{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:48:28Z","timestamp":1771613308547,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"BNRist Network and Software Security Research Program","award":["BNR2019TD01004"],"award-info":[{"award-number":["BNR2019TD01004"]}]},{"name":"Natural Science Foundation of China","award":["U1836213, U1636204"],"award-info":[{"award-number":["U1836213, U1636204"]}]},{"name":"U.S. National Science Foundation","award":["CNS-1618117"],"award-info":[{"award-number":["CNS-1618117"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359817","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"500-513","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Casino royale"],"prefix":"10.1145","author":[{"given":"Hao","family":"Yang","sequence":"first","affiliation":[{"name":"Tsinghua University"}]},{"given":"Kun","family":"Du","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Yubao","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Delaware"}]},{"given":"Shuang","family":"Hao","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas"}]},{"given":"Zhou","family":"Li","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Mingxuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Haining","family":"Wang","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Haixin","family":"Duan","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Yazhou","family":"Shi","sequence":"additional","affiliation":[{"name":"Baidu Inc"}]},{"given":"Xiaodong","family":"Su","sequence":"additional","affiliation":[{"name":"Baidu Inc"}]},{"given":"Guang","family":"Liu","sequence":"additional","affiliation":[{"name":"Baidu Inc"}]},{"given":"Zhifeng","family":"Geng","sequence":"additional","affiliation":[{"name":"Baidu Inc"}]},{"given":"Jianping","family":"Wu","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1396mm.com. 2019. The possibility and feasibility of online casino video cheat. https:\/\/www.1396mm.com\/article\/detail\/142368.html.  1396mm.com. 2019. The possibility and feasibility of online casino video cheat. https:\/\/www.1396mm.com\/article\/detail\/142368.html."},{"key":"e_1_3_2_1_2_1","unstructured":"360\n   .com. 2019. Network Security Research Lab at 360. https:\/\/netlab.360.com\/.  360.com. 2019. Network Security Research Lab at 360. https:\/\/netlab.360.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"alipay.com. 2019. Alipay. https:\/\/www.alipay.com\/.  alipay.com. 2019. Alipay. https:\/\/www.alipay.com\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.32"},{"key":"e_1_3_2_1_5_1","unstructured":"baidu.com. 2019. Baidu Search Engine Homepage. https:\/\/www.baidu.com.  baidu.com. 2019. Baidu Search Engine Homepage. https:\/\/www.baidu.com."},{"key":"e_1_3_2_1_6_1","volume-title":"Workshop on the Economics of Information Security.","author":"Brunt Ryan","year":"2017","unstructured":"Ryan Brunt , Prakhar Pandey , and Damon McCoy . 2017 . Booted: An Analysis of a Payment Intervention on a DDoS-for-Hire Service . In Workshop on the Economics of Information Security. Ryan Brunt, Prakhar Pandey, and Damon McCoy. 2017. Booted: An Analysis of a Payment Intervention on a DDoS-for-Hire Service. In Workshop on the Economics of Information Security."},{"key":"e_1_3_2_1_7_1","unstructured":"casino.org. 2018. Chinese Workers in Manila are Enslaved by Gaming Operator. https:\/\/www.casino.org\/news.  casino.org. 2018. Chinese Workers in Manila are Enslaved by Gaming Operator. https:\/\/www.casino.org\/news."},{"key":"e_1_3_2_1_8_1","volume-title":"The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Du Kun","year":"2016","unstructured":"Kun Du , Hao Yang , Zhou Li , Haixin Duan , and Kehuan Zhang . 2016 . The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO. In 25th USENIX Security Symposium (USENIX Security 16) . Austin, TX, 245--262. Kun Du, Hao Yang, Zhou Li, Haixin Duan, and Kehuan Zhang. 2016. The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO. In 25th USENIX Security Symposium (USENIX Security 16). Austin, TX, 245--262."},{"key":"e_1_3_2_1_9_1","volume-title":"Identifying products in online cybercrime marketplaces: A dataset for fine-grained domain adaptation. arXiv preprint arXiv:1708.09609","author":"Durrett Greg","year":"2017","unstructured":"Greg Durrett , Jonathan K Kummerfeld , Taylor Berg-Kirkpatrick , Rebecca S Portnoff , Sadia Afroz , Damon McCoy , Kirill Levchenko , and Vern Paxson . 2017. Identifying products in online cybercrime marketplaces: A dataset for fine-grained domain adaptation. arXiv preprint arXiv:1708.09609 ( 2017 ). Greg Durrett, Jonathan K Kummerfeld, Taylor Berg-Kirkpatrick, Rebecca S Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko, and Vern Paxson. 