{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:45:27Z","timestamp":1773409527615,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,16]],"date-time":"2012-10-16T00:00:00Z","timestamp":1350345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,16]]},"DOI":"10.1145\/2382196.2382285","type":"proceedings-article","created":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T17:13:12Z","timestamp":1350321192000},"page":"845-856","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Priceless"],"prefix":"10.1145","author":[{"given":"Damon","family":"McCoy","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Hitesh","family":"Dharmdasani","sequence":"additional","affiliation":[{"name":"George Mason university, Fairfax, VA, USA"}]},{"given":"Christian","family":"Kreibich","sequence":"additional","affiliation":[{"name":"International Computer Science Institute, Berkeley, CA, USA"}]},{"given":"Geoffrey M.","family":"Voelker","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2010 U.S. Intellectual Property Enforcement Coordinator Annual Report on Intellectual Property Enforcement. http:\/\/www.ice.gov\/doclib\/iprcenter\/pdf\/ipecannual-report.pdf Feb. 2011.  2010 U.S. Intellectual Property Enforcement Coordinator Annual Report on Intellectual Property Enforcement. http:\/\/www.ice.gov\/doclib\/iprcenter\/pdf\/ipecannual-report.pdf Feb. 2011."},{"key":"e_1_3_2_1_2_1","volume-title":"May","author":"Hypponen M.","year":"2011","unstructured":"M. Hypponen . A Norwegian bank (DnB NOR) co-operates with some of the largest spammers in the world. https:\/\/twitter.com\/#!\/dnbnor_hjelp\/status\/73305600066461696 , May 2011 . M. Hypponen. A Norwegian bank (DnB NOR) co-operates with some of the largest spammers in the world. https:\/\/twitter.com\/#!\/dnbnor_hjelp\/status\/73305600066461696, May 2011."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/iacc.org\/news-media-resources\/pressreleases\/iacc-has-new-tools-to-cut-off-moneyto-bad-sites.php","author":"Has New Tools To IACC","year":"2011","unstructured":"IACC Has New Tools To Cut Off Money to Bad Sites . https:\/\/iacc.org\/news-media-resources\/pressreleases\/iacc-has-new-tools-to-cut-off-moneyto-bad-sites.php , 2011 . IACC Has New Tools To Cut Off Money to Bad Sites. https:\/\/iacc.org\/news-media-resources\/pressreleases\/iacc-has-new-tools-to-cut-off-moneyto-bad-sites.php, 2011."},{"key":"e_1_3_2_1_4_1","unstructured":"ISO 8583-1:2003-- Financial transaction card originated messages--Interchange message specifications 2003.  ISO 8583-1:2003-- Financial transaction card originated messages--Interchange message specifications 2003."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 4th Workshop on Cyber Security Experimentation and Test (CSET)","author":"Kanich C.","year":"2011","unstructured":"C. Kanich , N. Chachra , D. McCoy , C. Grier , D. Y. Wang , M. Motoyama , K. Levchenko , S. Savage , and G. M. Voelker . No Plan Survives Contact: Experience with Cybercrime Measurement . In Proceedings of the 4th Workshop on Cyber Security Experimentation and Test (CSET) , Aug. 2011 . C. Kanich, N. Chachra, D. McCoy, C. Grier, D. Y. Wang, M. Motoyama, K. Levchenko, S. Savage, and G. M. Voelker. No Plan Survives Contact: Experience with Cybercrime Measurement. In Proceedings of the 4th Workshop on Cyber Security Experimentation and Test (CSET), Aug. 2011."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Kanich C.","year":"2011","unstructured":"C. Kanich , N. Weaver , D. McCoy , T. Halvorson , C. Kreibich , K. Levchenko , V. Paxson , G. M. Voelker , and S. Savage . Show Me the Money: Characterizing Spam-advertised Revenue . In Proceedings of the USENIX Security Symposium , Aug. 2011 . C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. M. Voelker, and S. Savage. Show Me the Money: Characterizing Spam-advertised Revenue. In Proceedings of the USENIX Security Symposium, Aug. 2011."},{"key":"e_1_3_2_1_7_1","volume-title":"White House Calls Meeting on Rogue Online Pharmacies. http:\/\/krebsonsecurity.com\/2010\/08\/white-house-calls-meeting-on-rogue-onlinepharmacies","author":"Krebs B.","year":"2010","unstructured":"B. Krebs . White House Calls Meeting on Rogue Online Pharmacies. http:\/\/krebsonsecurity.com\/2010\/08\/white-house-calls-meeting-on-rogue-onlinepharmacies , Aug. 2010 . B. Krebs. White House Calls Meeting on Rogue Online Pharmacies. http:\/\/krebsonsecurity.com\/2010\/08\/white-house-calls-meeting-on-rogue-onlinepharmacies, Aug. 2010."},{"key":"e_1_3_2_1_8_1","volume-title":"Apr.","author":"Krebs B.","year":"2011","unstructured":"B. Krebs . Gateline.net Was Key Rogue Pharma Processor . http:\/\/krebsonsecurity.com\/2012\/04\/gatelinenet-was-key-rogue-pharma-processor , Apr. 2011 . B. Krebs. Gateline.net Was Key Rogue Pharma Processor. http:\/\/krebsonsecurity.com\/2012\/04\/gatelinenet-was-key-rogue-pharma-processor, Apr. 2011."