{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:26:24Z","timestamp":1765887984022,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":24,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3178876.3186086","type":"proceedings-article","created":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T15:53:48Z","timestamp":1523634828000},"page":"197-206","source":"Crossref","is-referenced-by-count":10,"title":["ProxyTorrent"],"prefix":"10.1145","author":[{"given":"Diego","family":"Perino","sequence":"first","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]},{"given":"Matteo","family":"Varvello","sequence":"additional","affiliation":[{"name":"AT&T Labs - Research, Bedminster, USA"}]},{"given":"Claudio","family":"Soriente","sequence":"additional","affiliation":[{"name":"NEC Labs Europe, Madrid, Spain"}]}],"member":"320","reference":[{"key":"key-10.1145\/3178876.3186086-1","unstructured":"Devdatta Akhawe and Adrienne Porter Felt. 2013. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In USENIX Security Symposium. 257--272."},{"key":"key-10.1145\/3178876.3186086-2","doi-asserted-by":"crossref","unstructured":"Taejoong Chung, David R. Choffnes, and Alan Mislove. 2016. Tunneling for Transparency: A Large-Scale Analysis of End-to-End Violations in the Internet. In ACM Internet Measurement Conference,IMC. 199--213.","DOI":"10.1145\/2987443.2987455"},{"key":"key-10.1145\/3178876.3186086-3","unstructured":"CIAO. 2017. Automated free proxies discovery\/usage. (2017). https:\/\/goo.gl\/ NgJmLE."},{"key":"key-10.1145\/3178876.3186086-4","unstructured":"CURL. 2017. Command line tool and library for transferring data with URLs. (2017). https:\/\/curl.haxx.se\/."},{"key":"key-10.1145\/3178876.3186086-5","unstructured":"Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2013. ZMap: Fast Internet-Wide Scanning and its Security Applications. In USENIX Security Symposium. 605--620."},{"key":"key-10.1145\/3178876.3186086-6","unstructured":"Brendan J Frey and Delbert Dueck. 2007. Clustering by passing messages between data points. science 315, 5814 (2007), 972--976."},{"key":"key-10.1145\/3178876.3186086-7","unstructured":"Haschek Solutions. 2017. ProxyChecker. (2017). https:\/\/github.com\/chrisiaut\/ proxycheck_script."},{"key":"key-10.1145\/3178876.3186086-8","unstructured":"Hola. 2017. Free VPN, Secure Browsing, Unrestricted Access. (2017). http: \/\/hola.org\/."},{"key":"key-10.1145\/3178876.3186086-9","unstructured":"HTTP Archive. [n. d.]. The HTTP Archive tracks how the Web is built. ([n. d.]). http:\/\/httparchive.org\/."},{"key":"key-10.1145\/3178876.3186086-10","doi-asserted-by":"crossref","unstructured":"Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali K&#226;afar, and Vern Paxson. 2016. An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. In ACM Internet Measurement Conference,IMC. 349--364.","DOI":"10.1145\/2987443.2987471"},{"key":"key-10.1145\/3178876.3186086-11","doi-asserted-by":"crossref","unstructured":"Christian Kreibich, Nicholas Weaver, Boris Nechaev, and Vern Paxson. 2010. Netalyzr: illuminating the edge network. In ACM nternet Measurement Conference, IMC. 246--259.","DOI":"10.1145\/1879141.1879173"},{"key":"key-10.1145\/3178876.3186086-12","unstructured":"letsencrypt. 2017. A free, automated, and open Certificate Authority. (2017). https:\/\/letsencrypt.org\/."},{"key":"key-10.1145\/3178876.3186086-13","unstructured":"MAXMIND. 2017. IP Geolocation and Online Fraud Prevention. (2017). https: \/\/www.maxmind.com\/."},{"key":"key-10.1145\/3178876.3186086-14","unstructured":"NGINX. 2017. A free, open-source, high-performance HTTP server. (2017). https:\/\/nginx.org\/."},{"key":"key-10.1145\/3178876.3186086-15","doi-asserted-by":"crossref","unstructured":"Vasile Claudiu Perta, Marco Valerio Barbera, Gareth Tyson, Hamed Haddadi, and Alessandro Mei. 2015. A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients. PoPETs 2015, 1 (2015), 77--91.","DOI":"10.1515\/popets-2015-0006"},{"key":"key-10.1145\/3178876.3186086-16","unstructured":"PhantomJS. 2017. Headless Browser. (2017). http:\/\/phantomjs.org\/."},{"key":"key-10.1145\/3178876.3186086-17","unstructured":"PLANETLAB. 2017. An open platform for developing, deploying, and accessing planetary-scale services. (2017). https:\/\/www.planet-lab.org\/."},{"key":"key-10.1145\/3178876.3186086-18","unstructured":"ProxyTorrent team. 2017. Ciao code. (2017). https:\/\/github.com\/ciao-dev\/CIAO."},{"key":"key-10.1145\/3178876.3186086-19","unstructured":"Charles Reis, Steven D. Gribble, Tadayoshi Kohno, and Nicholas C. Weaver. 2008. Detecting In-Flight Page Changes with Web Tripwires. In USENIX Symposium on Networked Systems Design &#38; Implementation, NSDI. 31--44."},{"key":"key-10.1145\/3178876.3186086-20","unstructured":"Will Scott, Ravi Bhoraskar, , and Arvind Krishnamurthy. 2015. Understanding Open Proxies in the Wild. In Chaos Communication Camp."},{"key":"key-10.1145\/3178876.3186086-21","doi-asserted-by":"crossref","unstructured":"Georgios Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, and Michalis Polychronakis. 2018. A Large-scale Analysis of Content Modification by Open HTTP Proxies. Network and Distributed System Security Symposium (NDSS). (2018).","DOI":"10.14722\/ndss.2018.23244"},{"key":"key-10.1145\/3178876.3186086-22","unstructured":"Gareth Tyson, Shan Huang, F&#233;lix Cuadrado, Ignacio Castro, Vasile Claudiu Perta, Arjuna Sathiaseelan, and Steve Uhlig. 2017. Exploring HTTP Header Manipulation In-The-Wild. In International Conference on World Wide Web, WWW. 451--458."},{"key":"key-10.1145\/3178876.3186086-23","doi-asserted-by":"crossref","unstructured":"Matteo Varvello, Jeremy Blackburn, David Naylor, and Konstantina Papagiannaki. 2016. EYEORG: A Platform For Crowdsourcing Web Quality Of Experience Measurements. In CONEXT.","DOI":"10.1145\/2999572.2999590"},{"key":"key-10.1145\/3178876.3186086-24","doi-asserted-by":"crossref","unstructured":"Nicholas Weaver, Christian Kreibich, Martin Dam, and Vern Paxson. 2014. Here Be Web Proxies. In Passive and Active Measurement, PAM. 183--192.","DOI":"10.1007\/978-3-319-04918-2_18"}],"event":{"number":"2018","sponsor":["SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web","IW3C2, International World Wide Web Conference Committee"],"acronym":"WWW '18","name":"the 2018 World Wide Web Conference","start":{"date-parts":[[2018,4,23]]},"location":"Lyon, France","end":{"date-parts":[[2018,4,27]]}},"container-title":["Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3178876.3186086","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3186086&ftid=1957488&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:28Z","timestamp":1750212688000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3178876.3186086"}},"subtitle":["Untangling the Free HTTP(S) Proxy Ecosystem"],"proceedings-subject":"World Wide Web","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1145\/3178876.3186086","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}