{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:20Z","timestamp":1767340100890,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384765","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"263-276","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Be the Phisher -- Understanding Users' Perception of Malicious Domains"],"prefix":"10.1145","author":[{"given":"Florian","family":"Quinkert","sequence":"first","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Martin","family":"Degeling","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Jim","family":"Blythe","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"\"Amazon Mechanical Turk (MTurk) \" https:\/\/www.mturk.com\/ accessed: 2019\/12\/09.  \"Amazon Mechanical Turk (MTurk) \" https:\/\/www.mturk.com\/ accessed: 2019\/12\/09."},{"key":"e_1_3_2_1_2_1","unstructured":"\"jQuery \" https:\/\/jquery.com\/ accessed: 2019\/12\/09.  \"jQuery \" https:\/\/jquery.com\/ accessed: 2019\/12\/09."},{"key":"e_1_3_2_1_3_1","unstructured":"\"LEGO vs Cybersquatters: The burden of new gTLDs \" https:\/\/news.netcraft.com\/archives\/2017\/04\/14\/lego-vs-cybersquatters-the-burden-of-new-gtlds.html accessed: 2019\/12\/09.  \"LEGO vs Cybersquatters: The burden of new gTLDs \" https:\/\/news.netcraft.com\/archives\/2017\/04\/14\/lego-vs-cybersquatters-the-burden-of-new-gtlds.html accessed: 2019\/12\/09."},{"key":"e_1_3_2_1_4_1","unstructured":"\"MySQL \" https:\/\/www.mysql.com\/ accessed: 2019\/12\/09.  \"MySQL \" https:\/\/www.mysql.com\/ accessed: 2019\/12\/09."},{"key":"e_1_3_2_1_5_1","unstructured":"\"Node.js \" https:\/\/nodejs.org\/en\/ accessed: 2019\/12\/09.  \"Node.js \" https:\/\/nodejs.org\/en\/ accessed: 2019\/12\/09."},{"key":"e_1_3_2_1_6_1","unstructured":"\"Phishtank \" https:\/\/www.phishtank.com\/ accessed: 2019\/12\/09.  \"Phishtank \" https:\/\/www.phishtank.com\/ accessed: 2019\/12\/09."},{"key":"e_1_3_2_1_7_1","volume-title":"Seven months' worth of mistakes: A longitudinal study of typosquatting abuse,\" in Network and Distributed System Security Symposium (NDSS)","author":"Agten P.","year":"2015","unstructured":"P. Agten , W. Joosen , F. Piessens , and N. Nikiforakis , \" Seven months' worth of mistakes: A longitudinal study of typosquatting abuse,\" in Network and Distributed System Security Symposium (NDSS) , 2015 . P. Agten, W. Joosen, F. Piessens, and N. Nikiforakis, \"Seven months' worth of mistakes: A longitudinal study of typosquatting abuse,\" in Network and Distributed System Security Symposium (NDSS), 2015."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979459"},{"key":"e_1_3_2_1_9_1","volume-title":"NoPhish: An Anti-Phishing Education App,\" in Security and Trust Management (STM)","author":"Canova G.","year":"2014","unstructured":"G. Canova , M. Volkamer , C. Bergmann , and R. Borza , \" NoPhish: An Anti-Phishing Education App,\" in Security and Trust Management (STM) , 2014 . G. Canova, M. Volkamer, C. Bergmann, and R. Borza, \"NoPhish: An Anti-Phishing Education App,\" in Security and Trust Management (STM), 2014."},{"key":"e_1_3_2_1_10_1","volume-title":"NoPhish App Evaluation: Lab and Retention Study,\" in Workshop on Usable Security and Privacy (USEC)","author":"Canova G.","year":"2015","unstructured":"G. Canova , M. Volkamer , C. Bergmann , and B. Reinheimer , \" NoPhish App Evaluation: Lab and Retention Study,\" in Workshop on Usable Security and Privacy (USEC) , 2015 . G. Canova, M. Volkamer, C. Bergmann, and B. Reinheimer, \"NoPhish App Evaluation: Lab and Retention Study,\" in Workshop on Usable Security and Privacy (USEC), 2015."},{"key":"e_1_3_2_1_11_1","volume-title":"DomainScouter: Understanding the Risks of Deceptive IDNs,\" in Research in Attacks, Intrusions, and Defenses (RAID)","author":"Chiba D.","year":"2019","unstructured":"D. Chiba , A. H. Akiyama , T. Koide , Y. Sawabe , S. Goto , and M. Akiyama , \" DomainScouter: Understanding the Risks of Deceptive IDNs,\" in Research in Attacks, Intrusions, and Defenses (RAID) , 2019 . D. Chiba, A. H. Akiyama, T. Koide, Y. Sawabe, S. Goto, and M. Akiyama, \"DomainScouter: Understanding the Risks of Deceptive IDNs,\" in Research in Attacks, Intrusions, and Defenses (RAID), 2019."