{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:02Z","timestamp":1750220882918,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3339276","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["On the Exploitation of Online SMS Receiving Services to Forge ID Verification"],"prefix":"10.1145","author":[{"given":"Md. Hajian","family":"Berenjestanaki","sequence":"first","affiliation":[{"name":"School of Electrical and Computer Engineering, University of Tehran, Iran"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Padua, Italy"}]},{"given":"Ankit","family":"Gangwal","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Padua, Italy"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2015. \"Organised Gangs using Technology to Evade Police\". https:\/\/tinyurl.com\/yy7rn57b.  2015. \"Organised Gangs using Technology to Evade Police\". https:\/\/tinyurl.com\/yy7rn57b."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. \"Forget About Backdoors This Is The Data WhatsApp Actually Hands To Cops\". https:\/\/tinyurl.com\/y5f5flmu.  2017. \"Forget About Backdoors This Is The Data WhatsApp Actually Hands To Cops\". https:\/\/tinyurl.com\/y5f5flmu."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. \"How WhatsApp has Helped Heroin become Mozambique's Second Biggest Export\". https:\/\/tinyurl.com\/yyt5gwff.  2018. \"How WhatsApp has Helped Heroin become Mozambique's Second Biggest Export\". https:\/\/tinyurl.com\/yyt5gwff."},{"key":"e_1_3_2_1_4_1","unstructured":"2018. \"The 12 Best Team Chat Apps for Your Company\". https:\/\/tinyurl.com\/m6fa6rc.  2018. \"The 12 Best Team Chat Apps for Your Company\". https:\/\/tinyurl.com\/m6fa6rc."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. \"The Best (and Most Secure) Chat Apps\". https:\/\/tinyurl.com\/yyxx3jbf.  2018. \"The Best (and Most Secure) Chat Apps\". https:\/\/tinyurl.com\/yyxx3jbf."},{"key":"e_1_3_2_1_6_1","unstructured":"2018. \"Top 15 Most Popular Social Networking Sites and Apps\". https:\/\/tinyurl.com\/jd4ao6r.  2018. \"Top 15 Most Popular Social Networking Sites and Apps\". https:\/\/tinyurl.com\/jd4ao6r."},{"key":"e_1_3_2_1_7_1","unstructured":"2019. \"Police Warn Against WhatsApp Scams\". https:\/\/tinyurl.com\/yyjphfoc.  2019. \"Police Warn Against WhatsApp Scams\". https:\/\/tinyurl.com\/yyjphfoc."},{"key":"e_1_3_2_1_8_1","unstructured":"2019. \"The 10 Best Mobile Messaging Apps\". https:\/\/tinyurl.com\/ke8xnq4.  2019. \"The 10 Best Mobile Messaging Apps\". https:\/\/tinyurl.com\/ke8xnq4."},{"key":"e_1_3_2_1_9_1","unstructured":"2019. \"VoIP Services Market: Global Industry Analysis and Opportunity Assessment 2015-2025\". https:\/\/tinyurl.com\/yxgvx7ha.  2019. \"VoIP Services Market: Global Industry Analysis and Opportunity Assessment 2015-2025\". https:\/\/tinyurl.com\/yxgvx7ha."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.05.005"},{"volume-title":"Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In 9th USENIX Conference on Networked Systems Design and Implementation. 1--14","year":"2012","author":"Cao Qiang","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1760"},{"volume-title":"HOTP: An HMAC-Based One-Time Password Algorithm. https:\/\/tools.ietf.org\/html\/rfc4226.","year":"2005","author":"Hoornaert Frank","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2018.12.001"},{"key":"e_1_3_2_1_15_1","unstructured":"Craig Metz Neil Haller and Mike Straw. 1998. A One-Time Password System. https:\/\/tools.ietf.org\/html\/rfc2289. (1998).  Craig Metz Neil Haller and Mike Straw. 1998. A One-Time Password System. https:\/\/tools.ietf.org\/html\/rfc2289. (1998)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.05.020"},{"key":"e_1_3_2_1_17_1","first-page":"15","article-title":"Independent One-Time Passwords","volume":"9","author":"Rubin Aviel D","year":"1996","journal-title":"Computing Systems"},{"volume-title":"TOTP: Time-Based One-Time Password Algorithm. https:\/\/tools.ietf.org\/html\/rfc6238.","year":"2011","author":"Rydell Johan","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2796018"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808779"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339276","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3339276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339276"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":20,"alternative-id":["10.1145\/3339252.3339276","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3339276","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}