{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:14:39Z","timestamp":1766578479644,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046763","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"477-490","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":61,"title":["Cloak and dagger"],"prefix":"10.1145","author":[{"given":"David Y.","family":"Wang","sequence":"first","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Geoffrey M.","family":"Voelker","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"volume-title":"Mary Vernon. Mapping Internet Sensors with Probe Response Attacks. In Proceedings of the 14th USENIX Security Symposium","year":"2005","author":"Bethencourt John","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","first-page":"21","volume-title":"Broder. On the Resemblance and Containment of Documents. In Proceedings of the Compression and Complexity of Sequences (SEQUENCES'97)","author":"Andrei","year":"1997"},{"volume-title":"Pearson Education","year":"2002","author":"Caldwell Lee G.","key":"e_1_3_2_1_3_1"},{"volume-title":"Proceedings of the SIGIR Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","year":"2006","author":"Chellapilla Kumar","key":"e_1_3_2_1_4_1"},{"volume-title":"Marc Dacier. An Analysis of Rogue AV Campaigns. In Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID)","year":"2010","author":"Cova Marco","key":"e_1_3_2_1_5_1"},{"volume-title":"February 24, 2011.","author":"Efrati Amir","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"Google Safe Browsing API. http:\/\/code.google.com\/apis\/safebrowsing\/.  Google Safe Browsing API. http:\/\/code.google.com\/apis\/safebrowsing\/."},{"volume-title":"Martin Abadi. deSEO: Combating Search-Result Poisoning. In Proceedings of the 20th USENIX Security Symposium","year":"2011","author":"John John P.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Brian Krebs. Huge Decline in Fake AV Following Credit Card Processing Shakeup. http:\/\/krebsonsecurity.com\/2011\/08\/huge-decline- in-fake-av-following-credit-card-processing- shakeup\/ August 2011.  Brian Krebs. Huge Decline in Fake AV Following Credit Card Processing Shakeup. http:\/\/krebsonsecurity.com\/2011\/08\/huge-decline- in-fake-av-following-credit-card-processing- shakeup\/ August 2011."},{"volume-title":"Nicolas Christin. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade. In Proceedings of the 20th USENIX Security Symposium","year":"2011","author":"Leontiadis Nektarios","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.09.056"},{"volume-title":"Issued","year":"2005","author":"Najork Marc A.","key":"e_1_3_2_1_13_1"},{"volume-title":"Francis Hsu. A Quantitative Study of Forum Spamming Using Contextbased Analysis. In Proceedings of 15th Network and Distributed System Security (NDSS) Symposium","year":"2007","author":"Niu Yuan","key":"e_1_3_2_1_14_1"},{"volume-title":"Xin Zhao. The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. In Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10)","year":"2010","author":"Rajab Moheeb Abu","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"Search Engine Marketing Professional Organization (SEMPO). State of Search Engine Marketing Report Says Industry to Grow from $14.6 Billion in 2009 to $16.6 Billion in 2010. http:\/\/www.sempo.org\/news\/03--25--10 March 2010.  Search Engine Marketing Professional Organization (SEMPO). State of Search Engine Marketing Report Says Industry to Grow from $14.6 Billion in 2009 to $16.6 Billion in 2010. http:\/\/www.sempo.org\/news\/03--25--10 March 2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/331403.331405"},{"key":"e_1_3_2_1_18_1","unstructured":"Julien Sobrier. Tricks to easily detect malware and scams in search results. http:\/\/research.zscaler.com\/2010\/06\/tricks-to-easily-detect-malware-and.html June 3 2010.  Julien Sobrier. Tricks to easily detect malware and scams in search results. http:\/\/research.zscaler.com\/2010\/06\/tricks-to-easily-detect-malware-and.html June 3 2010."},{"key":"e_1_3_2_1_19_1","unstructured":"Danny Sullivan. Search Engine Optimization Firm Sold For $95 Million. http:\/\/searchenginewatch.com\/ 2163001 September 2000. Search Engine Watch.  Danny Sullivan. Search Engine Optimization Firm Sold For $95 Million. http:\/\/searchenginewatch.com\/ 2163001 September 2000. Search Engine Watch."},{"key":"e_1_3_2_1_20_1","unstructured":"Jason Tabeling. Keyword Phrase Value: Click-Throughs vs. Conversions. http:\/\/searchenginewatch.com\/ 3641985 March 8 2011.  Jason Tabeling. Keyword Phrase Value: Click-Throughs vs. Conversions. http:\/\/searchenginewatch.com\/ 3641985 March 8 2011."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242612"},{"key":"e_1_3_2_1_23_1","unstructured":"Wordtracker. Five Reasons Why Wordtracker Blows Other Keywords Tools Away. http:\/\/www.wordtracker.com\/find-the-best-keywords.html.  Wordtracker. Five Reasons Why Wordtracker Blows Other Keywords Tools Away. http:\/\/www.wordtracker.com\/find-the-best-keywords.html."},{"volume-title":"Wu and Brian D. Davison. Cloaking and Redirection: A Preliminary Study. In Proceedings of the SIGIR Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","year":"2005","author":"Baoning","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135901"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS'11"},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046763","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046763"}},"subtitle":["dynamics of web search cloaking"],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":24,"alternative-id":["10.1145\/2046707.2046763","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046763","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}