{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:25Z","timestamp":1763468245038,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000140911081"],"award-info":[{"award-number":["N000140911081"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1237076","1237265"],"award-info":[{"award-number":["1237076","1237265"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2660321","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"465-476","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Dialing Back Abuse on Phone Verified Accounts"],"prefix":"10.1145","author":[{"given":"Kurt","family":"Thomas","sequence":"first","affiliation":[{"name":"Google, Inc., Mountain View, CA, USA"}]},{"given":"Dmytro","family":"Iatskiv","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountain View, CA, USA"}]},{"given":"Elie","family":"Bursztein","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountain View, CA, USA"}]},{"given":"Tadek","family":"Pietraszek","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountain View, CA, USA"}]},{"given":"Chris","family":"Grier","sequence":"additional","affiliation":[{"name":"University of California, Berkeley; International Computer Science Institute, Berkeley, CA, USA"}]},{"given":"Damon","family":"McCoy","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, DC, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"273","volume-title":"Proceedings of the USENIX Security Symposium","author":"Antonakakis M.","year":"2010","unstructured":"M. Antonakakis , R. Perdisci , D. Dagon , W. Lee , and N. Feamster . Building a dynamic reputation system for dns . In Proceedings of the USENIX Security Symposium , pages 273 -- 290 , 2010 . M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster. Building a dynamic reputation system for dns. In Proceedings of the USENIX Security Symposium, pages 273--290, 2010."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866320"},{"key":"e_1_3_2_1_3_1","unstructured":"Bandwidth.com. Who we are. http:\/\/ bandwidth.com\/about-us 2014.  Bandwidth.com. Who we are. http:\/\/ bandwidth.com\/about-us 2014."},{"key":"e_1_3_2_1_4_1","volume-title":"NDSS","author":"Bilge L.","year":"2011","unstructured":"L. Bilge , E. Kirda , C. Kruegel , and M. Balduzzi . EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis . In NDSS , 2011 . L. Bilge, E. Kirda, C. Kruegel, and M. Balduzzi. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. In NDSS, 2011."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Caballero J.","year":"2011","unstructured":"J. Caballero , C. Grier , C. Kreibich , and V. Paxson . Measuring Pay-per-Install: The Commoditization of Malware Distribution . In Proceedings of the USENIX Security Symposium , 2011 . J. Caballero, C. Grier, C. Kreibich, and V. Paxson. Measuring Pay-per-Install: The Commoditization of Malware Distribution. In Proceedings of the USENIX Security Symposium, 2011."},{"volume-title":"How does phone verification work? http:\/\/www.craigslist.org\/ about\/ help\/ phone verification","year":"2014","key":"e_1_3_2_1_6_1","unstructured":"Craigslist. How does phone verification work? http:\/\/www.craigslist.org\/ about\/ help\/ phone verification , 2014 . Craigslist. How does phone verification work? http:\/\/www.craigslist.org\/ about\/ help\/ phone verification, 2014."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342394"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"key":"e_1_3_2_1_10_1","unstructured":"L. Goddard. Researchers discover five new samples of zitmo malware for android and blackberry. http:\/\/ www.theverge.com\/2012\/8\/8\/3227638\/zitmo-malware-android-blackberry-samples August 2012.  L. Goddard. Researchers discover five new samples of zitmo malware for android and blackberry. http:\/\/ www.theverge.com\/2012\/8\/8\/3227638\/zitmo-malware-android-blackberry-samples August 2012."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_1_12_1","volume-title":"Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. In USENIX Security Symposium","volume":"9","author":"Hao S.","year":"2009","unstructured":"S. Hao , N. A. Syed , N. Feamster , A. G. Gray , and S. Krasser . Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. In USENIX Security Symposium , volume 9 , 2009 . S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser. Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. In USENIX Security Symposium, volume 9, 2009."