{"id":"https://openalex.org/W4396757480","doi":"https://doi.org/10.1145/3589334.3645540","title":"Detecting and Understanding Self-Deleting JavaScript Code","display_name":"Detecting and Understanding Self-Deleting JavaScript Code","publication_year":2024,"publication_date":"2024-05-08","ids":{"openalex":"https://openalex.org/W4396757480","doi":"https://doi.org/10.1145/3589334.3645540"},"language":"en","primary_location":{"id":"doi:10.1145/3589334.3645540","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3589334.3645540","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Web Conference 2024","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3589334.3645540","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087206077","display_name":"Xinzhe Wang","orcid":"https://orcid.org/0009-0000-1758-5461"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinzhe Wang","raw_affiliation_strings":["The Chinese University of Hong Kong, Hong Kong SAR, Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong SAR, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003922435","display_name":"Zeyang Zhuang","orcid":"https://orcid.org/0009-0006-7898-6895"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zeyang Zhuang","raw_affiliation_strings":["The Chinese University of Hong Kong, Hong Kong SAR, Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong SAR, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101960529","display_name":"Wei Meng","orcid":"https://orcid.org/0000-0001-8260-3304"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Meng","raw_affiliation_strings":["The Chinese University of Hong Kong, Hong Kong SAR, Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong SAR, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016082884","display_name":"James Cheng","orcid":"https://orcid.org/0000-0001-6313-6288"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"James Cheng","raw_affiliation_strings":["The Chinese University of Hong Kong, Hong Kong SAR, Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong SAR, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5087206077"],"corresponding_institution_ids":["https://openalex.org/I177725633"],"apc_list":null,"apc_paid":null,"fwci":0.3894,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51701963,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1768","last_page":"1778"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.8295533657073975},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8169223070144653},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.6448401808738708},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4784812331199646},{"id":"https://openalex.org/keywords/unobtrusive-javascript","display_name":"Unobtrusive JavaScript","score":0.47559627890586853},{"id":"https://openalex.org/keywords/rich-internet-application","display_name":"Rich Internet application","score":0.27871477603912354}],"concepts":[{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.8295533657073975},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8169223070144653},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6448401808738708},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4784812331199646},{"id":"https://openalex.org/C198240166","wikidata":"https://www.wikidata.org/wiki/Q2298909","display_name":"Unobtrusive JavaScript","level":4,"score":0.47559627890586853},{"id":"https://openalex.org/C103048170","wikidata":"https://www.wikidata.org/wiki/Q725485","display_name":"Rich Internet application","level":3,"score":0.27871477603912354},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3589334.3645540","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3589334.3645540","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Web Conference 2024","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3589334.3645540","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3589334.3645540","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Web Conference 2024","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1577719850","https://openalex.org/W1985683032","https://openalex.org/W2044675702","https://openalex.org/W2075344129","https://openalex.org/W2119359024","https://openalex.org/W2474220815","https://openalex.org/W2604507227","https://openalex.org/W2614073125","https://openalex.org/W2792874054","https://openalex.org/W2800651024","https://openalex.org/W2904027722","https://openalex.org/W2912248945","https://openalex.org/W2947561144","https://openalex.org/W2953684237","https://openalex.org/W2962940036","https://openalex.org/W2963779160","https://openalex.org/W2970044827","https://openalex.org/W2970323597","https://openalex.org/W2980770947","https://openalex.org/W3003683799","https://openalex.org/W3007497615","https://openalex.org/W3046732376","https://openalex.org/W3100328669","https://openalex.org/W3104970816","https://openalex.org/W3117384287","https://openalex.org/W3137713441","https://openalex.org/W3196199748","https://openalex.org/W4285507391","https://openalex.org/W4308632297","https://openalex.org/W6892644997"],"related_works":["https://openalex.org/W650647575","https://openalex.org/W2472584751","https://openalex.org/W2476571673","https://openalex.org/W597036300","https://openalex.org/W827014118","https://openalex.org/W2737557375","https://openalex.org/W648161522","https://openalex.org/W2164032016","https://openalex.org/W2937855189","https://openalex.org/W605139400"],"abstract_inverted_index":{"Self-deletion":[0],"is":[1,85],"a":[2,58,73],"well-known":[3],"strategy":[4],"frequently":[5],"utilized":[6],"by":[7],"malware":[8],"to":[9,65],"evade":[10],"detection.":[11],"Recently,":[12],"this":[13,31],"technique":[14],"has":[15,108],"found":[16],"its":[17],"way":[18],"into":[19],"client-side":[20,38,68,122],"JavaScript":[21,28,39,52,60],"code,":[22],"significantly":[23],"raising":[24],"the":[25,36,43,88],"complexity":[26],"of":[27,76],"analysis.":[29],"In":[30],"work,":[32],"we":[33,103],"systematically":[34],"study":[35,67],"emerging":[37],"self-deletion":[40,84,99,107],"behavior":[41],"on":[42],"web.":[44],"We":[45,71],"tackle":[46],"various":[47],"technical":[48],"challenges":[49],"associated":[50],"with":[51,113],"dynamic":[53],"analysis":[54],"and":[55],"introduce":[56],"JSRay,":[57],"browser-based":[59],"runtime":[61],"monitoring":[62],"system":[63],"designed":[64],"comprehensively":[66],"script":[69,83],"deletion.":[70],"conduct":[72],"large-scale":[74],"measurement":[75],"one":[77],"million":[78],"popular":[79],"websites,":[80],"revealing":[81],"that":[82,95,106],"prevalent":[86],"in":[87,121],"real":[89],"world.":[90],"While":[91],"our":[92],"findings":[93],"indicate":[94],"most":[96],"developers":[97],"employ":[98],"for":[100,117],"legitimate":[101],"purposes,":[102],"also":[104],"discover":[105],"already":[109],"been":[110],"employed":[111],"together":[112],"other":[114],"anti-analysis":[115],"techniques":[116],"cloaking":[118],"suspicious":[119],"operations":[120],"JavaScript.":[123]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
