{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:07Z","timestamp":1750220827987,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T00:00:00Z","timestamp":1571011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,14]]},"DOI":"10.1145\/3358695.3361751","type":"proceedings-article","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T12:49:48Z","timestamp":1571316588000},"page":"250-255","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["SeedsMiner: Accurate URL Blacklist-Generation Based on Efficient OSINT Seed Collection"],"prefix":"10.1145","author":[{"given":"Yasuyuki","family":"Tanaka","sequence":"first","affiliation":[{"name":"NTT Communications Corporation, Japan"}]},{"given":"Shingo","family":"Kashima","sequence":"additional","affiliation":[{"name":"NTT Communications Corporation, Japan"}]}],"member":"320","published-online":{"date-parts":[[2019,10,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of the ACM Conference on Computer and Communications Security(CCS)","author":"Grier C.","year":"2012","unstructured":"[ 1 ] C. Grier , L. Ballard , J. Caballero , N. Chachra , C. J. Dietrich , K. Levchenko , P. Mavrommatis , D. McCoy , A. Nappa , A. Pitsillidis , N. Provos , M. Z. Rafique , M. A. Rajab , C. Rossow , K. Thomas , V. Paxson , S. Sav-age, and G. M. Voelker . Manufacturing Compromise:The Emergence of Exploit-as-a-Service . In Proc. of the ACM Conference on Computer and Communications Security(CCS) , 2012 . [1] C. Grier, L. Ballard, J. Caballero, N. Chachra, C. J.Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy,A. Nappa, A. Pitsillidis, N. Provos, M. Z. Rafique, M. A. Rajab, C. Rossow, K. Thomas, V. Paxson, S. Sav-age, and G. M. Voelker. Manufacturing Compromise:The Emergence of Exploit-as-a-Service. In Proc. of the ACM Conference on Computer and Communications Security(CCS), 2012."},{"key":"e_1_3_2_1_2_1","unstructured":"[\n  2\n  ]  2019 Internet Security Threat Report Volume 24. https:\/\/www.symantec.com\/security-center\/threat-report.  [2] 2019 Internet Security Threat Report Volume 24. https:\/\/www.symantec.com\/security-center\/threat-report."},{"key":"e_1_3_2_1_3_1","unstructured":"[\n  3\n  ] Microsoft: SmartScreen URL Filter. https:\/\/technet.microsoft.com\/en-us\/library\/jj618329(v=ws.11).aspx.  [3] Microsoft: SmartScreen URL Filter. https:\/\/technet.microsoft.com\/en-us\/library\/jj618329(v=ws.11).aspx."},{"key":"e_1_3_2_1_4_1","unstructured":"[\n  4\n  ]  McAfee: SiteAdvisor. http:\/\/www.siteadvisor.com\/howitworks\/index.html.  [4] McAfee: SiteAdvisor. http:\/\/www.siteadvisor.com\/howitworks\/index.html."},{"volume-title":"Web of Trust","author":"Symantec","key":"e_1_3_2_1_5_1","unstructured":"[ 5 ] Symantec : Web of Trust , Norton Safe Web . https:\/\/safeweb.norton.com\/about?ulang=eng. [5] Symantec: Web of Trust, Norton Safe Web. https:\/\/safeweb.norton.com\/about?ulang=eng."},{"key":"e_1_3_2_1_6_1","unstructured":"[\n  6\n  ] Yandex: Safe Browsing. https:\/\/tech.yandex.com\/safebrowsing\/.  [6] Yandex: Safe Browsing. https:\/\/tech.yandex.com\/safebrowsing\/."