{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:18:08Z","timestamp":1763468288750,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,5,13]],"date-time":"2013-05-13T00:00:00Z","timestamp":1368403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,13]]},"DOI":"10.1145\/2488388.2488405","type":"proceedings-article","created":{"date-parts":[[2016,2,5]],"date-time":"2016-02-05T20:43:24Z","timestamp":1454705004000},"page":"177-188","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["The role of web hosting providers in detecting compromised websites"],"prefix":"10.1145","author":[{"given":"Davide","family":"Canali","sequence":"first","affiliation":[{"name":"EURECOM, Biot, France"}]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]},{"given":"Aur\u00e9lien","family":"Francillon","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]}],"member":"320","published-online":{"date-parts":[[2013,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"VirusTotal - Free Online Virus Malware and URL Scanner. https:\/\/www.virustotal.com\/.  VirusTotal - Free Online Virus Malware and URL Scanner. https:\/\/www.virustotal.com\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.27"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 20th Annual Network and Distributed System Security Symposium, NDSS '13","author":"Canali D.","year":"2013","unstructured":"D. Canali and D. Balzarotti . Behind the scenes of online attacks: an analysis of exploitation behaviors on the web . In Proceedings of the 20th Annual Network and Distributed System Security Symposium, NDSS '13 , Feb. 2013 . D. Canali and D. Balzarotti. Behind the scenes of online attacks: an analysis of exploitation behaviors on the web. In Proceedings of the 20th Annual Network and Distributed System Security Symposium, NDSS '13, Feb. 2013."},{"key":"e_1_3_2_1_4_1","unstructured":"Commtouch and StopBadware. Compromised Websites - An Owner's Perspective. http:\/\/stopbadware.org\/pdfs\/compromisedwebsites-an-owners-perspective.pdf February 2012.  Commtouch and StopBadware. Compromised Websites - An Owner's Perspective. http:\/\/stopbadware.org\/pdfs\/compromisedwebsites-an-owners-perspective.pdf February 2012."},{"key":"e_1_3_2_1_5_1","volume-title":"November","author":"de Vries W.","year":"2012","unstructured":"W. de Vries . Hosting provider antagonist automatically fixes vulnerabilities in customers? websites. https:\/\/www.antagonist.nl\/blog\/2012\/11\/hostingprovider-antagonist-automatically-fixesvulnerabilities-in-customers-websites , November 2012 . W. de Vries. Hosting provider antagonist automatically fixes vulnerabilities in customers? websites. https:\/\/www.antagonist.nl\/blog\/2012\/11\/hostingprovider-antagonist-automatically-fixesvulnerabilities-in-customers-websites, November 2012."},{"key":"e_1_3_2_1_6_1","unstructured":"fyicenter.com. Credit card number generator - test data generation. http:\/\/sqa.fyicenter.com\/Online_Test_Tools\/Test_Credit_Card_Number_Generator.php 2010.  fyicenter.com. Credit card number generator - test data generation. http:\/\/sqa.fyicenter.com\/Online_Test_Tools\/Test_Credit_Card_Number_Generator.php 2010."},{"key":"e_1_3_2_1_7_1","first-page":"20","volume-title":"Proceedings of the 20th USENIX conference on Security, SEC'11","author":"John J. P.","year":"2011","unstructured":"J. P. John , F. Yu , Y. Xie , A. Krishnamurthy , and M. Abadi . deseo: combating search-result poisoning . In Proceedings of the 20th USENIX conference on Security, SEC'11 , pages 20 -- 20 , Berkeley, CA, USA , 2011 . USENIX Association. J. P. John, F. Yu, Y. Xie, A. Krishnamurthy, and M. Abadi. deseo: combating search-result poisoning. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 20--20, Berkeley, CA, USA, 2011. USENIX Association."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963437"},{"key":"e_1_3_2_1_9_1","volume-title":"Peachpit Blog","author":"Ullman Larry","year":"2011","unstructured":"Larry Ullman . Understand your hosting, five critical e-commerce security tips in five days . Peachpit Blog , 2011 . http:\/\/www.peachpit.com\/blogs\/blog.aspx?uk=Understand-Your-Hosting-Five-Critical-E-Commerce-Security-Tips-in-Five-Days. Larry Ullman. Understand your hosting, five critical e-commerce security tips in five days. Peachpit Blog, 2011. http:\/\/www.peachpit.com\/blogs\/blog.aspx?uk=Understand-Your-Hosting-Five-Critical-E-Commerce-Security-Tips-in-Five-Days."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299016"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"The consequence of non-cooperation in the fight against phishing. In eCrime Researchers Summit","author":"Moore T.","year":"2008","unstructured":"T. Moore and R. Clayton . The consequence of non-cooperation in the fight against phishing. In eCrime Researchers Summit , 2008 , pages 1 -- 14 , oct. 2008. T. Moore and R. Clayton. The consequence of non-cooperation in the fight against phishing. In eCrime Researchers Summit, 2008, pages 1--14, oct. 2008."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_16"},{"key":"e_1_3_2_1_13_1","volume-title":"November","author":"Number","year":"2010","unstructured":"Number 7. osCommerce 'categories.php' Arbitrary File Upload Vulnerability , November 2010 . http:\/\/www.securityfocus.com\/bid\/44995\/info. Number 7. osCommerce 'categories.php' Arbitrary File Upload Vulnerability, November 2010. http:\/\/www.securityfocus.com\/bid\/44995\/info."},{"key":"e_1_3_2_1_14_1","volume-title":"Owasp modsecurity core rule set project. https:\/\/www.owasp.org\/index.php\/Category:OWASP_ModSecurity_Core_Rule_Set_Project","author":"TrustWave SpiderLabs OWASP","year":"2012","unstructured":"OWASP foundation and TrustWave SpiderLabs . Owasp modsecurity core rule set project. https:\/\/www.owasp.org\/index.php\/Category:OWASP_ModSecurity_Core_Rule_Set_Project , 2012 . OWASP foundation and TrustWave SpiderLabs. Owasp modsecurity core rule set project. https:\/\/www.owasp.org\/index.php\/Category:OWASP_ModSecurity_Core_Rule_Set_Project, 2012."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496711.1496712"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1323128.1323132"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1515964.1517412"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935193"},{"key":"e_1_3_2_1_19_1","unstructured":"webhosting.info. Country-wise top hosts. http:\/\/www.webhosting.info\/webhosts\/tophosts\/Country\/ 2012.  webhosting.info. Country-wise top hosts. http:\/\/www.webhosting.info\/webhosts\/tophosts\/Country\/ 2012."}],"event":{"name":"WWW '13: 22nd International World Wide Web Conference","sponsor":["NICBR Nucleo de Informatcao e Coordenacao do Ponto BR","CGIBR Comite Gestor da Internet no Brazil","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Rio de Janeiro Brazil","acronym":"WWW '13"},"container-title":["Proceedings of the 22nd international conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2488388.2488405","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2488388.2488405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:41Z","timestamp":1750236521000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2488388.2488405"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,13]]},"references-count":19,"alternative-id":["10.1145\/2488388.2488405","10.1145\/2488388"],"URL":"https:\/\/doi.org\/10.1145\/2488388.2488405","relation":{},"subject":[],"published":{"date-parts":[[2013,5,13]]},"assertion":[{"value":"2013-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}