{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:13Z","timestamp":1750220713376,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380062","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:11:44Z","timestamp":1588579904000},"page":"2948-2954","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["I\u2019ve Got Your Packages: Harvesting Customers\u2019 Delivery Order Information using Package Tracking Number Enumeration Attacks"],"prefix":"10.1145","author":[{"given":"Simon","family":"Woo","sequence":"first","affiliation":[{"name":"Sungkyunkwan University"}]},{"given":"Hanbin","family":"Jang","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University"}]},{"given":"Woojung","family":"Ji","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University"}]},{"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"unstructured":"2011. Reference Numbers. https:\/\/www.ups.com\/worldshiphelp\/WS14\/ENU\/AppHelp\/GlossPopup\/Reference_Numbers.htm Accessed: 2019-10-10.  2011. Reference Numbers. https:\/\/www.ups.com\/worldshiphelp\/WS14\/ENU\/AppHelp\/GlossPopup\/Reference_Numbers.htm Accessed: 2019-10-10.","key":"e_1_3_2_1_1_1"},{"unstructured":"2014. Cybercriminals Use What Works (Targeted Attack Methodologies for Cybercrime). https:\/\/www.trendmicro.co.uk\/media\/wp\/cybercriminals-use-what-works-whitepaper-uk.pdf Accessed: 2019-10-08.  2014. Cybercriminals Use What Works (Targeted Attack Methodologies for Cybercrime). https:\/\/www.trendmicro.co.uk\/media\/wp\/cybercriminals-use-what-works-whitepaper-uk.pdf Accessed: 2019-10-08.","key":"e_1_3_2_1_2_1"},{"unstructured":"2018. FedEx Data Breach. https:\/\/www.informationsecuritybuzz.com\/expert-comments\/fedex-data-breach\/ Accessed: 2019-10-14.  2018. FedEx Data Breach. https:\/\/www.informationsecuritybuzz.com\/expert-comments\/fedex-data-breach\/ Accessed: 2019-10-14.","key":"e_1_3_2_1_3_1"},{"unstructured":"2018. USPS Site Exposed Data on 60 Million Users. https:\/\/krebsonsecurity.com\/2018\/11\/usps-site-exposed-data-on-60-million-users\/ Accessed: 2019-10-14.  2018. USPS Site Exposed Data on 60 Million Users. https:\/\/krebsonsecurity.com\/2018\/11\/usps-site-exposed-data-on-60-million-users\/ Accessed: 2019-10-14.","key":"e_1_3_2_1_4_1"},{"unstructured":"2019. About WhatsApp. https:\/\/www.whatsapp.com\/about\/ Accessed: 2019-10-10.  2019. About WhatsApp. https:\/\/www.whatsapp.com\/about\/ Accessed: 2019-10-10.","key":"e_1_3_2_1_5_1"},{"unstructured":"2019. DHL Global. http:\/\/www.dhl.com\/en.html Accessed: 2019-10-14.  2019. DHL Global. http:\/\/www.dhl.com\/en.html Accessed: 2019-10-14.","key":"e_1_3_2_1_6_1"},{"unstructured":"2019. FedEx. https:\/\/www.fedex.com Accessed: 2019-10-14.  2019. FedEx. https:\/\/www.fedex.com Accessed: 2019-10-14.","key":"e_1_3_2_1_7_1"},{"unstructured":"2019. General Data Protection Regulation (GDPR). https:\/\/eugdpr.org\/ Accessed: 2019-10-14.  2019. General Data Protection Regulation (GDPR). https:\/\/eugdpr.org\/ Accessed: 2019-10-14.","key":"e_1_3_2_1_8_1"},{"unstructured":"2019. Universal Postal Union. http:\/\/www.upu.int\/en.html Accessed: 2019-10-14.  2019. Universal Postal Union. http:\/\/www.upu.int\/en.html Accessed: 2019-10-14.","key":"e_1_3_2_1_9_1"},{"unstructured":"2019. UPS. https:\/\/www.ups.com Accessed: 2019-10-14.  2019. UPS. https:\/\/www.ups.com Accessed: 2019-10-14.","key":"e_1_3_2_1_10_1"},{"unstructured":"2019. Whitepages \u2013 Find people contact info & background checks. https:\/\/www.whitepages.com\/ Accessed: 2019-09-10.  2019. Whitepages \u2013 Find people contact info & background checks. https:\/\/www.whitepages.com\/ Accessed: 2019-09-10.","key":"e_1_3_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1007\/978-3-642-15512-3_22"},{"unstructured":"Apex Insight. 2019. Global Parcel Delivery Market Insight Report. https:\/\/apex-insight.com\/product\/global-parcel-delivery-market\/ Accessed: 2019-10-14.  Apex Insight. 2019. Global Parcel Delivery Market Insight Report. https:\/\/apex-insight.com\/product\/global-parcel-delivery-market\/ Accessed: 2019-10-14.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1016\/j.cose.2015.04.008"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1007\/978-3-319-72359-4_41"},{"volume-title":"Couriers and local delivery service providers","year":"2017","author":"Mazareanu E.","key":"e_1_3_2_1_16_1"},{"volume-title":"Guess Who\u2019s Texting You? Evaluating the Security of Smartphone Messaging Applications","author":"Schrittwieser Sebastian","key":"e_1_3_2_1_17_1"},{"unstructured":"Zaid Shoorbajee. 2017. FedEx attributes $300 million loss to NotPetya ransomware attack. https:\/\/www.cyberscoop.com\/fedex-attributes-300-million-loss-notpetya-attack\/ Accessed: 2019-10-14.  Zaid Shoorbajee. 2017. FedEx attributes $300 million loss to NotPetya ransomware attack. https:\/\/www.cyberscoop.com\/fedex-attributes-300-million-loss-notpetya-attack\/ Accessed: 2019-10-14.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1007\/3-540-39200-9_18"},{"unstructured":"Oriena Vuong. 2018. Canada Post data breach affected 4 500 customers OCS says. https:\/\/energy953radio.ca\/news\/4639742\/ocs-canada-post-hacked\/ Accessed: 2019-10-14.  Oriena Vuong. 2018. Canada Post data breach affected 4 500 customers OCS says. https:\/\/energy953radio.ca\/news\/4639742\/ocs-canada-post-hacked\/ Accessed: 2019-10-14.","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/3243734.3243754"}],"event":{"sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"acronym":"WWW '20","name":"WWW '20: The Web Conference 2020","location":"Taipei Taiwan"},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380062","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:16Z","timestamp":1750199596000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380062"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":21,"alternative-id":["10.1145\/3366423.3380062","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380062","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}