{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T17:58:49Z","timestamp":1763747929286,"version":"3.41.0"},"reference-count":88,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T00:00:00Z","timestamp":1544400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"crossref","award":["CNS-1526718, CNS-1464087, CNS-1540217, CNS-1542018 and CNS-1464088"],"award-info":[{"award-number":["CNS-1526718, CNS-1464087, CNS-1540217, CNS-1542018 and CNS-1464088"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2019,2,28]]},"abstract":"<jats:p>Recent years have seen the Short Message Service (SMS) become a critical component of the security infrastructure, assisting with tasks including identity verification and second-factor authentication. At the same time, this messaging infrastructure has become dramatically more open and connected to public networks than ever before. However, the implications of this openness, the security practices of benign services, and the malicious misuse of this ecosystem are not well understood. In this article, we provide a comprehensive longitudinal study to answer these questions, analyzing over 900,000 text messages sent to public online SMS gateways over the course of 28 months. From this data, we uncover the geographical distribution of spam messages, study SMS as a transmission medium of malicious content, and find that changes in benign and malicious behaviors in the SMS ecosystem have been minimal during our collection period. The key takeaways of this research show many services sending sensitive security-based messages through an unencrypted medium, implementing low entropy solutions for one-use codes, and behaviors indicating that public gateways are primarily used for evading account creation policies that require verified phone numbers. This latter finding has significant implications for combating phone-verified account fraud and demonstrates that such evasion will continue to be difficult to detect and prevent.<\/jats:p>","DOI":"10.1145\/3268932","type":"journal-article","created":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T13:09:16Z","timestamp":1544447356000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Characterizing the Security of the SMS Ecosystem with Public Gateways"],"prefix":"10.1145","volume":"22","author":[{"given":"Bradley","family":"Reaves","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"Luis","family":"Vargas","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Nolen","family":"Scaife","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Dave","family":"Tian","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Logan","family":"Blue","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Kevin R. B.","family":"Butler","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"320","published-online":{"date-parts":[[2018,12,10]]},"reference":[{"volume-title":"Financial Cryptography and Data Security. No. 7859 in Lecture Notes in Computer Science","author":"Adham Manal","key":"e_1_2_1_1_1"},{"volume-title":"Proceedings of the Wireless Telecommunications Symposium (WTS\u201909)","author":"Ahmadian Z.","key":"e_1_2_1_2_1"},{"volume-title":"Proceedings of the IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA\u201909)","author":"Aloul F.","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","unstructured":"Apple Continuity 2015. Apple continuity. Retrieved from https:\/\/support.apple.com\/en-us\/HT204681.  Apple Continuity 2015. Apple continuity. Retrieved from https:\/\/support.apple.com\/en-us\/HT204681."},{"key":"e_1_2_1_5_1","unstructured":"Jeff Atwood. 2012. Make your email hacker proof. Coding Horror. Retrieved from http:\/\/blog.codinghorror.com\/make-your-email-hacker-proof\/.  Jeff Atwood. 2012. Make your email hacker proof. Coding Horror. Retrieved from http:\/\/blog.codinghorror.com\/make-your-email-hacker-proof\/."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9001-y"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647935.741059"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Boss Revolution 2015. Boss revolution. Retrieved from https:\/\/www.bossrevolution.ca.  