{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T04:40:47Z","timestamp":1772772047660,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354230","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"449-464","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Just the Tip of the Iceberg"],"prefix":"10.1145","author":[{"given":"Hugo L. J.","family":"Bijmans","sequence":"first","affiliation":[{"name":"TU Delft, Delft, Netherlands"}]},{"given":"Tim M.","family":"Booij","sequence":"additional","affiliation":[{"name":"TU Delft, Delft, Netherlands"}]},{"given":"Christian","family":"Doerr","sequence":"additional","affiliation":[{"name":"TU Delft, Delft, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"487","volume-title":"Proc. 20th int. conf. very large data bases, VLDB","volume":"1215","author":"Agrawal R.","year":"1994"},{"key":"e_1_3_2_2_2_1","volume-title":"Usenix Security Symposium","author":"Bijmans H. L.","year":"2019"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098985"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514167"},{"key":"e_1_3_2_2_6_1","volume-title":"Sep","author":"Christopher N.","year":"2018"},{"key":"e_1_3_2_2_7_1","volume-title":"Oct","author":"Cimpanu C.","year":"2018"},{"key":"e_1_3_2_2_8_1","volume-title":"Jan","author":"Claburn T.","year":"2018"},{"key":"e_1_3_2_2_9_1","volume-title":"Apr","year":"2019"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"e_1_3_2_2_11_1","volume-title":"Mobile vs Desktop Traffic","author":"Enge E.","year":"2019"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00014"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229598.3229606"},{"key":"e_1_3_2_2_14_1","volume-title":"May","author":"Hoffman J. J.","year":"2015"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243840"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23044"},{"key":"e_1_3_2_2_17_1","unstructured":"Kharraz A. Ma Z. Murley P. Lever C. Mason J. Miller A. Borisov N. Antonakakis M. and Bailey M. Outguard: Detecting in-browser covert cryptocurrency mining in the wild.  Kharraz A. Ma Z. Murley P. Lever C. Mason J. Miller A. Borisov N. Antonakakis M. and Bailey M. Outguard: Detecting in-browser covert cryptocurrency mining in the wild."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243858"},{"key":"e_1_3_2_2_19_1","unstructured":"MaxMind Inc. MaxMind GeoIP2. https:\/\/www.maxmind.com\/en\/geoip2-services-and-databases\/ (April 2019).  MaxMind Inc. MaxMind GeoIP2. https:\/\/www.maxmind.com\/en\/geoip2-services-and-databases\/ (April 2019)."},{"key":"e_1_3_2_2_20_1","volume-title":"Jan","author":"McCarthy K.","year":"2018"},{"key":"e_1_3_2_2_21_1","volume-title":"MineCryptoNight - Making mining profits great again! https:\/\/minecryptonight.net\/ (May","author":"MineCryptoNight","year":"2019"},{"key":"e_1_3_2_2_22_1","volume-title":"Jan","author":"Murphy M.","year":"2018"},{"key":"e_1_3_2_2_23_1","unstructured":"Mursch T. Over 100 000 drupal websites vulnerable to drupalgeddon 2 (cve-2018--7600) Jun 2018. https:\/\/badpackets.net\/over-100000-drupal-websites-vulnerable-to-drupalgeddon-2-cve-2018--7600\/.  Mursch T. Over 100 000 drupal websites vulnerable to drupalgeddon 2 (cve-2018--7600) Jun 2018. https:\/\/badpackets.net\/over-100000-drupal-websites-vulnerable-to-drupalgeddon-2-cve-2018--7600\/."},{"key":"e_1_3_2_2_24_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto S.","year":"2009"},{"key":"e_1_3_2_2_25_1","volume-title":"Mar","author":"NetLab 0.","year":"2018"},{"key":"e_1_3_2_2_26_1","volume-title":"Jul","author":"NIST National Vulnerability Database.","year":"2018"},{"key":"e_1_3_2_2_27_1","volume-title":"Truth in web mining: Measuring the profitability and cost of cryptominers as a web monetization model. CoRR abs\/1806.01994","author":"Papadopoulos P.","year":"2018"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355576"},{"key":"e_1_3_2_2_29_1","unstructured":"Proxy Lists 24. Proxy Lists 24 - Daily Free Proxy Server Lists. http:\/\/www.proxyserverlist24.top\/ (April 2019).  Proxy Lists 24. Proxy Lists 24 - Daily Free Proxy Server Lists. http:\/\/www.proxyserverlist24.top\/ (April 2019)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230869"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274735"},{"key":"e_1_3_2_2_32_1","volume-title":"Internet Measurement Conference","author":"R\u00fc","year":"2018"},{"key":"e_1_3_2_2_33_1","volume-title":"Oct","author":"Schwartz M. J.","year":"2018"},{"key":"e_1_3_2_2_34_1","volume-title":"Jun","author":"Segura J.","year":"2018"},{"key":"e_1_3_2_2_35_1","unstructured":"Shodan. Shodan - The search engine for Internet-connected devices. https:\/\/www.shodan.io\/.  Shodan. Shodan - The search engine for Internet-connected devices. https:\/\/www.shodan.io\/."},{"key":"e_1_3_2_2_36_1","volume-title":"Similar web. website traffic statistics & market intelligence. https:\/\/www.similarweb.com (May","author":"SimilarWeb","year":"2019"},{"key":"e_1_3_2_2_37_1","volume-title":"Aug","author":"SonicWall","year":"2018"},{"key":"e_1_3_2_2_38_1","volume-title":"Oct","author":"Tenable","year":"2018"},{"key":"e_1_3_2_2_39_1","volume-title":"Monero: What is monero (xmr)? https:\/\/www.getmonero.org\/get-started\/what-is-monero\/ (December","author":"The Monero Project","year":"2018"},{"key":"e_1_3_2_2_40_1","volume-title":"Sep","author":"The Pirate Bay","year":"2017"},{"key":"e_1_3_2_2_41_1","first-page":"122","volume-title":"ESORICS 2018, Barcelona, Spain, September 3--7, 2018, Proceedings, Part II","author":"Wang W.","year":"2018"},{"key":"e_1_3_2_2_42_1","volume-title":"Nov","author":"Wordfence","year":"2017"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505234"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354230","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:03Z","timestamp":1750202643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354230"}},"subtitle":["Internet-Scale Exploitation of Routers for Cryptojacking"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":43,"alternative-id":["10.1145\/3319535.3354230","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354230","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}