{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,17]],"date-time":"2026-05-17T04:33:18Z","timestamp":1778992398696,"version":"3.51.4"},"reference-count":71,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,16]]},"DOI":"10.1109\/ecrime51433.2020.9493262","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T21:07:41Z","timestamp":1627420061000},"page":"1-13","source":"Crossref","is-referenced-by-count":10,"title":["Phishing With A Darknet: Imitation of Onion Services"],"prefix":"10.1109","author":[{"given":"Frederick","family":"Barr-Smith","sequence":"first","affiliation":[]},{"given":"Joss","family":"Wright","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref71","first-page":"2225","article-title":"Doppelg&#x00E4;ngers on the dark web: A large-scale assessment on phishing hidden web services","volume":"2","author":"yoon","year":"2019","journal-title":"The Web Conference 2019 - Proceedings of the World Wide Web Conference WWW 2019"},{"key":"ref70","article-title":"How Do Tor Users Interact With Onion Services?","author":"winter","year":"2018","journal-title":"USENIX Security Symposium"},{"key":"ref39","article-title":"html-similarity","author":"marca","year":"2020"},{"key":"ref38","article-title":"Length of New Onion Addresses","author":"loesing","year":"2007"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2667711"},{"key":"ref32","article-title":"Anonymisation: managing data protection risk code of practice","year":"2012"},{"key":"ref31","first-page":"20","year":"2017","journal-title":"2017 Drug Strategy"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945053"},{"key":"ref37","article-title":"Binary Codes Capable of Correcting Deletions Insertions and Reversals","author":"levenshtein","year":"1965","journal-title":"Tech Rep"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.7249\/RR1607"},{"key":"ref35","year":"2020","journal-title":"Shallot"},{"key":"ref34","year":"2014","journal-title":"Ahmia Search After GSoC Development"},{"key":"ref60","article-title":"The InterceptWelcomes Whistleblowers","year":"2019"},{"key":"ref62","article-title":"Tor: Onion Service Protocol","year":"2019"},{"key":"ref61","article-title":"A More Secure and Anonymous ProPublica Using Tor Hidden Services","author":"tigas","year":"2016"},{"key":"ref63","year":"2016","journal-title":"Tech Rep"},{"key":"ref28","year":"2019","journal-title":"Darknet Market Mortality Risks"},{"key":"ref64","article-title":"United States of America vs. Marcos Paulo De Oliveira-Annibale","volume":"91","year":"2019"},{"key":"ref27","author":"greenberg","year":"2019","journal-title":"Feds Dismantled The Dark-Web Drug Trade - But It&#x2019;s Already Rebuilding"},{"key":"ref65","article-title":"Drfrosty&#x201D; Indicted for Distribution of Methamphetamine from Modesto Using the Darknet","year":"2019"},{"key":"ref66","first-page":"6","article-title":"On the Feasibility of a Censorship Resistant Decentralized Name System","volume":"8352","author":"wachs","year":"2013","journal-title":"Foundations and Practice of Security"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/9781119183624"},{"key":"ref67","year":"0","journal-title":"Stinger-tor"},{"key":"ref68","article-title":"Global Drug Survey 2019Executive Summary","author":"winstock","year":"2019","journal-title":"Tech Rep"},{"key":"ref69","article-title":"How A Dark Web Drug Ring Was Uncovered After Suspicious A.T.M Withdrawals","author":"winston","year":"2019","journal-title":"Tech Rep"},{"key":"ref2","first-page":"1","article-title":"Bitcoin Redux","author":"anderson","year":"2018","journal-title":"Workshop on the Economics of Information Security"},{"key":"ref1","first-page":"8","article-title":"Seven Months &#x2018; Worth of Mistakes : A Longitudinal Study of Typosquatting Abuse","author":"agten","year":"2017","journal-title":"Symposium on Network and Distributed System Security"},{"key":"ref20","article-title":"Global Action Against Dark Markets on Tor Network: Press Release","year":"2014"},{"key":"ref22","year":"2019","journal-title":"DeepDotWeb Shut Down"},{"key":"ref21","article-title":"Cybercriminal Darkode Forum Taken Down Through Global Action","year":"2015"},{"key":"ref24","author":"foley","year":"0","journal-title":"Putni&#x00C5;?"