Boss Revolution 2015. Boss revolution. Retrieved from https:\/\/www.bossrevolution.ca.","DOI":"10.5465\/ambpp.2015.15870abstract"},{"key":"e_1_2_1_9_1","unstructured":"Burner 2015. Burner app. Retrieved from http:\/\/www.burnerapp.com.  Burner 2015. Burner app. Retrieved from http:\/\/www.burnerapp.com."},{"key":"e_1_2_1_10_1","unstructured":"Kelsey Campbell-Dollaghan. 2014. How hackers reportedly side-Stepped Google\u2019s two-factor authentication. Gizmodo. Retrieved from http:\/\/gizmodo.com\/how-hackers-reportedly-side-stepped-gmails-two-factor-a-1653631338.  Kelsey Campbell-Dollaghan. 2014. How hackers reportedly side-Stepped Google\u2019s two-factor authentication. Gizmodo. Retrieved from http:\/\/gizmodo.com\/how-hackers-reportedly-side-stepped-gmails-two-factor-a-1653631338."},{"key":"e_1_2_1_11_1","unstructured":"CardTechnology. 2007. UAE ID card to support iris biometrics. Retrieved from http:\/\/www.cardtechnology.com\/article.html?id&equals;20070423V0XCZ91L.  CardTechnology. 2007. UAE ID card to support iris biometrics. Retrieved from http:\/\/www.cardtechnology.com\/article.html?id&equals;20070423V0XCZ91L."},{"key":"e_1_2_1_12_1","unstructured":"Carlos Castillo. 2011. Spitmo vs zitmo: Banking trojans target android. McAfee Labs Blog. Retrieved from http:\/\/blogs.mcafee.com\/mcafee-labs\/spitmo-vs-zitmo-banking-trojans-target-android.  Carlos Castillo. 2011. Spitmo vs zitmo: Banking trojans target android. McAfee Labs Blog. Retrieved from http:\/\/blogs.mcafee.com\/mcafee-labs\/spitmo-vs-zitmo-banking-trojans-target-android."},{"volume-title":"Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET\u201910)","year":"2010","author":"Cho Chia Yuan","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","unstructured":"Nathan Crooks. 2015. Venezuela the country with four exchange rates. Bloomberg Business. Retrieved from http:\/\/www.bloomberg.com\/news\/articles\/2015-02-19\/venezuela-the-country-with-four-exchange-rates.  Nathan Crooks. 2015. Venezuela the country with four exchange rates. Bloomberg Business. Retrieved from http:\/\/www.bloomberg.com\/news\/articles\/2015-02-19\/venezuela-the-country-with-four-exchange-rates."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664272"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2010.81"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.144"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.02.053"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_24"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881412.1881439"},{"key":"e_1_2_1_21_1","unstructured":"Duo Mobile 2015. Mobile authentication. Duo Mobile. Retrieved from https:\/\/www.duosecurity.com\/product\/methods\/duo-mobile.  Duo Mobile 2015. Mobile authentication. Duo Mobile. Retrieved from https:\/\/www.duosecurity.com\/product\/methods\/duo-mobile."},{"key":"e_1_2_1_22_1","unstructured":"eCall 2015. eCall. Retrieved from http:\/\/www.ecall.ch.  eCall 2015. eCall. Retrieved from http:\/\/www.ecall.ch."},{"volume-title":"SMS One-Time Passwords: Security in Two-Factor Authenication. Master\u2019s Thesis","author":"Lothe Eide Jan-Erik","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"volume-title":"Frey and Delbert Dueck","year":"2007","author":"Brendan","key":"e_1_2_1_25_1"},{"key":"e_1_2_1_26_1","unstructured":"Frim 2015. Frim. Retrieved from http:\/\/fr.im.  Frim 2015. Frim. Retrieved from http:\/\/fr.im."},{"volume-title":"Proceedings of the 19th Network and Distributed System Security Symposium.","year":"2012","author":"Golde Nico","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","unstructured":"Google Voice 2015. Google voice. Retrieved from http:\/\/www.google.com\/voice.  Google Voice 2015. Google voice. Retrieved from http:\/\/www.google.com\/voice."