2017. Identifying products in online cybercrime marketplaces: A dataset for fine-grained domain adaptation. arXiv preprint arXiv:1708.09609 (2017)."},{"key":"e_1_3_2_1_10_1","unstructured":"farsightsecurity.com. 2019. Passive DNS historical internet database: Farsight DNSDB. https:\/\/www.farsightsecurity.com\/solutions\/dnsdb\/.  farsightsecurity.com. 2019. Passive DNS historical internet database: Farsight DNSDB. https:\/\/www.farsightsecurity.com\/solutions\/dnsdb\/."},{"key":"e_1_3_2_1_11_1","volume-title":"ACM conference on Computer and Communications Security. 375--388","author":"Franklin Jason","year":"2007","unstructured":"Jason Franklin , Adrian Perrig , Vern Paxson , and Stefan Savage . 2007 . An inquiry into the nature and causes of the wealth of internet miscreants .. In ACM conference on Computer and Communications Security. 375--388 . Jason Franklin, Adrian Perrig, Vern Paxson, and Stefan Savage. 2007. An inquiry into the nature and causes of the wealth of internet miscreants.. In ACM conference on Computer and Communications Security. 375--388."},{"key":"e_1_3_2_1_12_1","unstructured":"gamblingsites.org. 2019. Gambling Market in the Philippines Is Gaining Speed. https:\/\/www.gamblingsites.org\/news\/the-philippines-gambling-market-isnt-slowing-down\/.  gamblingsites.org. 2019. Gambling Market in the Philippines Is Gaining Speed. https:\/\/www.gamblingsites.org\/news\/the-philippines-gambling-market-isnt-slowing-down\/."},{"key":"e_1_3_2_1_13_1","unstructured":"github.com. 2015. TeamHG-Memex\/page-compare: Simple heuristic for measuring web page similarity. https:\/\/github.com\/TeamHG-Memex\/page-compare.  github.com. 2015. TeamHG-Memex\/page-compare: Simple heuristic for measuring web page similarity. https:\/\/github.com\/TeamHG-Memex\/page-compare."},{"key":"e_1_3_2_1_14_1","unstructured":"google.com. 2019. Search Engine Optimization (SEO) Starter Guide. https:\/\/support.google.com\/webmasters\/answer\/7451184?hl=en.  google.com. 2019. Search Engine Optimization (SEO) Starter Guide. https:\/\/support.google.com\/webmasters\/answer\/7451184?hl=en."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_16_1","volume-title":"Workshop on the Economics of Information Security.","author":"Danny Yuxing Huang Kurt Thomas","year":"2015","unstructured":"Kurt Thomas Danny Yuxing Huang , David Wang Elie Bursztein Chris GrierD, Thomas J Holt , Christopher Kruegel , Damon McCoy , Stefan Savage , and Giovanni Vigna . 2015 . Framing dependencies introduced by underground commoditization . In Workshop on the Economics of Information Security. Kurt Thomas Danny Yuxing Huang, David Wang Elie Bursztein Chris GrierD, Thomas J Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, and Giovanni Vigna. 2015. Framing dependencies introduced by underground commoditization. In Workshop on the Economics of Information Security."},{"key":"e_1_3_2_1_17_1","volume-title":"Twelfth International AAAI Conference on Web and Social Media.","author":"Ibosiola Damilola","year":"2018","unstructured":"Damilola Ibosiola , Benjamin Steer , Alvaro Garcia-Recuero , Gianluca Stringhini , Steve Uhlig , and Gareth Tyson . 2018 . Movie pirates of the caribbean: Exploring illegal streaming cyberlockers . In Twelfth International AAAI Conference on Web and Social Media. Damilola Ibosiola, Benjamin Steer, Alvaro Garcia-Recuero, Gianluca Stringhini, Steve Uhlig, and Gareth Tyson. 2018. Movie pirates of the caribbean: Exploring illegal streaming cyberlockers. In Twelfth International AAAI Conference on Web and Social Media."},{"key":"e_1_3_2_1_18_1","unstructured":"iptoasn.com. 2019. Free IP address to ASN database. https:\/\/iptoasn.com\/.  iptoasn.com. 2019. Free IP address to ASN database. https:\/\/iptoasn.com\/."},{"key":"e_1_3_2_1_19_1","volume-title":"Show Me the Money: Characterizing Spam-advertised Revenue. In USENIX Security Symposium. 15--15","author":"Kanich Chris","year":"2011","unstructured":"Chris Kanich , Nicholas Weaver , Damon McCoy , Tristan Halvorson , Christian Kreibich , Kirill Levchenko , Vern Paxson , Geoffrey M Voelker , and Stefan Savage . 2011 . Show Me the Money: Characterizing Spam-advertised Revenue. In USENIX Security Symposium. 15--15 . Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M Voelker, and Stefan Savage. 2011. Show Me the Money: Characterizing Spam-advertised Revenue. In USENIX Security Symposium. 15--15."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382285"},{"key":"e_1_3_2_1_21_1","volume-title":"In Proceedings of the 24th Network and Distributed System Security Symposium (NDSS","author":"Miramirkhani Najmeh","year":"2016","unstructured":"Najmeh Miramirkhani , Oleksii Starov , and Nick Nikiforakis . 