{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T07:47:23Z","timestamp":1775807243921,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813703","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"542-553","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":306,"title":["A Search Engine Backed by Internet-Wide Scanning"],"prefix":"10.1145","author":[{"given":"Zakir","family":"Durumeric","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"David","family":"Adrian","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Ariana","family":"Mirian","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Michael","family":"Bailey","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana Champaign, IL, USA"}]},{"given":"J. Alex","family":"Halderman","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813707"},{"key":"e_1_3_2_1_2_1","volume-title":"8th USENIX Workshop on Offensive Technologies","author":"Adrian D.","year":"2014","unstructured":"D. Adrian , Z. Durumeric , G. Singh , and J. A. Halderman . Zippier ZMap: Internet-wide scanning at 10 Gbps . In 8th USENIX Workshop on Offensive Technologies , Aug. 2014 . D. Adrian, Z. Durumeric, G. Singh, and J. A. Halderman. Zippier ZMap: Internet-wide scanning at 10 Gbps. In 8th USENIX Workshop on Offensive Technologies, Aug. 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"June","author":"Ajmani S.","year":"2013","unstructured":"S. Ajmani , B. Fitzpatrick , A. Gerrand , R. Griesemer , A. Langley , R. Pike , D. Symonds , N. Tao , and I. L. Taylor . A conversation with the Go team. Golang blog , June 2013 . http:\/\/blog.golang.org\/a-conversation-with-the-go-team. S. Ajmani, B. Fitzpatrick, A. Gerrand, R. Griesemer, A. Langley, R. Pike, D. Symonds, N. Tao, and I. L. Taylor. A conversation with the Go team. Golang blog, June 2013. http:\/\/blog.golang.org\/a-conversation-with-the-go-team."},{"key":"e_1_3_2_1_4_1","unstructured":"Apache. Lucene. https:\/\/lucene.apache.org.  Apache. Lucene. https:\/\/lucene.apache.org."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.52"},{"key":"e_1_3_2_1_6_1","unstructured":"S. Banon. Elasticsearch 2013. https:\/\/www.elastic.co.  S. Banon. Elasticsearch 2013. https:\/\/www.elastic.co."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.39"},{"key":"e_1_3_2_1_8_1","volume-title":"8th USENIX Workshop on Offensive Technologies","author":"Bonkoski A.","year":"2013","unstructured":"A. Bonkoski , R. Bielawski , and J. A. Halderman . Illuminating the security issues surrounding lights-out server management . In 8th USENIX Workshop on Offensive Technologies , Aug. 2013 . A. Bonkoski, R. Bielawski, and J. A. Halderman. Illuminating the security issues surrounding lights-out server management. In 8th USENIX Workshop on Offensive Technologies, Aug. 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_11"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.15"},{"key":"e_1_3_2_1_11_1","volume-title":"23rd USENIX Security Symposium","author":"Checkoway S.","year":"2014","unstructured":"S. Checkoway , M. Fredrikson , R. Niederhagen , A. Everspaugh , M. Green , T. Lange , T. Ristenpart , D. J. Bernstein , J. Maskiewicz , and H. Shacham . On the practical exploitability of Dual EC in TLS implementations . In 23rd USENIX Security Symposium , Aug. 2014 . S. Checkoway, M. Fredrikson, R. Niederhagen, A. Everspaugh, M. Green, T. Lange, T. Ristenpart, D. J. Bernstein, J. Maskiewicz, and H. Shacham. On the practical exploitability of Dual EC in TLS implementations. In 23rd USENIX Security Symposium, Aug. 2014."},{"key":"e_1_3_2_1_12_1","unstructured":"Codenomicon. Heartbleed Apr. 2014. http:\/\/heartbleed.com.  Codenomicon. Heartbleed Apr. 2014. http:\/\/heartbleed.com."},{"key":"e_1_3_2_1_13_1","volume-title":"23rd USENIX Security Symposium","author":"Costin A.","year":"2014","unstructured":"A. Costin , J. Zaddach , A. Francillon , D. Balzarotti , and S. Antipolis . A large scale analysis of the security of embedded firmwares . In 23rd USENIX Security Symposium , Aug. 2014 . A. Costin, J. Zaddach, A. Francillon, D. Balzarotti, and S. Antipolis. A large scale analysis of the security of embedded firmwares. In 23rd USENIX Security Symposium, Aug. 2014."