},{"key":"e_1_3_2_1_7_1","unstructured":"[\n  7\n  ]  Google Safe Browsing. https:\/\/developers.google.com\/safe-browsing\/  [7] Google Safe Browsing. https:\/\/developers.google.com\/safe-browsing\/"},{"key":"e_1_3_2_1_8_1","unstructured":"[\n  8\n  ]  Trend Micro ServerProtect for linux. http:\/\/www.trendmicro.co.jp\/jp\/business\/products\/splx\/  [8] Trend Micro ServerProtect for linux. http:\/\/www.trendmicro.co.jp\/jp\/business\/products\/splx\/"},{"key":"e_1_3_2_1_9_1","unstructured":"[\n  9\n  ]  Symantec Endpoint Protection. https:\/\/www.symantec.com\/ja\/jp\/theme.jsp?themeid=endpointsecurity_lineup_sep  [9] Symantec Endpoint Protection. https:\/\/www.symantec.com\/ja\/jp\/theme.jsp?themeid=endpointsecurity_lineup_sep"},{"key":"e_1_3_2_1_10_1","unstructured":"[\n  10\n  ]  McAfee Endpoint Protection Suite. https:\/\/www.mcafee.com\/jp\/products\/endpoint-protection-suite.aspx  [10] McAfee Endpoint Protection Suite. https:\/\/www.mcafee.com\/jp\/products\/endpoint-protection-suite.aspx"},{"key":"e_1_3_2_1_11_1","unstructured":"[\n  11\n  ]  Kaspersky Security. http:\/\/home.kaspersky.co.jp\/store\/kasperjp\/ja_JP\/pd\/ThemeID.37143200\/productID.5064647600  [11] Kaspersky Security. http:\/\/home.kaspersky.co.jp\/store\/kasperjp\/ja_JP\/pd\/ThemeID.37143200\/productID.5064647600"},{"key":"e_1_3_2_1_12_1","unstructured":"[\n  12\n  ]  C. Seifert and R. Steenson. Capture-HPC. https:\/\/projects.honeynet.org\/capture-hpc.  [12] C. Seifert and R. Steenson. Capture-HPC. https:\/\/projects.honeynet.org\/capture-hpc."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E93.B.1131"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2011.11"},{"key":"e_1_3_2_1_15_1","unstructured":"[\n  15\n  ]  A. dellaera. Low-interaction honeyclient Thug. https:\/\/www.honeynet.org\/node\/827.  [15] A. dellaera. Low-interaction honeyclient Thug. https:\/\/www.honeynet.org\/node\/827."},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)","author":"Stokes J.","year":"2010","unstructured":"[ 16 ] J. Stokes , R. Andersen , C. Seifert , and K. Chellapilla . WebCop: Locating Neighborhoods of Malware on the Web . In Proc. of USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) , 2010 . [16] J. Stokes, R. Andersen, C. Seifert, and K. Chellapilla. WebCop: Locating Neighborhoods of Malware on the Web. In Proc. of USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_12"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.33"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"e_1_3_2_1_20_1","unstructured":"[\n  20\n  ]  Microsoft:Microsoft PE and COFF Specification. https:\/\/msdn.microsoft.com\/en-us\/windows\/hardware\/gg463119.aspx.  [20] Microsoft:Microsoft PE and COFF Specification. https:\/\/msdn.microsoft.com\/en-us\/windows\/hardware\/gg463119.aspx."},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/sslbl.abuse.ch\/blacklist\/","author":"SSL","year":"2019","unstructured":"[ 21 ] SSL blacklist. https:\/\/sslbl.abuse.ch\/blacklist\/ , 2019 . [21] SSL blacklist. https:\/\/sslbl.abuse.ch\/blacklist\/, 2019."},{"volume-title":"http:\/\/www.cruzit.com\/","year":"2019","key":"e_1_3_2_1_22_1","unstructured":"[ 22 ] Cruzit. http:\/\/www.cruzit.com\/ , 2019 . [22] Cruzit. http:\/\/www.cruzit.com\/, 2019."},{"volume-title":"http:\/\/vxvault.net\/ViriList.php","year":"2019","key":"e_1_3_2_1_23_1","unstructured":"[ 23 ] Vxvault. http:\/\/vxvault.net\/ViriList.php , 2019 . [23] Vxvault. http:\/\/vxvault.net\/ViriList.php, 2019."},{"volume-title":"https:\/\/www.dshield.org\/","year":"2019","key":"e_1_3_2_1_24_1","unstructured":"[ 24 ] Dshiled. https:\/\/www.dshield.org\/ , 2019 . [24] Dshiled. https:\/\/www.dshield.org\/, 2019."},{"volume-title":"http:\/\/malc0de.com\/database\/?&page=1","year":"2019","key":"e_1_3_2_1_25_1","unstructured":"[ 25 ] Malc0de. http:\/\/malc0de.com\/database\/?&page=1 , 2019 . [25] Malc0de. http:\/\/malc0de.com\/database\/?