{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:26:36Z","timestamp":1765887996108,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":37,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science Foundation","award":["CNS-1617593","CNS-1617902","CNS-1527086"],"award-info":[{"award-number":["CNS-1617593","CNS-1617902","CNS-1527086"]}]},{"name":"NSF CISE Research Infrastructure Grant","award":["1405641"],"award-info":[{"award-number":["1405641"]}]},{"name":"Office of Naval Research","award":["N00014- 17-1-2541","N00014-16-1-2264"],"award-info":[{"award-number":["N00014- 17-1-2541","N00014-16-1-2264"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3178876.3186089","type":"proceedings-article","created":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T15:53:48Z","timestamp":1523634828000},"page":"227-236","source":"Crossref","is-referenced-by-count":14,"title":["Betrayed by Your Dashboard"],"prefix":"10.1145","author":[{"given":"Oleksii","family":"Starov","sequence":"first","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]},{"given":"Yuchen","family":"Zhou","sequence":"additional","affiliation":[{"name":"Palo Alto Networks, Inc., Santa Clara, CA, USA"}]},{"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Palo Alto Networks, Inc., Santa Clara, CA, USA"}]},{"given":"Najmeh","family":"Miramirkhani","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]},{"given":"Nick","family":"Nikiforakis","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]}],"member":"320","reference":[{"unstructured":"2017. Anti-Malware Zone: BlpSearch, Logiciel Potentiellement Indesirable. (2017). https:\/\/nicolascoolman.eu\/2017\/09\/09\/pup-optional-blpsearch\/.","key":"key-10.1145\/3178876.3186089-1"},{"unstructured":"2017. BuiltWith Technology Lookup. (2017). https:\/\/builtwith.com.","key":"key-10.1145\/3178876.3186089-2"},{"unstructured":"2017. DomainIQ: Reverse Analytics. (2017). https:\/\/www.domainiq.com\/reverse_ analytics.","key":"key-10.1145\/3178876.3186089-3"},{"unstructured":"2017. How to remove Safe4Search redirect (Virus Removal Guide). (2017). https:\/\/malwaretips.com\/blogs\/remove-safe4search\/.","key":"key-10.1145\/3178876.3186089-4"},{"unstructured":"2017. NerdyData: Search Engine For Source Code. (2017). https:\/\/nerdydata.com.","key":"key-10.1145\/3178876.3186089-5"},{"unstructured":"2017. Open-Source Phishing Framework. (2017). https:\/\/getgophish.com\/.","key":"key-10.1145\/3178876.3186089-6"},{"unstructured":"2017. Open Web Analytics (OWA). (2017). http:\/\/www.openwebanalytics.com.","key":"key-10.1145\/3178876.3186089-7"},{"unstructured":"2017. OpenPhish: Phishing Intelligence. (2017). https:\/\/openphish.com\/.","key":"key-10.1145\/3178876.3186089-8"},{"unstructured":"2017. PhishTank: Join the fight against phishing. (2017). https:\/\/www.phishtank. com\/.","key":"key-10.1145\/3178876.3186089-9"},{"unstructured":"2017. PIWIK: Open Analytics Platform. (2017). https:\/\/piwik.org.","key":"key-10.1145\/3178876.3186089-10"},{"unstructured":"2017. PublicWWW: Search Engine for Source Code. (2017). https:\/\/publicwww. com.","key":"key-10.1145\/3178876.3186089-11"},{"unstructured":"2017. RiskIQ: PassiveTotal Threat Investigation Platform. (2017). https:\/\/www. riskiq.com.","key":"key-10.1145\/3178876.3186089-12"},{"unstructured":"2017. SameID.net: Cut through hours of keyword research in seconds. (2017). http:\/\/sameid.net.","key":"key-10.1145\/3178876.3186089-13"},{"unstructured":"2017. The Social-Engineer Toolkit (SET). (2017). https:\/\/github.com\/trustedsec\/ social-engineer-toolkit.","key":"key-10.1145\/3178876.3186089-14"},{"unstructured":"2017. SpyOnWeb Research Tool: Internet Competitive Intelligence. (2017). http:\/\/spyonweb.com.","key":"key-10.1145\/3178876.3186089-15"},{"doi-asserted-by":"crossref","unstructured":"Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, and Suku Nair. 2007. A Comparison of Machine Learning Techniques for Phishing Detection. In Proceedings of the Anti-phishing Working Groups 2Nd Annual eCrime Researchers Summit (eCrime '07). ACM, New York, NY, USA, 60--69. https:\/\/doi.org\/10.1145\/1299015.1299021","key":"key-10.1145\/3178876.3186089-16","DOI":"10.1145\/1299015.1299021"},{"unstructured":"Lawrence Alexander. 