},{"key":"e_1_3_2_1_12_1","volume-title":"Why Phishing Works,\" in Conference on Human Factors in Computing Systems (CHI)","author":"Dhamija R.","year":"2006","unstructured":"R. Dhamija , J. D. Tygar , and M. Hearst , \" Why Phishing Works,\" in Conference on Human Factors in Computing Systems (CHI) , 2006 . R. Dhamija, J. D. Tygar, and M. Hearst, \"Why Phishing Works,\" in Conference on Human Factors in Computing Systems (CHI), 2006."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_2_1_14_1","unstructured":"O. G. Hatch \"The Anticybersquatting Consumer Protection Act \" https:\/\/www.gpo.gov\/fdsys\/pkg\/CRPT-106srpt140\/html\/CRPT-106srpt140.htm 1999 accessed: 2019\/12\/09.  O. G. Hatch \"The Anticybersquatting Consumer Protection Act \" https:\/\/www.gpo.gov\/fdsys\/pkg\/CRPT-106srpt140\/html\/CRPT-106srpt140.htm 1999 accessed: 2019\/12\/09."},{"key":"e_1_3_2_1_15_1","volume-title":"Cutting through the Confusion: A Measurement Study of Homograph Attacks.\" in USENIX Annual Technical Conference","author":"Holgers T.","year":"2006","unstructured":"T. Holgers , D. E. Watson , and S. D. Gribble , \" Cutting through the Confusion: A Measurement Study of Homograph Attacks.\" in USENIX Annual Technical Conference , 2006 . T. Holgers, D. E. Watson, and S. D. Gribble, \"Cutting through the Confusion: A Measurement Study of Homograph Attacks.\" in USENIX Annual Technical Conference, 2006."},{"key":"e_1_3_2_1_16_1","unstructured":"T. E. P. Institute \"Minimum Wage Tracker \" https:\/\/www.epi.org\/minimum-wage-tracker 2019 accessed: 2019\/12\/09.  T. E. P. Institute \"Minimum Wage Tracker \" https:\/\/www.epi.org\/minimum-wage-tracker 2019 accessed: 2019\/12\/09."},{"key":"e_1_3_2_1_17_1","volume-title":"Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse,\" in Conference on Computer and Communications Security (CCS)","author":"Kintis P.","year":"2017","unstructured":"P. Kintis , N. Miramirkhani , C. Lever , Y. Chen , R. Romero-G\u00f3mez , N. Pitropakis , N. Nikiforakis , and M. Antonakakis , \" Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse,\" in Conference on Computer and Communications Security (CCS) , 2017 . P. Kintis, N. Miramirkhani, C. Lever, Y. Chen, R. Romero-G\u00f3mez, N. Pitropakis, N. Nikiforakis, and M. Antonakakis, \"Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse,\" in Conference on Computer and Communications Security (CCS), 2017."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196548"},{"key":"e_1_3_2_1_19_1","author":"Kumaraguru P.","year":"2010","unstructured":"P. Kumaraguru , S. Sheng , A. Acquisti , L. F. Cranor , and J. Hong , \"Teaching Johnny Not to Fall for Phish,\" in ACM Transactions on Internet Technology (TOIT) , 2010 . P. Kumaraguru, S. Sheng, A. Acquisti, L. F. Cranor, and J. Hong, \"Teaching Johnny Not to Fall for Phish,\" in ACM Transactions on Internet Technology (TOIT), 2010.","journal-title":"\"Teaching Johnny Not to Fall for Phish,\" in ACM Transactions on Internet Technology (TOIT)"},{"key":"e_1_3_2_1_20_1","volume-title":"Does Domain Highlighting Help People Identify Phishing Sites?\" in Conference on Human Factors in Computing Systems (CHI)","author":"Lin E.","year":"2011","unstructured":"E. Lin , S. Greenberg , E. Trotter , D. Ma , and J. Aycock , \" Does Domain Highlighting Help People Identify Phishing Sites?\" in Conference on Human Factors in Computing Systems (CHI) , 2011 . E. Lin, S. Greenberg, E. Trotter, D. Ma, and J. Aycock, \"Does Domain Highlighting Help People Identify Phishing Sites?\" in Conference on Human Factors in Computing Systems (CHI), 2011."},{"key":"e_1_3_2_1_21_1","volume-title":"A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly,\" in International Conference on Dependable Systems and Networks (DSN)","author":"Liu B.","year":"2018","unstructured":"B. Liu , C. Lu , Z. Li , Y. Liu , H. Duan , S. Hao , and Z. Zhang , \" A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly,\" in International Conference on Dependable Systems and Networks (DSN) , 2018 . B. Liu, C. Lu, Z. Li, Y. Liu, H. Duan, S. Hao, and Z. Zhang, \"A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly,\" in International Conference on Dependable Systems and Networks (DSN), 2018."