{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:54Z","timestamp":1763468214879,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2665936.2665938","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"3-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Security Analysis of the Chinese Web"],"prefix":"10.1145","author":[{"given":"Ping","family":"Chen","sequence":"first","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Nick","family":"Nikiforakis","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, USA"}]},{"given":"Lieven","family":"Desmet","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Christophe","family":"Huygens","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The 20 million hotel reversation records (in chinese). http:\/\/net.chinabyte.com\/2\/12850502.shtml.  The 20 million hotel reversation records (in chinese). http:\/\/net.chinabyte.com\/2\/12850502.shtml."},{"key":"e_1_3_2_1_2_1","unstructured":"2000 students' id number and bank acount leaked (in chinese). http:\/\/tech.sina.com.cn\/i\/2012-03--23\/07326867582.shtml.  2000 students' id number and bank acount leaked (in chinese). http:\/\/tech.sina.com.cn\/i\/2012-03--23\/07326867582.shtml."},{"key":"e_1_3_2_1_3_1","unstructured":"Baidu SEO Guide V2.0 (in Chinese). http:\/\/baiduseoguide.com.  Baidu SEO Guide V2.0 (in Chinese). http:\/\/baiduseoguide.com."},{"key":"e_1_3_2_1_4_1","unstructured":"Bing Search API. http:\/\/datamarket.azure.com\/dataset\/bing\/search.  Bing Search API. http:\/\/datamarket.azure.com\/dataset\/bing\/search."},{"key":"e_1_3_2_1_5_1","unstructured":"CSDN data breach (in Chinese). http:\/\/baike.baidu.com\/view\/7167245.htm.  CSDN data breach (in Chinese). http:\/\/baike.baidu.com\/view\/7167245.htm."},{"key":"e_1_3_2_1_6_1","unstructured":"HtmlUnit. http:\/\/htmlunit.sourceforge.net\/.  HtmlUnit. http:\/\/htmlunit.sourceforge.net\/."},{"key":"e_1_3_2_1_7_1","unstructured":"KNET Trusted Website Database (in Chinese). http:\/\/t.knet.cn\/.  KNET Trusted Website Database (in Chinese). http:\/\/t.knet.cn\/."},{"key":"e_1_3_2_1_8_1","unstructured":"SSL Pulse. https:\/\/www.trustworthyinternet.org\/ssl-pulse\/.  SSL Pulse. https:\/\/www.trustworthyinternet.org\/ssl-pulse\/."},{"key":"e_1_3_2_1_9_1","unstructured":"sslyze. https:\/\/github.com\/iSECPartners\/sslyze.  sslyze. https:\/\/github.com\/iSECPartners\/sslyze."},{"key":"e_1_3_2_1_10_1","unstructured":"TrustedSource Web Database. https:\/\/www.trustedsource.org\/.  TrustedSource Web Database. https:\/\/www.trustedsource.org\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Understanding the TLS Renegotiation Attack. http:\/\/www.educatedguesswork.org\/2009\/11\/understanding_the_tls_renegoti.html.  Understanding the TLS Renegotiation Attack. http:\/\/www.educatedguesswork.org\/2009\/11\/understanding_the_tls_renegoti.html."},{"key":"e_1_3_2_1_12_1","unstructured":"Wooyun (in chinese). http:\/\/www.wooyun.org\/bugs\/.  Wooyun (in chinese). http:\/\/www.wooyun.org\/bugs\/."},{"key":"e_1_3_2_1_13_1","volume-title":"15th International Conference on Advanced Communication Technology. IEEE","author":"Alarifi Abdulrahman","year":"2013","unstructured":"Abdulrahman Alarifi and AbdulMalik AI- Salman . Security analysis of top visited arabic web sites . In 15th International Conference on Advanced Communication Technology. IEEE , 2013 . Abdulrahman Alarifi and AbdulMalik AI-Salman. Security analysis of top visited arabic web sites. In 15th International Conference on Advanced Communication Technology. IEEE, 2013."},{"key":"e_1_3_2_1_14_1","first-page":"6265","author":"Barth Adam","year":"2011","unstructured":"Adam Barth . HTTP State Management Mechanism. IETF RFC 6265 , 2011 . Adam Barth. HTTP State Management Mechanism. IETF RFC 6265, 2011.","journal-title":"HTTP State Management Mechanism. IETF RFC"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 16th Information Security Conference","author":"Chen Ping","year":"2013","unstructured":"Ping Chen , Nick Nikiforakis , Christophe Huygens , and Lieven Desmet . A Dangerous Mix: Large-scale analysis of mixed-content websites . In Proceedings of the 16th Information Security Conference , Dallas, USA , 2013 . Ping Chen, Nick Nikiforakis, Christophe Huygens, and Lieven Desmet. A Dangerous Mix: Large-scale analysis of mixed-content websites. In Proceedings of the 16th Information Security Conference, Dallas, USA, 2013."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.41"},{"volume-title":"The 32th China Internet Development Statistic (in Chinese)","author":"CNNIC.","key":"e_1_3_2_1_17_1","unstructured":"CNNIC. The 32th China Internet Development Statistic (in Chinese) . CNNIC. The 32th China Internet Development Statistic (in Chinese)."