2015. Bellingcat: Unveiling Hidden Connections with Google Analytics IDs. (2015). https:\/\/www.bellingcat.com\/resources\/how-tos\/ 2015\/07\/23\/unveiling-hidden-connections-with-google-analytics-ids\/.","key":"key-10.1145\/3178876.3186089-17"},{"unstructured":"Lawrence Alexander. 2015. Open-Source Information Reveals ProKremlin Web Campaign. (2015). https:\/\/globalvoices.org\/2015\/07\/13\/ open-source-information-reveals-pro-kremlin-web-campaign\/.","key":"key-10.1145\/3178876.3186089-18"},{"doi-asserted-by":"crossref","unstructured":"Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca, and Giorgio Giacinto. 2015. Clustering Android Malware Families by Http Tra$c. In Proceedings of the 2015 10th International Conference on Malicious and Unwanted Software (MALWARE) (MALWARE '15). IEEE Computer Society, Washington, DC, USA, 128--135. https:\/\/doi.org\/10.1109\/MALWARE.2015.7413693","key":"key-10.1145\/3178876.3186089-19","DOI":"10.1109\/MALWARE.2015.7413693"},{"unstructured":"Suresh Babu.K. 2013. Phishing Websites Detection Based on Web Source Code and Url in the Webpage.","key":"key-10.1145\/3178876.3186089-20"},{"doi-asserted-by":"crossref","unstructured":"Aaron Blum, Brad Wardman, Thamar Solorio, and Gary Warner. 2010. Lexical Feature Based Phishing URL Detection Using Online Learning. In Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security (AISec '10). ACM, New York, NY, USA, 54--60. https:\/\/doi.org\/10.1145\/1866423.1866434","key":"key-10.1145\/3178876.3186089-21","DOI":"10.1145\/1866423.1866434"},{"doi-asserted-by":"crossref","unstructured":"Onur Catakoglu, Marco Balduzzi, and Davide Balzarotti. 2016. Automatic Extraction of Indicators of Compromise for Web Applications. In Proceedings of the 25th International Conference on World Wide Web (WWW). 333--343.","key":"key-10.1145\/3178876.3186089-22","DOI":"10.1145\/2872427.2883056"},{"unstructured":"Marco Cova, Christopher Kruegel, and Giovanni Vigna. 2008. There Is No Free Phish: An Analysis of\" Free\" and Live Phishing Kits. WOOT 8 (2008), 1--8.","key":"key-10.1145\/3178876.3186089-23"},{"doi-asserted-by":"crossref","unstructured":"Jake Drew and Tyler Moore. 2014. Automatic Identification of Replicated Criminal Websites Using Combined Clustering. In International Workshop on Cyber Crime (IWCC), IEEE Security and Privacy Workshops. IEEE. http:\/\/lyle.smu.edu\/~tylerm\/ iwcc14.pdf","key":"key-10.1145\/3178876.3186089-24","DOI":"10.1109\/SPW.2014.26"},{"doi-asserted-by":"crossref","unstructured":"Luca Invernizzi and Paolo Milani Comparetti. 2012. EvilSeed: A Guided Approach to Finding Malicious Web Pages. In IEEE Symposium on Security and Privacy, SP 2012, 21--23 May 2012, San Francisco, California, USA. 428--442. https:\/\/doi.org\/10. 1109\/SP.2012.33","key":"key-10.1145\/3178876.3186089-25","DOI":"10.1109\/SP.2012.33"},{"doi-asserted-by":"crossref","unstructured":"Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero-Gomez, Nikolaos Pitropakis, Nick Nikiforakis, and Manos Antonakakis. 2017. Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS).","key":"key-10.1145\/3178876.3186089-26","DOI":"10.1145\/3133956.3134002"},{"unstructured":"Ahmed E. Kosba, Aziz Mohaisen, Andrew West, Trevor Tonn, and Huy Kang Kim. 2015. ADAM: Automated Detection and Attribution of Malicious Webpages. Springer International Publishing, Cham, 3--16. https:\/\/doi.org\/10.1007\/ 978--3--319--15087--1_1","key":"key-10.1145\/3178876.3186089-27"},{"doi-asserted-by":"crossref","unstructured":"Najmeh Miramirkhani, Oleksii Starov, and Nick Nikiforakis. 2017. Dial One for Scam: A Large-Scale Analysis of Technical Support Scams. In Proceedings of the 24th Network and Distributed System Security Symposium (NDSS).","key":"key-10.1145\/3178876.3186089-28","DOI":"10.14722\/ndss.2017.23163"},{"unstructured":"Saeed Nari and Ali A. Ghorbani. 