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663717"},{"key":"e_1_3_2_1_15_1","volume-title":"Apr.","author":"Durumeric Z.","year":"2014","unstructured":"Z. Durumeric , D. Adrian , M. Bailey , and J. A. Halderman . Heartbleed bug health report , Apr. 2014 . https:\/\/zmap.io\/heartbleed. Z. Durumeric, D. Adrian, M. Bailey, and J. A. Halderman. Heartbleed bug health report, Apr. 2014. https:\/\/zmap.io\/heartbleed."},{"key":"e_1_3_2_1_16_1","volume-title":"Oct.","author":"Durumeric Z.","year":"2014","unstructured":"Z. Durumeric , D. Adrian , J. Kasten , D. Springall , M. Bailey , and J. A. Halderman . POODLE attack and SSLv3 deployment , Oct. 2014 . https:\/\/poodle.io. Z. Durumeric, D. Adrian, J. Kasten, D. Springall, M. Bailey, and J. A. Halderman. POODLE attack and SSLv3 deployment, Oct. 2014. https:\/\/poodle.io."},{"key":"e_1_3_2_1_17_1","volume-title":"23rd USENIX Security Symposium","author":"Durumeric Z.","year":"2014","unstructured":"Z. Durumeric , M. Bailey , and J. A. Halderman . An Internet-wide view of Internet-wide scanning . In 23rd USENIX Security Symposium , Aug. 2014 . Z. Durumeric, M. Bailey, and J. A. Halderman. An Internet-wide view of Internet-wide scanning. In 23rd USENIX Security Symposium, Aug. 2014."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_1_20_1","volume-title":"22nd USENIX Security Symposium","author":"Durumeric Z.","year":"2013","unstructured":"Z. Durumeric , E. Wustrow , and J. A. Halderman . ZMap: Fast Internet-wide scanning and its security applications . In 22nd USENIX Security Symposium , Aug. 2013 . Z. Durumeric, E. Wustrow, and J. A. Halderman. ZMap: Fast Internet-wide scanning and its security applications. In 22nd USENIX Security Symposium, Aug. 2013."},{"key":"e_1_3_2_1_21_1","unstructured":"Facebook. RocksDB: A persistent key-value store for fast storage environments. http:\/\/rocksdb.org.  Facebook. RocksDB: A persistent key-value store for fast storage environments. http:\/\/rocksdb.org."},{"key":"e_1_3_2_1_22_1","unstructured":"Google. Protocol buffers. https:\/\/github.com\/google\/protobuf.  Google. Protocol buffers. https:\/\/github.com\/google\/protobuf."},{"key":"e_1_3_2_1_23_1","volume-title":"Sept.","author":"Graham R.","year":"2013","unstructured":"R. Graham . Masscan : The entire Internet in 3 minutes. Errata Security blog , Sept. 2013 . http:\/\/blog.erratasec.com\/2013\/09\/masscan-entire-internet-in-3-minutes.html. R. Graham. Masscan: The entire Internet in 3 minutes. Errata Security blog, Sept. 2013. http:\/\/blog.erratasec.com\/2013\/09\/masscan-entire-internet-in-3-minutes.html."},{"key":"e_1_3_2_1_24_1","volume-title":"On the detection of fake certificates via attribute correlation. Entropy, 17(6)","author":"Gu X.","year":"2015","unstructured":"X. Gu and X. Gu . On the detection of fake certificates via attribute correlation. Entropy, 17(6) , 2015 . X. Gu and X. Gu. On the detection of fake certificates via attribute correlation. Entropy, 17(6), 2015."},{"key":"e_1_3_2_1_25_1","volume-title":"21st USENIX Security Symposium","author":"Heninger N.","year":"2012","unstructured":"N. Heninger , Z. Durumeric , E. Wustrow , and J. A. Halderman . Mining your Ps and Qs: Detection of widespread weak keys in network devices . In 21st USENIX Security Symposium , Aug. 2012 . N. Heninger, Z. Durumeric, E. Wustrow, and J. A. Halderman. Mining your Ps and Qs: Detection of widespread weak keys in network devices. In 21st USENIX Security Symposium, Aug. 2012."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23162"},{"key":"e_1_3_2_1_27_1","volume-title":"23rd USENIX Security Symposium","author":"K\u00fchrer M.","year":"2014","unstructured":"M. K\u00fchrer , T. Hupperich , C. Rossow , and T. Holz . Exit from hell? Reducing the impact of amplification DDoS attacks . In 23rd USENIX Security Symposium , Aug. 2014 . M. K\u00fchrer, T. Hupperich, C. Rossow, and T. Holz. Exit from hell? Reducing the impact of amplification DDoS attacks. In 23rd USENIX Security Symposium, Aug. 2014."