{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期部分”:[[2024,5,29]],“日期时间”:“2024-05-29T22:31:40Z”,“时间戳”:1717021900476},“参考计数”:14,“出版商”:“电气与电子工程师学会(IEEE)”,“发行”:“2”,“许可证”:[{“开始”:{:“日期部分“:[2018,3,1]],”时间”:“2018-03-01T00:00:00Z”,“timestamp”:1519862400000},“content-version”:“vor”,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/ieee.html”},{“start”:{“date-parts”:[[2018,3,1]],“date-time”:“2018-03-01T00:00:00Z”,”timestamp“1519862400000},”content-v版本“:”stm-asf“,”delay-in-days“:0,”URL“:“https:\/\/doi.org\/10.15223\/policy-029”},{“start”:{“date-parts”:[[2018,3,1]],“date-time”:“2018-03-01T00:00:00Z”,“timestamp”:1519862400000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“http:\/\/doi.org\/10.15223\/policy-037”}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},“short-container-title”:[“IEEE安全隐私”],“published-print”:{“date-parts”:[[2018,3]]},“DOI”:“10.1109\/msp.2018.1870858”,“type”:“journal-article”,“created”:{“date-parts”:[2018,3,30]],“date-time”:“2018-03-30T18:09:48Z”,“timestamp”:152243388000},”page“:”12-22“source”:”Crossref“,”is-referenced-by-count“:14,”title“:[”Mechanical Phish:Resilient t自治黑客攻击“],”前缀“:”10.1109“,“卷”:“16”,“作者”:[{“given”:“Yan”,“family”:“Shoshitaishvili”,“sequence”:“first”,“affiliation”:[}“name”:“Arizona State University”}]},{“给定”:“Antonio”,“家庭”:“Bianchi”,“序列”:“additional”,“从属关系”:[[{名称:“加州大学圣巴巴拉分校”}]{,“givent”:“Kevin”:[{“name”:“加州大学圣巴巴拉分校”}]},{“given”:“Amat”,“family”:“Cama”,“sequence”:“additional”,“affiliation”:[{'“name”:“Independent Research”}]{,{'given“:”Jacopo“,”family“:”Corbetta“,”sequence“:”additional“”,“从属关系”:[{“name”:“PayJunction”}]},{“given”:“Audrey”,“family”:“Dutcher”,“sequence”:“additional”,“affiliation”:[[{”name“:”加州大学圣巴巴拉分校“}]}.,{”given“:”John“,”family“:”Grosen“,”sequence“:”additional:“additional”,“affiliation”:[{“name”:“加州大学圣巴巴拉分校”}]},{“given”:“Aravind”,“family”:“Machry”,“sequence”:“additive”,“feliation”:[{”name“:”加州大学圣巴巴拉分校“}]},{”given“:”Chris“,”family“:”Salls“,”sequence“:”additional“,{“given”:“Nick”,“family”:“Stephens”,“sequence”:“additional”,“affiliation”:[{“name”:“Independent Research”}]},{“given”:“Ruoyu”,“家人”:“Wang”,“序列”:“附加”,“从属关系”:[[{”name“:“加州大学圣巴巴拉分校”}]{,“giveni”:“Giovanni”,“家庭”:“Vigna”,“sequence”:“additionable”,“abfiliation“:[{name”:“加州大学圣巴巴拉分校”}],“成员”:“263”,“参考”:[{“key”:“ref10”,“doi断言者”:“publisher”,“doi”:“10.1145\/1250734.1250746”},{“key”:“ref11”,“doi断言者”:“publisher”,“doi”:“10.1109\/WCRE.2013.6671280”},{“key”:“ref12”,“首页”:“627”,“文章标题”:“可重新组装的分解”,“作者”:“wang”,“年份“:”0“,“journal-title”:“24th USENIX Security Symposium(USENIX-Security 15)”},{“key”:“ref13”,“author”:“辛迪加”,“year”:“2015”,“johnal-title:“Legimate Business syndicate CGC Documentation”}、{“密钥”:“ref14”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3133956.3134105”}“”:“American Fuzzy Lop”},{“key”:“ref3”,“article-title”:“Ramblr:使重新组装再次伟大”,“author”:“wang”,“year”:“0”,“journal-title“:”Proc Network and Distributed System Security Symp(NDSS)},}“keys”:“ref6”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1772690.1772720”}:“10.1109\/SP.2016.17”},{“key”:“ref8”,“year”:“2014”,“journal-title”:“Kubernetes”},{”key“:”ref7“,”article-title“:”TTAnalyze:恶意软件分析工具“,”author“:”bayer“,”year“:”0“,”journal-title“:”EICAR“},”{“key”:”ref2“,”article-title“:”Driller:通过选择性符号执行增强模糊度“,”“author”:“stephens”,“年”:“0”,“journal-ttitle”“”:“Proc Network and Distributed System Security Symp(NDSS)”},{“key”:“ref1”,“article-title”:“Cyber Grand Shellphish”,“year”:“2017”,“journal-title“:”Shellphis“},”key“:”ref9“,”doi-asserted-by“:”publisher“,”doi“:”10.1145\/106501044“}],”container-title:“http://\/xplorestaging.ieee.org\/ielx7\/8013\/8328966.pdf?arnumber=8328966”,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2022,5,5]],“date-time”:”2022-05T20:04:31Z“timestamp”:1651781071000},“score”:1,“resource”:{“主要”:{“URL”:“https:\/\/ieeexplore.iee.org\/document\/8328966\/”}},“副标题”:[],“短标题”:[],“发布”:{“日期-部件”:[[2018,3]]}0-7993“,”1558-4046“],”ISSN-type“:[{”value“:”1540-7993,“type”:“electronic”}],“subject”:[],“published”:{“date-parts”:[[2018,3]]}}