},{"volume-title":"YeeYin Choong et al","year":"2016","author":"Grassi Paul A.","key":"e_1_2_1_29_1"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382283"},{"key":"e_1_2_1_31_1","unstructured":"Stephen Hilt and Philippe Lin. 2016. Leaking beeps: Unencrypted pager messages in the healthcare industry. In TrendLabs Research. Retrieved from https:\/\/documents.trendmicro.com\/assets\/threat-reports\/wp-leaking-beeps-healthcare.pdf.  Stephen Hilt and Philippe Lin. 2016. Leaking beeps: Unencrypted pager messages in the healthcare industry. In TrendLabs Research. Retrieved from https:\/\/documents.trendmicro.com\/assets\/threat-reports\/wp-leaking-beeps-healthcare.pdf."},{"key":"e_1_2_1_32_1","unstructured":"IBM Security Trusteer Rapport 2016. IBM security trusteer rapport. Retrieved from http:\/\/www-03.ibm.com\/software\/products\/en\/trusteer-rapport.  IBM Security Trusteer Rapport 2016. IBM security trusteer rapport. Retrieved from http:\/\/www-03.ibm.com\/software\/products\/en\/trusteer-rapport."},{"volume-title":"IdentityGuard identity authentication platform. Entrust","author":"IdentityGuard","key":"e_1_2_1_33_1"},{"volume-title":"Proceedings of the 22nd USENIX Security Symposium. USENIX Association, Washington DC.","year":"2013","author":"Jiang Nan","key":"e_1_2_1_34_1"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"volume-title":"Proceedings of the 2015 USENIX Security Symposium.","year":"2011","author":"Kanich Chris","key":"e_1_2_1_36_1"},{"key":"e_1_2_1_37_1","unstructured":"Karsten Nohl. 2016. SS7 attack update and phone phreaking. In GeekFest Berlin. Retrieved from https:\/\/www.youtube.com\/watch?v&equals;BbPLscWQ1Bw.  Karsten Nohl. 2016. SS7 attack update and phone phreaking. In GeekFest Berlin. Retrieved from https:\/\/www.youtube.com\/watch?v&equals;BbPLscWQ1Bw."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39185-9_5"},{"volume-title":"Proceedings of the 20th International Conference on Financial Cryptography and Data Security.","author":"Konoth Radhesh Krishnan","key":"e_1_2_1_39_1"},{"volume-title":"Security of Mobile TAN on Smartphones. Master\u2019s Thesis","author":"Koot Laurens","key":"e_1_2_1_40_1"},{"volume-title":"Banks: Credit card breach at Home Depot. Krebs on Security.","year":"2014","author":"Krebs Brian","key":"e_1_2_1_41_1"},{"key":"e_1_2_1_42_1","unstructured":"Brian Krebs. 2015a. Experian breach affects 15 million consumers. Krebs on Security. Retrieved from http:\/\/krebsonsecurity.com\/2015\/10\/experian-breach-affects-15-million-consumers\/.  Brian Krebs. 2015a. Experian breach affects 15 million consumers. Krebs on Security. Retrieved from http:\/\/krebsonsecurity.com\/2015\/10\/experian-breach-affects-15-million-consumers\/."},{"key":"e_1_2_1_43_1","unstructured":"Brian Krebs. 2015b. Online cheating site ashleymadison hacked. Krebs on Security. Retrieved from http:\/\/krebsonsecurity.com\/2015\/07\/online-cheating-site-ashleymadison-hacked\/.  Brian Krebs. 2015b. Online cheating site ashleymadison hacked. Krebs on Security. Retrieved from http:\/\/krebsonsecurity.com\/2015\/07\/online-cheating-site-ashleymadison-hacked\/."},{"volume-title":"Proceedings of the 20th Network and Distributed System Security Symposium.","year":"2013","author":"Lever Charles","key":"e_1_2_1_44_1"},{"key":"e_1_2_1_45_1","unstructured":"John Leyden. 2008. Visa trials PIN payment card to fight online fraud. Retrieved from http:\/\/www.theregister.co.uk\/2008\/11\/10\/visa_one_time_code_card\/.  John Leyden. 2008. Visa trials PIN payment card to fight online fraud. Retrieved from http:\/\/www.theregister.co.uk\/2008\/11\/10\/visa_one_time_code_card\/."},{"volume-title":"Proceedings of the ITU Workshop on SS7 Security.","year":"2016","author":"Melette Luca","key":"e_1_2_1_46_1"},{"key":"e_1_2_1_47_1","first-page":"950","article-title":"Computer for verifying numbers. Retrieved from https:\/\/www.google.com\/patents\/US2950048 U.S","volume":"2","author":"Luhn Hans Peter","year":"1960","journal-title":"Patent"},{"key":"e_1_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Erika McCallister Tim Grance and Karen Scarfone. 