{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T15:03:37Z","timestamp":1776956617212,"version":"3.51.4"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031976193","type":"print"},{"value":"9783031976209","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-97620-9_1","type":"book-chapter","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:26:52Z","timestamp":1752139612000},"page":"3-25","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ScamFerret: Detecting Scam Websites Autonomously with\u00a0Large Language Models"],"prefix":"10.1007","author":[{"given":"Hiroki","family":"Nakano","sequence":"first","affiliation":[]},{"given":"Takashi","family":"Koide","sequence":"additional","affiliation":[]},{"given":"Daiki","family":"Chiba","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,10]]},"reference":[{"key":"1_CR1","unstructured":"Janssen, D.: How do the world\u2019s biggest countries deal with online fraud?. https:\/\/vpnoverview.com\/internet-safety\/cybercrime\/how-countries-deal-with-online-fraud-and-cybercrime\/ (2024)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Alfasi, D., Shapira, T., Barr, A.B.: Unveiling hidden links between unseen security entities (2024)","DOI":"10.1145\/3694811.3697819"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Bitaab, M., et\u00a0al.: Beyond phish: toward detecting fraudulent e-commerce websites at scale. In: Proceedings of IEEE SP (2023)","DOI":"10.1109\/SP46215.2023.10179461"},{"key":"1_CR4","unstructured":"CBS News: Cryptocurrency fraud is now the riskiest scam for consumers, according to bbb (2024). https:\/\/www.cbsnews.com\/news\/crypto-scam-risk-bbb-report\/"},{"key":"1_CR5","unstructured":"Chan, C., et\u00a0al.: Chateval: towards better llm-based evaluators through multi-agent debate (2023)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Chiang, D.C., et\u00a0al.: Can large language models be an alternative to human evaluations? In: Proceedings of ACL (2023)","DOI":"10.18653\/v1\/2023.acl-long.870"},{"key":"1_CR7","unstructured":"Curlie.org: Curlie - the collector of urls (2024). https:\/\/curlie.org\/"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"van Dooremaal, B., et\u00a0al.: Combining text and visual features to improve the identification of cloned webpages for early phishing detection. In: Proceedings of ARES (2021)","DOI":"10.1145\/3465481.3470112"},{"key":"1_CR9","unstructured":"Fashion United: Online shopping fraud in the uk is a 2.3bn pounds crisis (2024). https:\/\/fashionunited.uk\/news\/retail\/online-shopping-fraud-in-the-uk-is-a-2-3bn-pounds-crisis\/2024111278529"},{"key":"1_CR10","unstructured":"FBI: Fbi releases internet crime report (2024). https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2023_IC3Report.pdf"},{"key":"1_CR11","unstructured":"Gao, Y., et\u00a0al.: Retrieval-augmented generation for large language models: A survey (2023)"},{"key":"1_CR12","unstructured":"Google DeepMind: Gemini (2024). https:\/\/deepmind.google\/technologies\/gemini\/"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Hao, S., et\u00a0al.: Monitoring the initial DNS behavior of malicious domains. In: Proceedings of ACM IMC (2011)","DOI":"10.1145\/2068816.2068842"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Kim, D., et\u00a0al.: Security analysis on practices of certificate authorities in the HTTPS phishing ecosystem. In: Proceedings of ACM ASIACCS (2021)","DOI":"10.1145\/3433210.3453100"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Koide, T., et\u00a0al.: Chatphishdetector: detecting phishing sites using large language models. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3483905"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Kotzias, P., et\u00a0al.: Scamdog millionaire: detecting e-commerce scams in the wild. In: Proceedings of ACSAC (2023)","DOI":"10.1145\/3627106.3627184"},{"key":"1_CR17","unstructured":"LangChain: Langchain (2024). https:\/\/www.langchain.com\/"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Li, X., et\u00a0al.: Double and nothing: understanding and detecting cryptocurrency giveaway scams. In: Proceedings of NDSS (2023)","DOI":"10.14722\/ndss.2023.24584"},{"key":"1_CR19","unstructured":"Li, Y., et\u00a0al.: Knowphish: large language models meet multimodal knowledge graphs for enhancing reference-based phishing detection. In: Proceedings of USENIX Security (2024)"},{"key":"1_CR20","unstructured":"Lin, Y., et\u00a0al.: Phishpedia: a hybrid deep learning based approach to visually identify phishing webpages. In: Proceedings of USENIX Security (2021)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Liu, J., et\u00a0al.: Understanding, measuring, and detecting modern technical support scams. In: Proceedings of IEEE EuroSP (2023)","DOI":"10.1109\/EuroSP57164.2023.00011"},{"key":"1_CR22","unstructured":"mbitaab: beyondphish (2024). https:\/\/github.com\/mbitaab\/beyondphish"},{"key":"1_CR23","unstructured":"Microsoft Azure: Azure openai service \u2013 advanced language models (2024). https:\/\/azure.microsoft.com\/en-us\/products\/ai-services\/openai-service\/"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Miramirkhani, N., et\u00a0al.: Dial one for scam: a large-scale analysis of technical support scams. In: Proceedings of NDSS (2017)","DOI":"10.14722\/ndss.2017.23163"},{"key":"1_CR25","unstructured":"Neoblood Corporation: Disclosure of information on fake website (2024). https:\/\/www.neo-blood.co.jp\/"},{"key":"1_CR26","unstructured":"NISLabUGA: Tss esp23 (2024). https:\/\/github.com\/NISLabUGA\/TSS_ESP23"},{"key":"1_CR27","unstructured":"NOLA Defense: Nola defense (2024). https:\/\/www.noladefense.net\/"},{"key":"1_CR28","unstructured":"Oest, A., et\u00a0al.: Sunrise to sunset: analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale. In: Proceedings of USENIX Security (2020)"},{"key":"1_CR29","unstructured":"Playwright: Fast and reliable end-to-end testing for modern web app (2024). https:\/\/playwright.dev\/"},{"key":"1_CR30","unstructured":"Pochat, V.L., et\u00a0al.: Tranco: a research-oriented top sites ranking hardened against manipulation. In: Proceedings of NDSS (2019)"},{"key":"1_CR31","unstructured":"reddit inc.: reddit.com: api documentation (2024). https:\/\/www.reddit.com\/dev\/api\/"},{"key":"1_CR32","unstructured":"Roy, S.S., et\u00a0al.: From chatbots to phishbots? - preventing phishing scams created using chatgpt, google bard and claude (2023)"},{"key":"1_CR33","unstructured":"Saad, B.A.M., et\u00a0al.: Conning the crypto conman: end-to-end analysis of cryptocurrency-based technical support scams (2024)"},{"key":"1_CR34","unstructured":"ScamGuard$$^{{\\rm TM}}$$: Listings (2024). https:\/\/scamguard.com\/reviews\/"},{"key":"1_CR35","unstructured":"Sectigo: crt.sh | certificate search (2024). https:\/\/crt.sh\/"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Sottana, A., et\u00a0al.: Evaluation metrics in the era of GPT-4: reliably evaluating large language models on sequence to sequence tasks. In: Proceedings of EMNLP (2023)","DOI":"10.18653\/v1\/2023.emnlp-main.543"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Srinivasan, B., et\u00a0al.: Exposing search and advertisement abuse tactics and infrastructure of technical support scammers. In: Proceedings of WWW (2018)","DOI":"10.1145\/3178876.3186098"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Tang, S., et\u00a0al.: Clues in tweets: twitter-guided discovery and analysis of SMS spam. In: Proceedings of ACM CCS (2022)","DOI":"10.1145\/3548606.3559351"},{"key":"1_CR39","unstructured":"Tavily: Tavily (2024). https:\/\/tavily.com\/"},{"key":"1_CR40","unstructured":"The Scam Directory: The scam directory (2024). https:\/\/scam.directory\/"},{"key":"1_CR41","unstructured":"Trustpilot: Trustpilot reviews: Experience the power of customer reviews (2024). https:\/\/www.trustpilot.com\/"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Vallina, P., et\u00a0al.: Mis-shapes, mistakes, misfits: an analysis of domain classification services. In: Proceedings of ACM IMC (2020)","DOI":"10.1145\/3419394.3423660"},{"key":"1_CR43","unstructured":"VirusTotal: Virustotal (2024). https:\/\/www.virustotal.com\/"},{"key":"1_CR44","unstructured":"Watchlist Internet: Fraudulent online stores (2024). https:\/\/www.watchlist-internet.at\/liste-betruegerischer-shops\/"},{"key":"1_CR45","unstructured":"White, J., et\u00a0al.: A prompt pattern catalog to enhance prompt engineering with chatgpt (2023)"},{"key":"1_CR46","unstructured":"X Corp: Twitter api | products | twitter developer platform (2024). https:\/\/developer.twitter.com\/en\/products\/twitter-api"},{"key":"1_CR47","unstructured":"Xigao Li: Double and nothing: Understanding and detecting cryptocurrency giveaway scams (2024). https:\/\/double-and-nothing.github.io\/"},{"key":"1_CR48","unstructured":"Yao, S., et\u00a0al.: React: synergizing reasoning and acting in language models. In: Proceedings of ICLR (2023)"},{"key":"1_CR49","unstructured":"Zheng, L., et\u00a0al.: Judging llm-as-a-judge with mt-bench and chatbot arena. In: Proceedings of NeurIPS (2023)"},{"key":"1_CR50","unstructured":"Zhou, Y., et\u00a0al.: Large language models are human-level prompt engineers. In: Proceedings of ICLR (2023)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97620-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:27:18Z","timestamp":1752139638000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97620-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031976193","9783031976209"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97620-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Graz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dimva.org\/dimva2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}