8]]},"assertion":[{"value":"2022-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}