{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:13:11Z","timestamp":1761621191111},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319132563"},{"type":"electronic","value":"9783319132570"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13257-0_17","type":"book-chapter","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T05:43:57Z","timestamp":1414993437000},"page":"291-308","source":"Crossref","is-referenced-by-count":38,"title":["Soundsquatting: Uncovering the Use of Homophones in Domain Squatting"],"prefix":"10.1007","author":[{"given":"Nick","family":"Nikiforakis","sequence":"first","affiliation":[]},{"given":"Marco","family":"Balduzzi","sequence":"additional","affiliation":[]},{"given":"Lieven","family":"Desmet","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Piessens","sequence":"additional","affiliation":[]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"IP Addresses of Search Engine Spiders, \n                    \n                      http:\/\/iplists.com\/"},{"key":"17_CR2","unstructured":"WHO \u2014 Visual impairment and blindness, \n                    \n                      http:\/\/www.who.int\/mediacentre\/factsheets\/fs282\/en\/"},{"key":"17_CR3","unstructured":"Anticybersquatting Consumer Protection Act (ACPA) (November 1999), \n                    \n                      http:\/\/www.patents.com\/acpa.htm"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Banerjee, A., Barman, D., Faloutsos, M., Bhuyan, L.N.: Cyber-fraud is one typo away. In: Proceedings of IEEE INFOCOM (2008)","DOI":"10.1109\/INFOCOM.2008.258"},{"key":"17_CR5","unstructured":"BlueTornado. Skyvi (Siri for Android), \n                    \n                      http:\/\/www.skyviapp.com"},{"key":"17_CR6","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-15257-3_7","volume-title":"Security and Privacy \u2013 Silver Linings in the Cloud","author":"S.E. Coull","year":"2010","unstructured":"Coull, S.E., White, A.M., Yen, T.-F., Monrose, F., Reiter, M.K.: Understanding domain registration abuses. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) SEC 2010. IFIP AICT, vol.\u00a0330, pp. 68\u201379. Springer, Heidelberg (2010)"},{"key":"17_CR7","unstructured":"Dinaburg, A.: Bitsquatting: DNS Hijacking without Exploitation. In: Proceedings of BlackHat Security (July 2011)"},{"key":"17_CR8","unstructured":"Edelman, B.: Large-scale registration of domains with typographical errors (2003)"},{"key":"17_CR9","unstructured":"Even Grounds - How Do Blind People Use The Computer, \n                    \n                      http:\/\/www.evengrounds.com\/blog\/how-do-blind-people-use-the-computer"},{"key":"17_CR10","unstructured":"Ferguson, R.: Tvviter Typosquatting Phishing Site, \n                    \n                      http:\/\/countermeasures.trendmicro.eu\/tvviter-typosquatting-phishing-site\/"},{"issue":"2","key":"17_CR11","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/503124.503156","volume":"45","author":"E. Gabrilovich","year":"2002","unstructured":"Gabrilovich, E., Gontmakher, A.: The homograph attack. Communications of the ACM\u00a045(2), 128 (2002)","journal-title":"Communications of the ACM"},{"key":"17_CR12","unstructured":"Gee, G., Kim, P.: Doppelganger Domains, \n                    \n                      http:\/\/www.wired.com\/images_blogs\/threatlevel\/2011\/09\/Doppelganger.Domains.pdf"},{"key":"17_CR13","unstructured":"Golinveaux, J.: What\u2019s in a domain name: Is cybersquatting trademark dilution? University of San Francisco Law Review 33 U.S.F. L. Rev. (1998-1999)"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Shulman, H.: Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org. In: CNS 2013, pp. 224\u2013232. IEEE (2013)","DOI":"10.1109\/CNS.2013.6682711"},{"key":"17_CR15","unstructured":"Hidayat, A.: PhantomJS: Headless WebKit with JavaScript API"},{"key":"17_CR16","unstructured":"Holgers, T., Watson, D.E., Gribble, S.D.: Cutting through the confusion: A measurement study of homograph attacks. In: Proceedings of USENIX ATC (2006)"},{"issue":"2","key":"17_CR17","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MSP.2008.52","volume":"6","author":"M. Jakobsson","year":"2008","unstructured":"Jakobsson, M., Finn, P., Johnson, N.: Why and How to Perform Fraud Experiments. IEEE Security & Privacy\u00a06(2), 66\u201368 (2008)","journal-title":"IEEE Security & Privacy"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Ratkiewicz, J.: Designing ethical phishing experiments: A study of (ROT13) rOnl query features. In: WWW 2006 (2006)","DOI":"10.1145\/1135777.1135853"},{"key":"17_CR19","unstructured":"Kesmodel, D.: The Domain Game: How People Get Rich from Internet Domain Names. Xlibris Corporation (2008)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"McMahon, R.: BIND 8.2 NXT Remote Buffer Overflow Exploit (2000)","DOI":"10.1016\/S1353-4858(00)08003-X"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-14577-3_15","volume-title":"Financial Cryptography and Data Security","author":"T. Moore","year":"2010","unstructured":"Moore, T., Edelman, B.: Measuring the perpetrators and funders of typosquatting. In: Sion, R. (ed.) FC 2010. LNCS, vol.\u00a06052, pp. 175\u2013191. Springer, Heidelberg (2010)"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Nikiforakis, N., Acker, S.V., Meert, W., Desmet, L., Piessens, F., Joosen, W.: Bitsquatting: Exploiting bit-flips for fun, or profit? In: WWW 2013, pp. 989\u2013998 (2013)","DOI":"10.1145\/2488388.2488474"},{"key":"17_CR23","unstructured":"Orca: a free, open source, flexible, and extensible screen reader"},{"key":"17_CR24","first-page":"48","volume":"22","author":"M.S. Seidenberg","year":"1996","unstructured":"Seidenberg, M.S., Petersen, A., MacDonald, M.C., Plaut, D.C.: Pseudohomophone Effects and Models of Word Recognition. Journal of Experimental Psychology: Learning, Memory and Cognition\u00a022, 48\u201362 (1996)","journal-title":"Journal of Experimental Psychology: Learning, Memory and Cognition"},{"key":"17_CR25","unstructured":"Stewart, J.: DNS Cache Poisoning - The Next Generation (2003)"},{"key":"17_CR26","unstructured":"ScreenReader.net: freedom for blind and Visually impaired people"},{"key":"17_CR27","unstructured":"Wang, Y.-M., Beck, D., Wang, J., Verbowski, C., Daniels, B.: Strider typo-patrol: Discovery and analysis of systematic typo-squatting. In: SRUTI 2006 (2006)"},{"key":"17_CR28","unstructured":"List of dialect-independent homophones, \n                    \n                      http:\/\/en.wiktionary.org\/wiki\/Appendix:List_of_dialect-independent_homophones"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13257-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T08:31:14Z","timestamp":1559032274000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13257-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319132563","9783319132570"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13257-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}