{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:24:31Z","timestamp":1755926671230,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031094835"},{"type":"electronic","value":"9783031094842"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-09484-2_9","type":"book-chapter","created":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T14:02:51Z","timestamp":1656079371000},"page":"156-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Human in\u00a0Every APE: Delineating and\u00a0Evaluating the\u00a0Human Analysis Systems of\u00a0Anti-Phishing Entities"],"prefix":"10.1007","author":[{"given":"Bhupendra","family":"Acharya","sequence":"first","affiliation":[]},{"given":"Phani","family":"Vadrevu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,24]]},"reference":[{"key":"9_CR1","unstructured":"Free CAPTCHA-Service. http:\/\/captchas.net\/"},{"key":"9_CR2","unstructured":"Google transparency report. https:\/\/transparencyreport.google.com\/safe-browsing\/search. Accessed 13 Jan 2022"},{"key":"9_CR3","unstructured":"Math Captcha. https:\/\/www.jotform.com\/widgets\/math-captcha"},{"key":"9_CR4","unstructured":"Puppeteer. https:\/\/github.com\/puppeteer\/puppeteer. Accessed 13 Jan 2022"},{"key":"9_CR5","unstructured":"ReCAPTCHA demo. https:\/\/www.google.com\/recaptcha\/api2\/demo"},{"key":"9_CR6","unstructured":"Selenium. https:\/\/www.selenium.dev\/. Accessed 13 Jan 2022"},{"key":"9_CR7","unstructured":"Statscounter: Browser market share. https:\/\/gs.statcounter.com\/browser-market-share"},{"key":"9_CR8","unstructured":"User-agent switcher and manager. https:\/\/chrome.google.com\/webstore\/detail\/user-agent-switcher-for-c\/djflhoibgkdhkhhcedjiklpkjnoahfmg"},{"key":"9_CR9","unstructured":"User-agent switcher and manager. https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/user-agent-string-switcher\/"},{"key":"9_CR10","unstructured":"Acharya, B., Vadrevu, P.: PhishPrint: evading phishing detection crawlers by prior profiling. In: 30th USENIX Security Symposium, USENIX Security 2021, 11\u201313 August 2021, pp. 3775\u20133792. USENIX Association (2021)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Das, A., Borisov, N., Caesar, M.: Tracking mobile web users through motion sensors: attacks and defenses. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23390"},{"key":"9_CR12","unstructured":"Goodfellow, I.J., Bulatov, Y., Ibarz, J., Arnoud, S., Shet, V.D.: Multi-digit number recognition from street view imagery using deep convolutional neural networks. In: 2nd International Conference on Learning Representations, ICLR 2014, Banff, 14\u201316 April 2014, Conference Track Proceedings (2014)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Maroofi, S., Korczynski, M., Duda, A.: Are you human?: resilience of phishing detection to evasion techniques based on human verification. In: IMC 2020: ACM Internet Measurement Conference, Virtual Event, USA, 27\u201329 October 2020, pp. 78\u201386. ACM (2020)","DOI":"10.1145\/3419394.3423632"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Maroofi, S., Korczy\u0144ski, M., Hesselman, C., Ampeau, B., Duda, A.: COMAR: classification of compromised versus maliciously registered domains. In: 2020 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 607\u2013623. IEEE (2020)","DOI":"10.1109\/EuroSP48549.2020.00045"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Miramirkhani, N., Starov, O., Nikiforakis, N.: Dial one for scam: analyzing and detecting technical support scams. In: 22nd Annual Network and Distributed System Security Symposium NDSS, vol. 16 (2016)","DOI":"10.14722\/ndss.2017.23163"},{"key":"9_CR16","unstructured":"Mowery, K., Shacham, H.: Pixel perfect: fingerprinting canvas in HTML5. In: Proceedings of W2SP 2012 (2012)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Oest, A., Safaei, Y., Doup\u00e9, A., Ahn, G.J., Wardman, B., Tyers, K.: PhishFarm: a scalable framework for measuring the effectiveness of evasion techniques against browser phishing blacklists. In: 2019 IEEE Symposium on Security and Privacy (SP) (2019)","DOI":"10.1109\/SP.2019.00049"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Oest, A., Safei, Y., Doup\u00e9, A., Ahn, G.J., Wardman, B., Warner, G.: Inside a phisher\u2019s mind: understanding the anti-phishing ecosystem through phishing kit analysis. In: 2018 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201312. IEEE (2018)","DOI":"10.1109\/ECRIME.2018.8376206"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Peng, P., Yang, L., Song, L., Wang, G.: Opening the blackbox of VirusTotal: analyzing online phishing scan engines. In: Proceedings of the Internet Measurement Conference, pp. 478\u2013485 (2019)","DOI":"10.1145\/3355369.3355585"},{"key":"9_CR20","unstructured":"Roy-Chowdhury, R.: Google: How we keep you safe online every day (2020). https:\/\/blog.google\/technology\/safety-security\/how-we-keep-you-safe-online-every-day\/"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Vadrevu, P., Perdisci, R.: What you see is not what you get: discovering and tracking social engineering attack campaigns. In: Proceedings of the Internet Measurement Conference, pp. 308\u2013321 (2019)","DOI":"10.1145\/3355369.3355600"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Ye, G., et al.: Yet another text captcha solver: a generative adversarial network based approach. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, 15\u201319 October 2018, pp. 332\u2013348. ACM (2018)","DOI":"10.1145\/3243734.3243754"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, P., et al.: CrawlPhish: large-scale analysis of client-side cloaking techniques in phishing. In: 2021 IEEE Symposium on Security and Privacy (SP) (2021)","DOI":"10.1109\/SP40001.2021.00021"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-09484-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T14:03:40Z","timestamp":1656079420000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-09484-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031094835","9783031094842"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-09484-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.unica.it\/dimva2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}