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382233"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Motoyama M.","year":"2010","unstructured":"M. Motoyama , K. Levchenko , C. Kanich , D. McCoy , G. M. Voelker , and S. Savage . Re: Captchas-understanding captcha-solving services in an economic context . In Proceedings of the USENIX Security Symposium , 2010 . M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker, and S. Savage. Re: Captchas-understanding captcha-solving services in an economic context. In Proceedings of the USENIX Security Symposium, 2010."},{"key":"e_1_3_2_1_16_1","unstructured":"Pew Research. Emerging nations embrace internet mobile technology. http:\/\/ www.pewglobal.org\/ 2014\/ 02\/ 13\/emerging-nations-embrace-internet-mobile-technology\/ 2014.  Pew Research. Emerging nations embrace internet mobile technology. http:\/\/ www.pewglobal.org\/ 2014\/ 02\/ 13\/emerging-nations-embrace-internet-mobile-technology\/ 2014."},{"key":"e_1_3_2_1_17_1","unstructured":"Pew Research. Mobile technology fact sheet. http:\/\/ www.pewglobal.org\/ 2014\/ 02\/ 13\/emerging-nations-embrace-internet-mobile-technology\/ 2014.  Pew Research. Mobile technology fact sheet. http:\/\/ www.pewglobal.org\/ 2014\/ 02\/ 13\/emerging-nations-embrace-internet-mobile-technology\/ 2014."},{"volume-title":"Free unlimited texting to 35 countries from your computer. https:\/\/ www.pinger.com\/content\/text-from-your-computer\/","year":"2014","key":"e_1_3_2_1_18_1","unstructured":"Pinger. Free unlimited texting to 35 countries from your computer. https:\/\/ www.pinger.com\/content\/text-from-your-computer\/ , 2014 . Pinger. Free unlimited texting to 35 countries from your computer. https:\/\/ www.pinger.com\/content\/text-from-your-computer\/ , 2014."},{"key":"e_1_3_2_1_19_1","volume-title":"http:\/\/ blogs.mcafee.com\/mcafee-labs\/androidnotcompatible-looks-like-piece-of-pc-botnet","author":"Ruiz F.","year":"2012","unstructured":"F. Ruiz . Android notcompatible looks like piece of pc botnet. http:\/\/ blogs.mcafee.com\/mcafee-labs\/androidnotcompatible-looks-like-piece-of-pc-botnet , 2012 . F. Ruiz. Android notcompatible looks like piece of pc botnet. http:\/\/ blogs.mcafee.com\/mcafee-labs\/androidnotcompatible-looks-like-piece-of-pc-botnet, 2012."},{"key":"e_1_3_2_1_20_1","volume-title":"Too Late.","author":"Schneier B.","year":"2005","unstructured":"B. Schneier . Two-Factor Authentication: Too Little , Too Late. 2005 . B. Schneier. Two-Factor Authentication: Too Little, Too Late. 2005."},{"key":"e_1_3_2_1_21_1","volume-title":"Malicious and Unwanted Software","author":"Sinha S.","year":"2008","unstructured":"S. Sinha , M. Bailey , and F. Jahanian . Shades of grey: On the effectiveness of reputation-based \\blacklists \". In Malicious and Unwanted Software , 2008 . S. Sinha, M. Bailey, and F. Jahanian. Shades of grey: On the effectiveness of reputation-based \\blacklists\". In Malicious and Unwanted Software, 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1981-5_4"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"e_1_3_2_1_24_1","unstructured":"Text+. Free text to anyone in the us or canada. http:\/\/ www.textplus.com\/ 2014.  Text+. Free text to anyone in the us or canada. http:\/\/ www.textplus.com\/ 2014."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Thomas K.","year":"2013","unstructured":"K. Thomas , D. McCoy , C. Grier , A. Kolcz , and V. Paxson . Tracking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse . In Proceedings of the USENIX Security Symposium , 2013 . K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Tracking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In Proceedings of the USENIX Security Symposium, 2013."},{"key":"e_1_3_2_1_27_1","unstructured":"TrendMicro. Zeus now bypasses two-factor authentication. http:\/\/ blog.trendmicro.com\/ trendlabs-security-intelligence\/ zeus-now-bypasses-two-factor-authentication\/ 2013.  TrendMicro. Zeus now bypasses two-factor authentication. http:\/\/ blog.trendmicro.com\/ trendlabs-security-intelligence\/ zeus-now-bypasses-two-factor-authentication\/ 2013."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382235"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660321","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2660321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:10Z","timestamp":1750229770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":28,"alternative-id":["10.1145\/2660267.2660321","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2660321","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}