},{"key":"e_1_3_2_1_18_1","unstructured":"CNNIC and APAC. Global Chinese Phishing Sites Report. http:\/\/www.cnnic.cn\/gywm\/xwzx\/rdxw\/rdxx\/201305\/W020130531616450986485.pdf 2013.  CNNIC and APAC. Global Chinese Phishing Sites Report. http:\/\/www.cnnic.cn\/gywm\/xwzx\/rdxw\/rdxx\/201305\/W020130531616450986485.pdf 2013."},{"key":"e_1_3_2_1_19_1","volume-title":"http:\/\/blogs.msdn.com\/b\/ie\/archive\/2009\/06\/25\/declaring-security.aspx","author":"Blog Microsoft","year":"2009","unstructured":"Microsoft IE Blog . Declaring Security . http:\/\/blogs.msdn.com\/b\/ie\/archive\/2009\/06\/25\/declaring-security.aspx , 2009 . Microsoft IEBlog. Declaring Security. http:\/\/blogs.msdn.com\/b\/ie\/archive\/2009\/06\/25\/declaring-security.aspx, 2009."},{"key":"e_1_3_2_1_20_1","volume-title":"Online Underground Economy. Conference on the Political Economy of Information Security in China","author":"Jianwei Zhuge","year":"2012","unstructured":"Zhuge Jianwei , Gu Liang , and Duan Haixin . Investigating China's Online Underground Economy. Conference on the Political Economy of Information Security in China , 2012 . Zhuge Jianwei, Gu Liang, and Duan Haixin. Investigating China's Online Underground Economy. Conference on the Political Economy of Information Security in China, 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.02.001"},{"volume-title":"The Advanced Persistent Threat","year":"2010","key":"e_1_3_2_1_22_1","unstructured":"Mandiant. The Advanced Persistent Threat . 2010 . Mandiant. The Advanced Persistent Threat. 2010."},{"key":"e_1_3_2_1_23_1","volume-title":"New Tricks for Defeating SSL in Practice","author":"Marlinspike Moxie","year":"2009","unstructured":"Moxie Marlinspike . New Tricks for Defeating SSL in Practice . 2009 . Moxie Marlinspike. New Tricks for Defeating SSL in Practice. 2009."},{"key":"e_1_3_2_1_24_1","volume-title":"Black Hat USA 2010","author":"Risti\u0107 Ivan","year":"2010","unstructured":"Ivan Risti\u0107 . Internet SSL Survey 2010 . In Black Hat USA 2010 , 2010 . Ivan Risti\u0107. Internet SSL Survey 2010. In Black Hat USA 2010, 2010."},{"key":"e_1_3_2_1_25_1","volume-title":"CRIME: Compression Ratio Info-leak Made Easy. In ekoparty Security Conference","author":"Rizzo Juliano","year":"2012","unstructured":"Juliano Rizzo and Thai Duong . CRIME: Compression Ratio Info-leak Made Easy. In ekoparty Security Conference , 2012 . Juliano Rizzo and Thai Duong. CRIME: Compression Ratio Info-leak Made Easy. In ekoparty Security Conference, 2012."},{"key":"e_1_3_2_1_26_1","first-page":"7034","author":"Ross D.","year":"2013","unstructured":"D. Ross and T. Gondrom . HTTP Header Field X-Frame-Options. IETF RFC 7034 , 2013 . D. Ross and T. Gondrom. HTTP Header Field X-Frame-Options. IETF RFC 7034, 2013.","journal-title":"HTTP Header Field X-Frame-Options. IETF RFC"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02620-1_2"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772784"},{"key":"e_1_3_2_1_29_1","volume-title":"Content Security Policy 1.0. W3C Candidate Recommendation","author":"Sterne Brandon","year":"2012","unstructured":"Brandon Sterne and Adam Barth . Content Security Policy 1.0. W3C Candidate Recommendation , 2012 . Brandon Sterne and Adam Barth. Content Security Policy 1.0. W3C Candidate Recommendation, 2012."},{"key":"e_1_3_2_1_30_1","volume-title":"Wouter Joosen. Large-scale Security Analysis of the Web: Challenges and Findings. In Proceedings of the 7th International Conference on Trust and Trustworthy Computing","author":"van Goethem Tom","year":"2014","unstructured":"Tom van Goethem , Ping Chen , Nick Nikiforakis , Lieven Desmet , and Wouter Joosen. Large-scale Security Analysis of the Web: Challenges and Findings. In Proceedings of the 7th International Conference on Trust and Trustworthy Computing , 2014 . Tom van Goethem, Ping Chen, Nick Nikiforakis, Lieven Desmet, and Wouter Joosen. Large-scale Security Analysis of the Web: Challenges and Findings. In Proceedings of the 7th International Conference on Trust and Trustworthy Computing, 2014."},{"key":"e_1_3_2_1_31_1","unstructured":"Wikipedia. Resident Identity Card. http:\/\/en.wikipedia.org\/wiki\/Resident_Identity_Card_(PRC).  Wikipedia. Resident Identity Card. http:\/\/en.wikipedia.org\/wiki\/Resident_Identity_Card_(PRC)."}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2665936.2665938","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2665936.2665938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:25Z","timestamp":1750227205000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2665936.2665938"}},"subtitle":["How well is it protected?"],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":31,"alternative-id":["10.1145\/2665936.2665938","10.1145\/2665936"],"URL":"https:\/\/doi.org\/10.1145\/2665936.2665938","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}