{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:59:03Z","timestamp":1760785143228,"version":"3.37.3"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3280815","type":"journal-article","created":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T17:39:49Z","timestamp":1685381989000},"page":"1-1","source":"Crossref","is-referenced-by-count":1,"title":["Stargazer: Long-term and Multiregional Measurement of Timing\/Geolocation-based Cloaking"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1250-7488","authenticated-orcid":false,"given":"Shota","family":"Fujii","sequence":"first","affiliation":[{"name":"Research &#x0026; Development Group, Hitachi, Ltd, Kanagawa, Japan"}]},{"given":"Takayuki","family":"Sato","sequence":"additional","affiliation":[{"name":"Research &#x0026; Development Group, Hitachi, Ltd, Kanagawa, Japan"}]},{"given":"Sho","family":"Aoki","sequence":"additional","affiliation":[{"name":"Research &#x0026; Development Group, Hitachi, Ltd, Kanagawa, Japan"}]},{"given":"Yu","family":"Tsuda","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Tokyo, Japan"}]},{"given":"Nobutaka","family":"Kawaguchi","sequence":"additional","affiliation":[{"name":"Research &#x0026; Development Group, Hitachi, Ltd, Kanagawa, Japan"}]},{"given":"Tomohiro","family":"Shigemoto","sequence":"additional","affiliation":[{"name":"Research &#x0026; Development Group, Hitachi, Ltd, Kanagawa, Japan"}]},{"given":"Masato","family":"Terada","sequence":"additional","affiliation":[{"name":"Research &#x0026; Development Group, Hitachi, Ltd, Kanagawa, Japan"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329834"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LCN44214.2019.8990794"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52683-2_9"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2017.1283910"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00021"},{"key":"ref37","first-page":"625","article-title":"Automatically detecting vulnerable websites before they turn malicious","author":"soska","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3538997"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23218"},{"journal-title":"Unit42 TA551 Email Attack Campaign Switches From Valak to IcedID","year":"2022","key":"ref31"},{"journal-title":"MITRE ATT&CK TA551 GOLD CABIN Shathak Group G0127","year":"2022","key":"ref30"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_23"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1964114.1964123"},{"key":"ref10","article-title":"The underground economy of spam: A botmaster&#x2019;s perspective of coordinating large-scale spam campaigns","author":"stone-gross","year":"2011","journal-title":"Proc 4th USENIX Workshop Large-Scale Exploits Emergent Threats"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487410"},{"journal-title":"JPCERT\/CC Malware Used by Lazarus After Network Intrusion","year":"2022","key":"ref2"},{"journal-title":"Unit42 Case Study Emotet Thread Hijacking an Email Attack Technique","year":"2022","key":"ref1"},{"key":"ref17","first-page":"3757","article-title":"Catching phishers by their bait: Investigating the Dutch phishing landscape through phishing kit detection","author":"bijmans","year":"2021","journal-title":"Proc 30th USENIX Secur Symp"},{"key":"ref39","first-page":"42","article-title":"Large-scale analysis of malware downloaders","author":"rossow","year":"2012","journal-title":"Proceedings of the 4th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.50"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.33"},{"key":"ref19","first-page":"721","article-title":"Investigating commercial pay-per-install and the distribution of unwanted software","author":"thomas","year":"2016","journal-title":"Proc 25th USENIX Conf Secur Symp"},{"key":"ref18","first-page":"1","article-title":"Measuring pay-per-install: The commoditization of malware distribution","author":"caballero","year":"2011","journal-title":"Proc 20th USENIX Secur Symp"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135901"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417883"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3420018"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00014"},{"journal-title":"Unit42 Detecting Patient Zero Web Threats in Real Time With Advanced URL Filtering","year":"2022","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102114"},{"journal-title":"Check Point Research Google is on Guard Sharks Shall not Pass!","year":"2022","key":"ref20"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377743"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134614"},{"journal-title":"FOREGENIX An Overview on Purple Fox","year":"2022","key":"ref22"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.55"},{"journal-title":"Gamaredon APT Targets Ukrainian Government Agencies in New Campaign","year":"2022","key":"ref21"},{"key":"ref43","first-page":"431","article-title":"Spoki: Unveiling a new wave of scanners through a reactive network telescope","author":"hiesgen","year":"2022","journal-title":"Proc 31st USENIX Secur Symp"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23243"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E93.B.1131"},{"journal-title":"McAFee Rovnix Downloader Updated With SinkHole and Time Checks","year":"2022","key":"ref29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663729"},{"key":"ref7","first-page":"361","article-title":"Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale","author":"oest","year":"2020","journal-title":"Proc 29th USENIX Secur Symp"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945050"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813724"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23269"},{"key":"ref6","first-page":"379","article-title":"PhishTime: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists","author":"oest","year":"2020","journal-title":"Proc 29th USENIX Secur Symp"},{"key":"ref5","first-page":"1","article-title":"Inside a phisher&#x2019;s mind: Understanding the anti-phishing ecosystem through phishing kit analysis","author":"oest","year":"2018","journal-title":"Proc APWG Symp Electron Crime Res (eCrime)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00116"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/6514899\/10138205.pdf?arnumber=10138205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T21:55:59Z","timestamp":1686088559000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10138205\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3280815","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2023]]}}}