},{"key":"e_1_3_2_1_28_1","volume-title":"24th USENIX Security Symposium","author":"Liu Y.","year":"2015","unstructured":"Y. Liu , A. Sarabi , J. Zhang , P. Naghizadeh , M. Karir , M. Bailey , and M. Liu . Cloudy with a chance of breach: Forecasting cyber security incidents . In 24th USENIX Security Symposium , Aug. 2015 . Y. Liu, A. Sarabi, J. Zhang, P. Naghizadeh, M. Karir, M. Bailey, and M. Liu. Cloudy with a chance of breach: Forecasting cyber security incidents. In 24th USENIX Security Symposium, Aug. 2015."},{"key":"e_1_3_2_1_29_1","volume-title":"23rd USENIX Security Symposium","author":"Marczak W. R.","year":"2014","unstructured":"W. R. Marczak , J. Scott-Railton , M. Marquis-Boire , and V. Paxson . When governments hack opponents: A look at actors and technology . In 23rd USENIX Security Symposium , Aug. 2014 . W. R. Marczak, J. Scott-Railton, M. Marquis-Boire, and V. Paxson. When governments hack opponents: A look at actors and technology. In 23rd USENIX Security Symposium, Aug. 2014."},{"key":"e_1_3_2_1_30_1","unstructured":"J. Matherly. Shodan FAQ. http:\/\/www.shodanhq.com\/help\/faq.  J. Matherly. Shodan FAQ. http:\/\/www.shodanhq.com\/help\/faq."},{"key":"e_1_3_2_1_31_1","unstructured":"J. Mauch. Open resolver project. http:\/\/openresolverproject.org.  J. Mauch. Open resolver project. http:\/\/openresolverproject.org."},{"key":"e_1_3_2_1_32_1","volume-title":"Oct.","author":"IDA.","year":"2006","unstructured":"Modbus IDA. MODBUS TCP implementation guide , Oct. 2006 . http:\/\/www.modbus.org\/docs\/Modbus_Messaging_Implementation_Guide_V1_0b.pdf. Modbus IDA. MODBUS TCP implementation guide, Oct. 2006. http:\/\/www.modbus.org\/docs\/Modbus_Messaging_Implementation_Guide_V1_0b.pdf."},{"key":"e_1_3_2_1_33_1","volume-title":"Sept.","author":"Moller B.","year":"2014","unstructured":"B. Moller , T. Duong , and K. Kotowicz . This POODLE bites: Exploiting the SSL 3.0 fallback , Sept. 2014 . https:\/\/www.openssl.org\/~bodo\/ssl-poodle.pdf. B. Moller, T. Duong, and K. Kotowicz. This POODLE bites: Exploiting the SSL 3.0 fallback, Sept. 2014. https:\/\/www.openssl.org\/~bodo\/ssl-poodle.pdf."},{"key":"e_1_3_2_1_34_1","unstructured":"Network Time Foundation. Open NTP project. http:\/\/openntpproject.org.  Network Time Foundation. Open NTP project. http:\/\/openntpproject.org."},{"key":"e_1_3_2_1_35_1","unstructured":"C. Palmer and R. Sleevi. Gradually sunsetting SHA-1. Google Online Security Blog. http:\/\/googleonlinesecurity.blogspot.com\/2014\/09\/gradually-sunsetting-sha-1.html.  C. Palmer and R. Sleevi. Gradually sunsetting SHA-1. Google Online Security Blog. http:\/\/googleonlinesecurity.blogspot.com\/2014\/09\/gradually-sunsetting-sha-1.html."},{"key":"e_1_3_2_1_36_1","volume-title":"Heroku Waza","author":"Pike R.","year":"2012","unstructured":"R. Pike . Concurrency is not parallelism . In Heroku Waza , Jan. 2012 . http:\/\/talks.golang.org\/2012\/waza.slide. R. Pike. Concurrency is not parallelism. In Heroku Waza, Jan. 2012. http:\/\/talks.golang.org\/2012\/waza.slide."},{"key":"e_1_3_2_1_37_1","unstructured":"Solid IT. DB-Engines ranking. http:\/\/db-engines.com\/en\/ranking.  Solid IT. DB-Engines ranking. http:\/\/db-engines.com\/en\/ranking."},{"key":"e_1_3_2_1_38_1","volume-title":"23rd USENIX Security Symposium","author":"Wustrow E.","year":"2014","unstructured":"E. Wustrow , C. Swanson , and J. A. Halderman . TapDance: End-to-middle anticensorship without flow blocking . In 23rd USENIX Security Symposium , Aug. 2014 . E. Wustrow, C. Swanson, and J. A. Halderman. TapDance: End-to-middle anticensorship without flow blocking. In 23rd USENIX Security Symposium, Aug. 2014."},{"key":"e_1_3_2_1_39_1","unstructured":"K. Zetter. A cyberattack has caused confirmed physical damage for the second time ever Jan. 2015. http:\/\/www.wired.com\/2015\/01\/german-steel-mill-hack-destruction.  K. Zetter. A cyberattack has caused confirmed physical damage for the second time ever Jan. 2015. http:\/\/www.wired.com\/2015\/01\/german-steel-mill-hack-destruction."}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813703","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813703","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813703"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":39,"alternative-id":["10.1145\/2810103.2813703","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813703","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}