&page=1, 2019."},{"key":"e_1_3_2_1_26_1","volume-title":"http:\/\/www.malwaredomainlist.com","author":"List Malware Domain","year":"2019","unstructured":"[ 26 ] Malware Domain List . http:\/\/www.malwaredomainlist.com , 2019 . [26] Malware Domain List. http:\/\/www.malwaredomainlist.com, 2019."},{"volume-title":"https:\/\/urlquery.net\/","year":"2019","key":"e_1_3_2_1_27_1","unstructured":"[ 27 ] urlQuery. https:\/\/urlquery.net\/ , 2019 . [27] urlQuery. https:\/\/urlquery.net\/, 2019."},{"volume-title":"http:\/\/security-research.dyndns.org\/pub\/malware-feeds\/ponmocup-infected-domains-CIF-latest.txt","year":"2019","key":"e_1_3_2_1_28_1","unstructured":"[ 28 ] Ponmocup. http:\/\/security-research.dyndns.org\/pub\/malware-feeds\/ponmocup-infected-domains-CIF-latest.txt , 2019 . [28] Ponmocup. http:\/\/security-research.dyndns.org\/pub\/malware-feeds\/ponmocup-infected-domains-CIF-latest.txt, 2019."},{"volume-title":"https:\/\/www.alienvault.com\/","year":"2019","key":"e_1_3_2_1_29_1","unstructured":"[ 29 ] Alienvault. https:\/\/www.alienvault.com\/ , 2019 . [29] Alienvault. https:\/\/www.alienvault.com\/, 2019."},{"key":"e_1_3_2_1_30_1","unstructured":"[\n  30\n  ]  VirusTotal. https:\/\/www.virustotal.com\/.  [30] VirusTotal. https:\/\/www.virustotal.com\/."},{"key":"e_1_3_2_1_31_1","unstructured":"[\n  31\n  ]     \n      AVCLASS\n  : A Tool for Massive Malware Labeling. https:\/\/software.imdea.org\/~juanca\/papers\/avclass_raid16.pdf  [31] AVCLASS: A Tool for Massive Malware Labeling. https:\/\/software.imdea.org\/~juanca\/papers\/avclass_raid16.pdf"},{"key":"e_1_3_2_1_32_1","unstructured":"[\n  32\n  ]  Malwr - Malware Analysis by Cuckoo Sandbox. https:\/\/malwr.com\/.  [32] Malwr - Malware Analysis by Cuckoo Sandbox. https:\/\/malwr.com\/."},{"key":"e_1_3_2_1_33_1","unstructured":"[\n  33\n  ]  Alexa - Actionable Analytics for the Web. http:\/\/www.alexa.com\/.  [33] Alexa - Actionable Analytics for the Web. http:\/\/www.alexa.com\/."},{"key":"e_1_3_2_1_34_1","unstructured":"[\n  34\n  ]  Facebook ThreatExchange. https:\/\/developers.facebook.com\/programs\/threatexchange\/.  [34] Facebook ThreatExchange. https:\/\/developers.facebook.com\/programs\/threatexchange\/."},{"key":"e_1_3_2_1_35_1","unstructured":"[\n  35\n  ]  MISP - Open Source Threat Intelligence Platform & Open Standards For Threat Information Sharing. https:\/\/www.misp-project.org\/.  [35] MISP - Open Source Threat Intelligence Platform & Open Standards For Threat Information Sharing. https:\/\/www.misp-project.org\/."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2019.00042"}],"event":{"name":"WI '19: IEEE\/WIC\/ACM International Conference on Web Intelligence","acronym":"WI '19","location":"Thessaloniki Greece"},"container-title":["IEEE\/WIC\/ACM International Conference on Web Intelligence - Companion Volume"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358695.3361751","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3358695.3361751","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:26Z","timestamp":1750202006000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358695.3361751"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,14]]},"references-count":36,"alternative-id":["10.1145\/3358695.3361751","10.1145\/3358695"],"URL":"https:\/\/doi.org\/10.1145\/3358695.3361751","relation":{},"subject":[],"published":{"date-parts":[[2019,10,14]]},"assertion":[{"value":"2019-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}