{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T17:50:50Z","timestamp":1763747450519,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T00:00:00Z","timestamp":1476230400000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-09-1-0553"],"award-info":[{"award-number":["W911NF-09-1-0553"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1408632"],"award-info":[{"award-number":["CNS-1408632"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-12-1-0165"],"award-info":[{"award-number":["N00014-12-1-0165"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["2009-ST-061-CI0001"],"award-info":[{"award-number":["2009-ST-061-CI0001"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813620","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T11:22:12Z","timestamp":1444130532000},"page":"1081-1092","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Drops for Stuff"],"prefix":"10.1145","author":[{"given":"Shuang","family":"Hao","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Kevin","family":"Borgolte","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Nick","family":"Nikiforakis","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"University College London, London, England UK"}]},{"given":"Manuel","family":"Egele","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Michael","family":"Eubanks","sequence":"additional","affiliation":[{"name":"Federal Bureau of Investigation, Pittsburgh, PA, USA"}]},{"given":"Brian","family":"Krebs","sequence":"additional","affiliation":[{"name":"KrebsOnSecurity.com, Merrifield, VA, USA"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara &amp; Lastline Inc., Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"WIRED","author":"Zetter K.","year":"2012","unstructured":"K. Zetter. Hackers Breached Adobe Server in Order to Sign Their Malware. WIRED, Sep. 2012. http:\/\/www.wired.com\/2012\/09\/adobe-digital-cert-hacked\/."},{"key":"e_1_3_2_1_2_1","volume-title":"the Breach Numbers Grow","author":"York Times The New","year":"2014","unstructured":"The New York Times. For Target, the Breach Numbers Grow. Apr. 2014. http:\/\/www.nytimes.com\/2014\/01\/11\/business\/target-breach-affected-70-million-customers.html."},{"key":"e_1_3_2_1_3_1","volume-title":"Sep.","author":"Sidel R.","year":"2014","unstructured":"R. Sidel. Home Depot's 56 Million Card Breach Bigger Than Target's. Wall Street Journal, Sep. 2014. http:\/\/www.wsj.com\/articles\/home-depot-breach-bigger-than-targets-1411073571."},{"key":"e_1_3_2_1_4_1","volume-title":"Krebs On Security","author":"Krebs B.","year":"2015","unstructured":"B. Krebs. Harbortouch is Latest POS Vendor Breach. Krebs On Security, May 2015. http:\/\/krebsonsecurity.com\/2015\/05\/harbortouch-is-latest-pos-vendor-breach\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"e_1_3_2_1_6_1","author":"KTVB","year":"2014","unstructured":"KTVB News. New Boise Scam Entices Victims to Ship Stolen Goods. Jul. 2014. http:\/\/www.ktvb.com\/story\/news\/local\/2014\/07\/15\/12701471\/.","journal-title":"News. New Boise Scam Entices Victims to Ship Stolen Goods."},{"key":"e_1_3_2_1_7_1","author":"WAFF","year":"2014","unstructured":"WAFF News. Re-shipping Scam Can Turn Job Seekers into Unwitting Criminals. Mar. 2014. http:\/\/www.waff.com\/story\/25034260\/re-shipping-scam-can-turn-job-seekers-into-unwitting-criminals.","journal-title":"News. Re-shipping Scam Can Turn Job Seekers into Unwitting Criminals."},{"key":"e_1_3_2_1_8_1","volume-title":"Delivering Justice Work @ Home Scams: They Just Don't Pay!","author":"USPIS","year":"2004","unstructured":"USPIS, Delivering Justice Work @ Home Scams: They Just Don't Pay!, 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068824"},{"key":"e_1_3_2_1_10_1","volume-title":"Aug.","author":"Krebs B.","year":"2014","unstructured":"B. Krebs. \"White Label\" Money Laundering Services. Krebs On Security, Aug. 2014. http:\/\/krebsonsecurity.com\/2014\/08\/white-label-money-laundering-services\/."},{"key":"e_1_3_2_1_11_1","volume-title":"Jan.","author":"Arthur G.","year":"1973","unstructured":"G. Arthur and F. Seber, The Estimation of Animal Abundance and Related Parameters., Jan. 1973."},{"key":"e_1_3_2_1_12_1","volume-title":"Department of Agriculture","author":"Lincoln F.","year":"1930","unstructured":"F. Lincoln. Calculating Waterfowl Abundance on the Basis of Banding Returns. Ser. Circular (United States. Dept. of Agriculture). U.S. Department of Agriculture, 1930. https:\/\/books.google.com\/books?id=w4n_MQEACAAJ."},{"key":"e_1_3_2_1_13_1","volume-title":"Annual Estimates of the Resident Population: 2014 Population Estimates","author":"U.S. Census Bureau","year":"2014","unstructured":"U.S. Census Bureau. Annual Estimates of the Resident Population: 2014 Population Estimates. Dec. 2014. http:\/\/factfinder.census.gov\/faces\/tableservices\/jsf\/pages\/productview.xhtml?pid=PEP_2014_PEPANNRES.K"},{"key":"e_1_3_2_1_14_1","volume-title":"Regional and State Unemployment -- 2014 Annual Averages","author":"Bureau of Labor Statistics.","year":"2015","unstructured":"Bureau of Labor Statistics. Regional and State Unemployment -- 2014 Annual Averages. Mar. 2015. http:\/\/www.bls.gov\/news.release\/srgune.htm."},{"key":"e_1_3_2_1_15_1","unstructured":"J. Goett. Measuring the Presence of Money Mule Recruitment in Online Job Boards. UC Berkeley Tech. Rep. May 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711465"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. IEEE Workshop on Information Forensics and Security","author":"Moore T.","year":"2008","unstructured":"T. Moore and R. Clayton. The Impact of Incentives on Notice and Take-down. In Proc. IEEE Workshop on Information Forensics and Security, Jun. 2008."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2009.63"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2014.6963162"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028082"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1972441.1972447"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2014.21"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855676.1855680"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590302"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362794"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028081"},{"key":"e_1_3_2_1_29_1","volume-title":"Scambaiter: Understanding Targeted Nigerian Scams on Craigslist. In Network and Distributed System Security Symposium (NDSS)","author":"Park Y.","year":"2014","unstructured":"Y. Park, J. Jones, D. McCoy, E. Shi, and M. Jakobsson. Scambaiter: Understanding Targeted Nigerian Scams on Craigslist. In Network and Distributed System Security Symposium (NDSS), Feb. 2014."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813620","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813620","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:32:31Z","timestamp":1763458351000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813620"}},"subtitle":["An Analysis of Reshipping Mule Scams"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":30,"alternative-id":["10.1145\/2810103.2813620","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813620","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}