2013. Automated Malware Classification Based on Network Behavior. In Proceedings of the 2013 International Conference on Computing, Networking and Communications (ICNC) (ICNC '13). IEEE Computer Society, Washington, DC, USA, 642--647. https:\/\/doi.org\/10.1109\/ICCNC.2013. 6504162","key":"key-10.1145\/3178876.3186089-29"},{"doi-asserted-by":"crossref","unstructured":"Ying Pan and Xuhua Ding. 2006. Anomaly Based Web Phishing Page Detection. In Proceedings of the 22Nd Annual Computer Security Applications Conference (ACSAC '06). IEEE Computer Society, Washington, DC, USA, 381--392. https: \/\/doi.org\/10.1109\/ACSAC.2006.13","key":"key-10.1145\/3178876.3186089-30","DOI":"10.1109\/ACSAC.2006.13"},{"doi-asserted-by":"crossref","unstructured":"Roberto Perdisci, Davide Ariu, and Giorgio Giacinto. 2013. Scalable Fine-grained Behavioral Clustering of HTTP-based Malware. Comput. Netw. 57, 2 (Feb. 2013), 487--500. https:\/\/doi.org\/10.1016\/j.comnet.2012.06.022","key":"key-10.1145\/3178876.3186089-31","DOI":"10.1016\/j.comnet.2012.06.022"},{"unstructured":"Roberto Perdisci, Wenke Lee, and Nick Feamster. 2010. Behavioral Clustering of HTTP-based Malware and Signature Generation Using Malicious Network Traces. In Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation (NSDI'10). USENIX Association, Berkeley, CA, USA, 26--26. http:\/\/dl.acm.org\/citation.cfm?id=1855711.1855737","key":"key-10.1145\/3178876.3186089-32"},{"doi-asserted-by":"crossref","unstructured":"Oleksii Starov and Nick Nikiforakis. 2017. Extended Tracking Powers: Measuring the Privacy Di\"usion Enabled by Browser Extensions. In Proceedings of the 26th International World Wide Web Conference (WWW).","key":"key-10.1145\/3178876.3186089-33","DOI":"10.1145\/3038912.3052596"},{"doi-asserted-by":"crossref","unstructured":"Liu Wenyin, Guanglin Huang, Liu Xiaoyue, Zhang Min, and Xiaotie Deng. 2005. Detection of Phishing Webpages Based on Visual Similarity. In Special Interest Tracks and Posters of the 14th International Conference on World Wide Web (WWW '05). ACM, New York, NY, USA, 1060--1061. https:\/\/doi.org\/10.1145\/1062745. 1062868","key":"key-10.1145\/3178876.3186089-34","DOI":"10.1145\/1062745"},{"doi-asserted-by":"crossref","unstructured":"Li Xu, Zhenxin Zhan, Shouhuai Xu, and Keying Ye. 2013. Cross-layer Detection of Malicious Websites. In Proceedings of the Third ACM Conference on Data and Application Security and Privacy (CODASPY '13). ACM, New York, NY, USA, 141--152. https:\/\/doi.org\/10.1145\/2435349.2435366","key":"key-10.1145\/3178876.3186089-35","DOI":"10.1145\/2435349.2435366"},{"doi-asserted-by":"crossref","unstructured":"Min Zheng, Mingshen Sun, and John C. S. Lui. 2013. Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware. In Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM '13). IEEE Computer Society, Washington, DC, USA, 163--171. https: \/\/doi.org\/10.1109\/TrustCom.2013.25","key":"key-10.1145\/3178876.3186089-36","DOI":"10.1109\/TrustCom.2013.25"},{"doi-asserted-by":"crossref","unstructured":"Weiwei Zhuang, Qingshan Jiang, and Tengke Xiong. 2012. An Intelligent Antiphishing Strategy Model for Phishing Website Detection. In 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), Macau, China, June 18--21, 2012. 51--56. https:\/\/doi.org\/10.1109\/ICDCSW.2012.66","key":"key-10.1145\/3178876.3186089-37","DOI":"10.1109\/ICDCSW.2012.66"}],"event":{"number":"2018","sponsor":["SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web","IW3C2, International World Wide Web Conference Committee"],"acronym":"WWW '18","name":"the 2018 World Wide Web Conference","start":{"date-parts":[[2018,4,23]]},"location":"Lyon, France","end":{"date-parts":[[2018,4,27]]}},"container-title":["Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3178876.3186089","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3186089&ftid=1957530&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:28Z","timestamp":1750212688000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3178876.3186089"}},"subtitle":["Discovering Malicious Campaigns via Web Analytics"],"proceedings-subject":"World Wide Web","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1145\/3178876.3186089","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}