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings USENIX Security 2011","author":"Leontiadis N.","year":"2011","unstructured":"N. Leontiadis , T. Moore , and N. Christin . Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade . In Proceedings USENIX Security 2011 , Aug. 2011 . N. Leontiadis, T. Moore, and N. Christin. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade. In Proceedings USENIX Security 2011, Aug. 2011."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings USENIX Security 2012","author":"McCoy D.","year":"2012","unstructured":"D. McCoy , A. Pitsillidis , G. Jordan , N. Weaver , C. Kreibich , B. Krebs , G. M. Voelker , S. Savage , and K. Levchanko . PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs . In Proceedings USENIX Security 2012 , Aug. 2012 . D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. Levchanko. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. In Proceedings USENIX Security 2012, Aug. 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068824"},{"key":"e_1_3_2_1_13_1","volume-title":"Out Rogue Merchants: The IACC Payment Processor Portal Mid-Year Review and Vision for the Future. IACC 2012 Spring Annual Meeting (as found at iacc.org)","author":"Rooting","year":"2012","unstructured":"Rooting Out Rogue Merchants: The IACC Payment Processor Portal Mid-Year Review and Vision for the Future. IACC 2012 Spring Annual Meeting (as found at iacc.org) , May 2012 . Rooting Out Rogue Merchants: The IACC Payment Processor Portal Mid-Year Review and Vision for the Future. IACC 2012 Spring Annual Meeting (as found at iacc.org), May 2012."},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. of Virus Bulletin Conference","author":"Samosseiko D.","year":"2009","unstructured":"D. Samosseiko . The Partnerka--What is it, and why should you care ? In Proc. of Virus Bulletin Conference , Sept. 2009 . D. Samosseiko. The Partnerka--What is it, and why should you care? In Proc. of Virus Bulletin Conference, Sept. 2009."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Workshop on Economics of Information Security (WEIS)","author":"Stone-Gross B.","year":"2011","unstructured":"B. Stone-Gross , R. Abman , R. Kemmerer , C. Kruegel , D. Steigerwald , and G. Vigna . The Underground Economy of Fake Antivirus Software . In Proceedings of the Workshop on Economics of Information Security (WEIS) , 2011 . B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, D. Steigerwald, and G. Vigna. The Underground Economy of Fake Antivirus Software. In Proceedings of the Workshop on Economics of Information Security (WEIS), 2011."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats (LEET)","author":"Stone-Gross B.","year":"2011","unstructured":"B. Stone-Gross , T. Holz , G. Stringhini , and G. Vigna . The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns . In Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats (LEET) , 2011 . B. Stone-Gross, T. Holz, G. Stringhini, and G. Vigna. The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns. In Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats (LEET), 2011."},{"key":"e_1_3_2_1_17_1","volume-title":"http:\/\/blog.instabill.com\/media\/blogs\/instabill\/pdf\/GlobalBrandprotectionProgram.pdf17","author":"Brand Protection Program Visa Global","year":"2011","unstructured":"Visa Global Brand Protection Program . http:\/\/blog.instabill.com\/media\/blogs\/instabill\/pdf\/GlobalBrandprotectionProgram.pdf17 , 2011 . Visa Global Brand Protection Program. http:\/\/blog.instabill.com\/media\/blogs\/instabill\/pdf\/GlobalBrandprotectionProgram.pdf17, 2011."},{"key":"e_1_3_2_1_18_1","unstructured":"Visa Commercial Solutions. Merchant Category Codes for IRS Form 1099-MISC Reporting. http:\/\/usa.visa.com\/download\/corporate\/resources\/mcc_booklet.pdf.  Visa Commercial Solutions. Merchant Category Codes for IRS Form 1099-MISC Reporting. http:\/\/usa.visa.com\/download\/corporate\/resources\/mcc_booklet.pdf."},{"key":"e_1_3_2_1_19_1","unstructured":"XyliBox. http:\/\/www.xylibox.com\/.  XyliBox. http:\/\/www.xylibox.com\/."}],"event":{"name":"CCS'12: the ACM Conference on Computer and Communications Security","location":"Raleigh North Carolina USA","acronym":"CCS'12","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2012 ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2382196.2382285","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2382196.2382285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:48Z","timestamp":1750239288000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2382196.2382285"}},"subtitle":["the role of payments in abuse-advertised goods"],"short-title":[],"issued":{"date-parts":[[2012,10,16]]},"references-count":19,"alternative-id":["10.1145\/2382196.2382285","10.1145\/2382196"],"URL":"https:\/\/doi.org\/10.1145\/2382196.2382285","relation":{},"subject":[],"published":{"date-parts":[[2012,10,16]]},"assertion":[{"value":"2012-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}