{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:39Z","timestamp":1750306059789,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T00:00:00Z","timestamp":1491177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,3]]},"DOI":"10.1145\/3019612.3019796","type":"proceedings-article","created":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T16:27:32Z","timestamp":1495729652000},"page":"1739-1746","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Attacks landscape in the dark side of the web"],"prefix":"10.1145","author":[{"given":"Onur","family":"Catakoglu","sequence":"first","affiliation":[{"name":"Eurecom &amp; Monaco Digital"}]},{"given":"Marco","family":"Balduzzi","sequence":"additional","affiliation":[{"name":"Trend Micro Research"}]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[{"name":"Eurecom"}]}],"member":"320","published-online":{"date-parts":[[2017,4,3]]},"reference":[{"unstructured":"Acunetix Ltd Web Vulnerability Scanner. http:\/\/www.acunetix.com\/vulnerability-scanner\/. Accessed: 2016-09-26.  Acunetix Ltd Web Vulnerability Scanner. http:\/\/www.acunetix.com\/vulnerability-scanner\/. Accessed: 2016-09-26.","key":"e_1_3_2_1_1_1"},{"unstructured":"Ahmia. https:\/\/ahmia.rl\/. Accessed: 2016-09-26.  Ahmia. https:\/\/ahmia.rl\/. Accessed: 2016-09-26.","key":"e_1_3_2_1_2_1"},{"unstructured":"Google Hack Honeypot. http:\/\/ghh.sourceforge.net\/. Accessed: 2016-09-26.  Google Hack Honeypot. http:\/\/ghh.sourceforge.net\/. Accessed: 2016-09-26.","key":"e_1_3_2_1_3_1"},{"unstructured":"High interaction honeypot analysis tool. https:\/\/sourceforge.net\/projects\/hihat\/. Accessed: 2016-09-26.  High interaction honeypot analysis tool. https:\/\/sourceforge.net\/projects\/hihat\/. Accessed: 2016-09-26.","key":"e_1_3_2_1_4_1"},{"unstructured":"ModSecurity: Open Source Web Application Firewall. https:\/\/www.modsecurity.org\/. Accessed: 2016-09-26.  ModSecurity: Open Source Web Application Firewall. https:\/\/www.modsecurity.org\/. Accessed: 2016-09-26.","key":"e_1_3_2_1_5_1"},{"unstructured":"MushMush Foundation http:\/\/mushmush.org\/. Accessed: 2016-09-26.  MushMush Foundation http:\/\/mushmush.org\/. Accessed: 2016-09-26.","key":"e_1_3_2_1_6_1"},{"unstructured":"Tor Project. Did the FBI Pay a University to Attack Tor Users? https:\/\/blog.torproject.org\/blog\/did-fbi-pay-university-attack-tor-users.  Tor Project. Did the FBI Pay a University to Attack Tor Users? https:\/\/blog.torproject.org\/blog\/did-fbi-pay-university-attack-tor-users.","key":"e_1_3_2_1_7_1"},{"unstructured":"B. H. U. 2014. You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget.  B. H. U. 2014. You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget.","key":"e_1_3_2_1_8_1"},{"unstructured":"D. Brown. Resilient botnet command and control with tor. 2010.  D. Brown. Resilient botnet command and control with tor. 2010.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","first-page":"2013","volume-title":"Proceedings of NDSS","author":"Canali D.","year":"2013"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2872427.2883056"},{"unstructured":"V. Ciancaglini M. Balduzzi R. McArdle and M. Rosier. Below the Surface: Exploring the Deep Web {Technical Report} http:\/\/www.deepweb-sites.com\/wp-content\/uploads\/2015\/11\/Below-the-Surface-Exploring-the-Deep-Web.pdf.  V. Ciancaglini M. Balduzzi R. McArdle and M. Rosier. Below the Surface: Exploring the Deep Web {Technical Report} http:\/\/www.deepweb-sites.com\/wp-content\/uploads\/2015\/11\/Below-the-Surface-Exploring-the-Deep-Web.pdf.","key":"e_1_3_2_1_12_1"},{"unstructured":"T. Fox-Brewster. Tor Hidden Services And Drug Markets Are Under Attack But Help Is On The Way. http:\/\/www.forbes.com\/sites\/thomasbrewster\/2015\/04\/01\/tor-hidden-services-under-dos-attack\/.  T. Fox-Brewster. Tor Hidden Services And Drug Markets Are Under Attack But Help Is On The Way. http:\/\/www.forbes.com\/sites\/thomasbrewster\/2015\/04\/01\/tor-hidden-services-under-dos-attack\/.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1963405.1963437"},{"key":"e_1_3_2_1_15_1","first-page":"287","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Kwon A.","year":"2015"},{"unstructured":"S. J. Lewis. OnionScan Report June 2016 - Snapshots of the Dark Web. https:\/\/mascherari.press\/onionscan-report-june-2016\/.  S. J. Lewis. OnionScan Report June 2016 - Snapshots of the Dark Web. https:\/\/mascherari.press\/onionscan-report-june-2016\/.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/2810103.2813667"},{"unstructured":"P. H. O'Neill. Bank thieves are using Tor to hide their malware {News} http:\/\/www.dailydot.com\/crime\/bank-malware-tor2web\/. Accessed: 2016-09-26.  P. H. O'Neill. Bank thieves are using Tor to hide their malware {News} http:\/\/www.dailydot.com\/crime\/bank-malware-tor2web\/. Accessed: 2016-09-26.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium -","volume":"13","author":"Provos N.","year":"2004"},{"unstructured":"A. Sanatinia and G. Noubir. Honions: Towards detection and identification of misbehaving tor hsdirs. https:\/\/www.securityweek2016.tu-darmstadt.de\/fileadmin\/user_upload\/Group_securityweek2016\/pets2016\/10_honions-sanatinia.pdf.  A. Sanatinia and G. Noubir. Honions: Towards detection and identification of misbehaving tor hsdirs. https:\/\/www.securityweek2016.tu-darmstadt.de\/fileadmin\/user_upload\/Group_securityweek2016\/pets2016\/10_honions-sanatinia.pdf.","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/2872427.2882992"},{"doi-asserted-by":"crossref","unstructured":"F. Toffalini M. Abba D. Carra and D. Balzarotti. Google Dorks: Analysis Creation and new Defenses. July 2016.  F. Toffalini M. Abba D. Carra and D. Balzarotti. Google Dorks: Analysis Creation and new Defenses. July 2016.","key":"e_1_3_2_1_23_1","DOI":"10.1007\/978-3-319-40667-1_13"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1007\/978-3-319-08506-7_16"},{"volume-title":"International Conference on Security and Privacy in Communication Systems. Springer","year":"2014","author":"Zhang J.","key":"e_1_3_2_1_25_1"}],"event":{"sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"acronym":"SAC 2017","name":"SAC 2017: Symposium on Applied Computing","location":"Marrakech Morocco"},"container-title":["Proceedings of the Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3019612.3019796","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3019612.3019796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:41Z","timestamp":1750215821000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3019612.3019796"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,3]]},"references-count":25,"alternative-id":["10.1145\/3019612.3019796","10.1145\/3019612"],"URL":"https:\/\/doi.org\/10.1145\/3019612.3019796","relation":{},"subject":[],"published":{"date-parts":[[2017,4,3]]},"assertion":[{"value":"2017-04-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}