2010. Guide to protecting the confidentiality of personally identifiable information (PII). Recommendations of the National Institute of Standards and Technology. Retrieved from http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-122\/sp800-122.pdf.   Erika McCallister Tim Grance and Karen Scarfone. 2010. Guide to protecting the confidentiality of personally identifiable information (PII). Recommendations of the National Institute of Standards and Technology. Retrieved from http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-122\/sp800-122.pdf.","DOI":"10.6028\/NIST.SP.800-122"},{"key":"e_1_2_1_49_1","unstructured":"MightyText 2015. MightyText. Retrieved from http:\/\/mightytext.net.  MightyText 2015. MightyText. Retrieved from http:\/\/mightytext.net."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39235-1_9"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398822"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516772"},{"key":"e_1_2_1_53_1","unstructured":"Nexmo 2015. Nexmo. Retrieved from https:\/\/www.nexmo.com\/.  Nexmo 2015. Nexmo. Retrieved from https:\/\/www.nexmo.com\/."},{"key":"e_1_2_1_54_1","unstructured":"OpenCNAM 2015. OpenCNAM. Retrieved from https:\/\/www.opencnam.com.  OpenCNAM 2015. OpenCNAM. Retrieved from https:\/\/www.opencnam.com."},{"key":"e_1_2_1_55_1","unstructured":"PayCenter 2015. PayCenter. Retrieved from https:\/\/www.paycenter.de.  PayCenter 2015. PayCenter. Retrieved from https:\/\/www.paycenter.de."},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201918)","author":"Peeters Christian","key":"e_1_2_1_56_1"},{"key":"e_1_2_1_57_1","unstructured":"Pinger 2015. Pinger. Retrieved from http:\/\/www.pinger.com.  Pinger 2015. Pinger. Retrieved from http:\/\/www.pinger.com."},{"key":"e_1_2_1_58_1","unstructured":"Plivo 2015. Plivo. Retrieved from https:\/\/www.plivo.com\/.  Plivo 2015. Plivo. Retrieved from https:\/\/www.plivo.com\/."},{"key":"e_1_2_1_59_1","unstructured":"Pushbullet 2015. Pushbullet. Retrieved from http:\/\/pushbullet.com.  Pushbullet 2015. Pushbullet. Retrieved from http:\/\/pushbullet.com."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939937"},{"volume-title":"Proceedings of the USENIX Security Symposium (SECURITY\u201915)","year":"2015","author":"Reaves Bradley","key":"e_1_2_1_61_1"},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201916)","author":"Reaves Bradley","key":"e_1_2_1_62_1"},{"key":"e_1_2_1_63_1","unstructured":"RedOxygen 2015. RedOxygen. Retrieved from http:\/\/www.redoxygen.com.  RedOxygen 2015. RedOxygen. Retrieved from http:\/\/www.redoxygen.com."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2320579"},{"volume-title":"BVPSMS: A batch verification protocol for end-to-end secure SMS for mobile users","year":"2018","author":"Saxena N.","key":"e_1_2_1_65_1"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053291.1053327"},{"key":"e_1_2_1_67_1","unstructured":"Scrapy 2015. Scrapy. Retrieved from http:\/\/scrapy.org.  Scrapy 2015. Scrapy. Retrieved from http:\/\/scrapy.org."},{"key":"e_1_2_1_68_1","unstructured":"SecurID 2015. RSA SecurID hardware tokens. EMC Security. Retrieved from http:\/\/www.emc.com\/security\/rsa-securid\/rsa-securid-hardware-tokens.htm.  SecurID 2015. RSA SecurID hardware tokens. EMC Security. Retrieved from http:\/\/www.emc.com\/security\/rsa-securid\/rsa-securid-hardware-tokens.htm."},{"key":"e_1_2_1_69_1","unstructured":"SiPix Imagining Inc. 2006. World\u2019s first ISO compliant payment displaycard using SiPix and SmartDisplayer\u2019s flexible display panel. Retrieved from http:\/\/www.businesswire.com\/portal\/site\/google\/index.jsp?ndmViewId&equals;news_view8newsId&equals;200605100061938newsLang&equals;en.  SiPix Imagining Inc. 2006. World\u2019s first ISO compliant payment displaycard using SiPix and SmartDisplayer\u2019s flexible display panel. Retrieved from http:\/\/www.businesswire.com\/portal\/site\/google\/index.jsp?ndmViewId&equals;news_view8newsId&equals;200605100061938newsLang&equals;en."