},{"key":"e_1_3_2_1_22_1","volume-title":"Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains,\" in Conference on Computer and Communications Security (CCS)","author":"Liu D.","year":"2017","unstructured":"D. Liu , Z. Li , K. Du , H. Wang , B. Liu , and H. Duan , \" Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains,\" in Conference on Computer and Communications Security (CCS) , 2017 . D. Liu, Z. Li, K. Du, H. Wang, B. Liu, and H. Duan, \"Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains,\" in Conference on Computer and Communications Security (CCS), 2017."},{"key":"e_1_3_2_1_23_1","unstructured":"P. Mockapetris \"RFC 1035 - Domain Names - Implementation and Specification \" https:\/\/tools.ietf.org\/html\/rfc1035 1987 accessed: 2019\/12\/09.  P. Mockapetris \"RFC 1035 - Domain Names - Implementation and Specification \" https:\/\/tools.ietf.org\/html\/rfc1035 1987 accessed: 2019\/12\/09."},{"key":"e_1_3_2_1_24_1","volume-title":"Soundsquatting: Uncovering the use of homophones in domain squatting,\" in International Conference on Information Security (ISC)","author":"Nikiforakis N.","year":"2014","unstructured":"N. Nikiforakis , M. Balduzzi , L. Desmet , F. Piessens , and W. Joosen , \" Soundsquatting: Uncovering the use of homophones in domain squatting,\" in International Conference on Information Security (ISC) , 2014 . N. Nikiforakis, M. Balduzzi, L. Desmet, F. Piessens, and W. Joosen, \"Soundsquatting: Uncovering the use of homophones in domain squatting,\" in International Conference on Information Security (ISC), 2014."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488474"},{"key":"e_1_3_2_1_26_1","volume-title":"It's Not What It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains,\" in Conference on Communications and Network Security (CNS)","author":"Quinkert F.","year":"2019","unstructured":"F. Quinkert , T. Lauinger , W. Robertson , E. Kirda , and T. Holz , \" It's Not What It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains,\" in Conference on Communications and Network Security (CNS) , 2019 . F. Quinkert, T. Lauinger, W. Robertson, E. Kirda, and T. Holz, \"It's Not What It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains,\" in Conference on Communications and Network Security (CNS), 2019."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355587"},{"key":"e_1_3_2_1_29_1","volume-title":"The Long \"Taile\" of Typosquatting Domain Names,\" in USENIX Security Symposium","author":"Szurdi J.","year":"2014","unstructured":"J. Szurdi , B. Kocso , G. Cseh , J. Spring , M. Felegyhazi , and C. Kanich , \" The Long \"Taile\" of Typosquatting Domain Names,\" in USENIX Security Symposium , 2014 . J. Szurdi, B. Kocso, G. Cseh, J. Spring, M. Felegyhazi, and C. Kanich, \"The Long \"Taile\" of Typosquatting Domain Names,\" in USENIX Security Symposium, 2014."},{"key":"e_1_3_2_1_30_1","volume-title":"Spam and phishing in Q2","author":"Vergelis M.","year":"2019","unstructured":"M. Vergelis , T. Shcherbakova , and T. Sidorina , \" Spam and phishing in Q2 2019 ,\" https:\/\/securelist.com\/spam-and-phishing-in-q2--2019\/92379\/, 2019, accessed: 2019\/12\/09. M. Vergelis, T. Shcherbakova, and T. Sidorina, \"Spam and phishing in Q2 2019,\" https:\/\/securelist.com\/spam-and-phishing-in-q2--2019\/92379\/, 2019, accessed: 2019\/12\/09."},{"key":"e_1_3_2_1_31_1","volume-title":"Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting,\" in USENIX Workshop on Steps Reducing Unwanted Traffic on the Internet (SRUTI)","author":"Wang Y.-M.","year":"2006","unstructured":"Y.-M. Wang , D. Beck , J. Wang , C. Verbowski , and B. Daniels , \" Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting,\" in USENIX Workshop on Steps Reducing Unwanted Traffic on the Internet (SRUTI) , 2006 . Y.-M. Wang, D. Beck, J. Wang, C. Verbowski, and B. Daniels, \"Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting,\" in USENIX Workshop on Steps Reducing Unwanted Traffic on the Internet (SRUTI), 2006."}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"ASIA CCS '20"},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384765","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:28Z","timestamp":1750200088000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384765"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":31,"alternative-id":["10.1145\/3320269.3384765","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384765","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}