},{"key":"ref23","year":"2019","journal-title":"Double Blow to Dark Web Marketplaces"},{"key":"ref26","article-title":"XKeyScore: regex foo","author":"graham","year":"2014"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/9781119425502"},{"key":"ref50","first-page":"1","article-title":"Empirical analysis of Tor Hidden Services","author":"owen","year":"2015","journal-title":"IET Information Security"},{"key":"ref51","first-page":"9","article-title":"The Tor Dark Net","author":"owen","year":"2015","journal-title":"Global Commission on Internet Governance Paper Series"},{"key":"ref59","article-title":"The Long &#x201C;Taile&#x201D; of Typosquatting Domain Names","author":"szurdi","year":"2014","journal-title":"USENIX Security Symposium"},{"key":"ref58","author":"simpson","year":"2018","journal-title":"Hire-a-Hitman Website is a Scam and its Owner has Made a Killing"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052657"},{"key":"ref56","article-title":"Dark Web Typosquatting: Scammers v. Tor","author":"riper","year":"2019"},{"key":"ref55","year":"2014","journal-title":"Thoughts and Concerns about Operation Onymous"},{"key":"ref54","author":"patel","year":"2013","journal-title":"Kali Linux Social Engineering"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355597"},{"key":"ref52","first-page":"32","article-title":"The Trade in Small Arms and Light Weapons on the Dark Web","author":"paoli","year":"2018","journal-title":"Tech Rep"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"ref11","article-title":"Tor Project to fix bug used for DDoS attacks on Onion sites for years","author":"cimpanu","year":"2019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1177\/1748895813505234"},{"key":"ref12","author":"clark","year":"2015","journal-title":"Hacker Forum Darkode is Back and More Secure Than Ever"},{"key":"ref13","year":"2016","journal-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation)"},{"key":"ref14","article-title":"Large Number of Tor Hidden Sites Seized by the FBI in Operation Onymous were Clone or Scam Sites - Archive.org","author":"cubrilovic","year":"2014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"ref16","article-title":"Tor : The Second-Generation Onion Router","author":"dingledine","year":"2018","journal-title":"ACM Special Interest Group on Data Communication"},{"key":"ref17","article-title":"The Menlo Report","author":"dittrich","year":"2012","journal-title":"Tech Rep"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186094"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/15564886.2016.1173158"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2015.11.008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/13698575.2017.1415304"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313687"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2016.04.006"},{"key":"ref8","article-title":"An Interview with the Creator of the Darknet Search Engine &#x201C;Fresh Onions","year":"2017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"ref49","article-title":"Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale","author":"oest","year":"2020","journal-title":"29th USENIX Security Symposium (USENIX Security 20)"},{"key":"ref9","year":"2019","journal-title":"CIA&#x2019;s Latest Layer An Onion Site"},{"key":"ref46","year":"2017","journal-title":"National Crime Agency Annual Report and Accounts 2017 &#x2013; 18"},{"key":"ref45","article-title":"The &#x201C;.onion&#x201D; Special-Use Domain Name","author":"muffett","year":"2015","journal-title":"Internet Engineering Task Force"},{"key":"ref48","article-title":"PhishTime : Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists","author":"oest","year":"0","journal-title":"29th USENIX Security Symposium (USENIX Security 20)"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00049"},{"key":"ref42","article-title":"Tor Wars: The Onion Cloner&#x2019;s legacy","author":"monteiro","year":"2016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2016.05.006"},{"key":"ref44","first-page":"1","article-title":"An empirical analysis of the current state of phishing attack and defence","author":"moore","year":"2007","journal-title":"Workshop on the Economics of Information Security"},{"key":"ref43","article-title":"Cryptopolitik and the Darknet","author":"moore","year":"2015","journal-title":"Journal of Strategic Studies"}],"event":{"name":"2020 APWG Symposium on Electronic Crime Research (eCrime)","location":"Boston, MA, USA","start":{"date-parts":[[2020,11,16]]},"end":{"date-parts":[[2020,11,19]]}},"container-title":["2020 APWG Symposium on Electronic Crime Research (eCrime)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9493214\/9493247\/09493262.pdf?arnumber=9493262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:55:45Z","timestamp":1656345345000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9493262\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":71,"URL":"https:\/\/doi.org\/10.1109\/ecrime51433.2020.9493262","relation":{},"subject":[],"published":{"date-parts":[[2020,11,16]]}}}