},{"key":"e_1_2_1_70_1","unstructured":"Ann Skudlark. 2014. Characterizing SMS Spam in a Large Cellular Network via Mining Victim Spam Reports. Retrieved from http:\/\/web2-clone.research.att.com\/export\/sites\/att_labs\/techdocs\/TD_101435.pdf.  Ann Skudlark. 2014. Characterizing SMS Spam in a Large Cellular Network via Mining Victim Spam Reports. Retrieved from http:\/\/web2-clone.research.att.com\/export\/sites\/att_labs\/techdocs\/TD_101435.pdf."},{"key":"e_1_2_1_71_1","unstructured":"SMS Forum. 2003. Short message peer to peer protocol specification 5.0. Retrieved from http:\/\/opensmpp.org\/specs\/smppv50.pdf.  SMS Forum. 2003. Short message peer to peer protocol specification 5.0. Retrieved from http:\/\/opensmpp.org\/specs\/smppv50.pdf."},{"key":"e_1_2_1_72_1","unstructured":"Anne-Birte Stensgaard. 2006. Biometric breakthrough\u2014Credit cards secured with fingerprint recognition made feasible. Retrieved from http:\/\/www.ameinfo.com\/58236.html.  Anne-Birte Stensgaard. 2006. Biometric breakthrough\u2014Credit cards secured with fingerprint recognition made feasible. Retrieved from http:\/\/www.ameinfo.com\/58236.html."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348526"},{"key":"e_1_2_1_75_1","unstructured":"The Open University. 2014. Text messaging usage statistics. Retrieved from http:\/\/www.openuniversity.edu\/news\/news\/2014-text-messaging-usage-statistics.  The Open University. 2014. Text messaging usage statistics. Retrieved from http:\/\/www.openuniversity.edu\/news\/news\/2014-text-messaging-usage-statistics."},{"volume-title":"Proceedings of the 14th Annual Workshop on the Economics of Information Security.","year":"2015","author":"Thomas Kurt","key":"e_1_2_1_76_1"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660321"},{"volume-title":"Proceedings of the 2015 USENIX Security Symposium. 195--210","year":"2013","author":"Thomas Kurt","key":"e_1_2_1_78_1"},{"volume-title":"SIM swap","year":"2015","author":"Tims Anna","key":"e_1_2_1_79_1"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.120"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/1460557.1460560"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925939"},{"volume-title":"Proceedings of the USENIX Security Symposium (SECURITY\u201907)","year":"2007","author":"Traynor Patrick","key":"e_1_2_1_83_1"},{"volume-title":"Security for Telecommunications Networks. No","series-title":"978-0-387-72441-6 in Advances in Information Security Series","author":"Traynor Patrick","key":"e_1_2_1_84_1"},{"key":"e_1_2_1_85_1","unstructured":"Twilio 2015. Twilio. Retrieved from http:\/\/www.twilio.com.  Twilio 2015. Twilio. Retrieved from http:\/\/www.twilio.com."},{"key":"e_1_2_1_86_1","unstructured":"U.S. Office of Personnel Management. 2015. Cybersecurity incidents. Retrieved from https:\/\/www.opm.gov\/cybersecurity\/cybersecurity-incidents\/.  U.S. Office of Personnel Management. 2015. Cybersecurity incidents. Retrieved from https:\/\/www.opm.gov\/cybersecurity\/cybersecurity-incidents\/."},{"key":"e_1_2_1_87_1","unstructured":"VirusTotal. 2015. VirusTotal\u2014Free online virus malware and URL scanner. Retrieved from https:\/\/www.virustotal.com\/.  VirusTotal. 2015. VirusTotal\u2014Free online virus malware and URL scanner. Retrieved from https:\/\/www.virustotal.com\/."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3268932","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3268932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:19Z","timestamp":1750212439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3268932"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,10]]},"references-count":88,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,2,28]]}},"alternative-id":["10.1145\/3268932"],"URL":"https:\/\/doi.org\/10.1145\/3268932","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2018,12,10]]},"assertion":[{"value":"2017-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-12-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}