2016 . Dial one for scam: A large-scale analysis of technical support scams . In In Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017). Internet Society. Najmeh Miramirkhani, Oleksii Starov, and Nick Nikiforakis. 2016. Dial one for scam: A large-scale analysis of technical support scams. In In Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017). Internet Society."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052600"},{"key":"e_1_3_2_1_24_1","unstructured":"prcfe.com. 2018. Alipay vs WeChat Pay. http:\/\/www.prcfe.com\/news\/2018\/0303\/230675.html.  prcfe.com. 2018. Alipay vs WeChat Pay. http:\/\/www.prcfe.com\/news\/2018\/0303\/230675.html."},{"key":"e_1_3_2_1_25_1","unstructured":"providesupport.com. 2019. Live Chat Support on Your Website. https:\/\/www.providesupport.com\/.  providesupport.com. 2019. Live Chat Support on Your Website. https:\/\/www.providesupport.com\/."},{"key":"e_1_3_2_1_26_1","unstructured":"quantil.com. 2019. A Guide to ICP Certification in China. https:\/\/www.quantil.com\/content-delivery-insights\/icp-certification-china\/.  quantil.com. 2019. A Guide to ICP Certification in China. https:\/\/www.quantil.com\/content-delivery-insights\/icp-certification-china\/."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 23rd Network and Distributed System Security Symposium (NDSS","author":"Rafique M Zubair","year":"2016","unstructured":"M Zubair Rafique , Tom Van Goethem , Wouter Joosen , Christophe Huygens , and Nick Nikiforakis . 2016 . It's free for a reason: Exploring the ecosystem of free live streaming services . In Proceedings of the 23rd Network and Distributed System Security Symposium (NDSS 2016). Internet Society. M Zubair Rafique, Tom Van Goethem, Wouter Joosen, Christophe Huygens, and Nick Nikiforakis. 2016. It's free for a reason: Exploring the ecosystem of free live streaming services. In Proceedings of the 23rd Network and Distributed System Security Symposium (NDSS 2016). Internet Society."},{"key":"e_1_3_2_1_28_1","unstructured":"searchenginejournal.com. 2018. How Important Is an H1 Tag for SEO? https:\/\/www.searchenginejournal.com\/how-important-is-h1-tag-for-seo\/261547\/.  searchenginejournal.com. 2018. How Important Is an H1 Tag for SEO? https:\/\/www.searchenginejournal.com\/how-important-is-h1-tag-for-seo\/261547\/."},{"key":"e_1_3_2_1_29_1","unstructured":"GreenSec Solutions. 2016. new gTLD Statistics by Top-Level Domains. https:\/\/ntldstats.com\/tld.  GreenSec Solutions. 2016. new gTLD Statistics by Top-Level Domains. https:\/\/ntldstats.com\/tld."},{"key":"e_1_3_2_1_30_1","unstructured":"text2vec.org. 2017. Documents similarity. http:\/\/text2vec.org\/similarity.html.  text2vec.org. 2017. Documents similarity. http:\/\/text2vec.org\/similarity.html."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.17"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2018.8376208"},{"key":"e_1_3_2_1_33_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Wegberg Rolf Van","year":"2018","unstructured":"Rolf Van Wegberg , Samaneh Tajalizadehkhoob , Kyle Soska , Ugur Akyazi , Carlos Hernandez Ganan , Bram Klievink , Nicolas Christin , and Michel Van Eeten . 2018 . Plug and prey? measuring the commoditization of cybercrime via online anonymous markets . In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, 1009--1026. Rolf Van Wegberg, Samaneh Tajalizadehkhoob, Kyle Soska, Ugur Akyazi, Carlos Hernandez Ganan, Bram Klievink, Nicolas Christin, and Michel Van Eeten. 2018. Plug and prey? measuring the commoditization of cybercrime via online anonymous markets. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, 1009--1026."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663738"},{"key":"e_1_3_2_1_35_1","unstructured":"weixin.qq.com. 2019. WeChat Pay. https:\/\/pay.weixin.qq.com\/.  weixin.qq.com. 2019. WeChat Pay. https:\/\/pay.weixin.qq.com\/."},{"key":"e_1_3_2_1_36_1","unstructured":"worldcasinodirectory.com. 2019. Macau casinos and gambling guide. https:\/\/www.worldcasinodirectory.com\/macau.  worldcasinodirectory.com. 2019. Macau casinos and gambling guide. https:\/\/www.worldcasinodirectory.com\/macau."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.11"}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359817","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359817"}},"subtitle":["a deep exploration of illegal online gambling"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":37,"alternative-id":["10.1145\/3359789.3359817","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359817","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}