{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:20:21Z","timestamp":1759332021684,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100013405","name":"Rijksdienst voor Ondernemend Nederland","doi-asserted-by":"publisher","award":["ITEA191010"],"award-info":[{"award-number":["ITEA191010"]}],"id":[{"id":"10.13039\/100013405","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3417892","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T18:27:04Z","timestamp":1604341624000},"page":"1665-1680","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale"],"prefix":"10.1145","author":[{"given":"Michele","family":"Campobasso","sequence":"first","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, Netherlands"}]},{"given":"Luca","family":"Allodi","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991091"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133960"},{"key":"e_1_3_2_2_3_1","first-page":"314","article-title":"The economics of information security","author":"Anderson R.","year":"2006","journal-title":"Science"},{"key":"e_1_3_2_2_4_1","unstructured":"Bank T. W. World development indicators. https:\/\/datacatalog.worldbank.org\/dataset\/world-development-indicators.  Bank T. W. World development indicators. https:\/\/datacatalog.worldbank.org\/dataset\/world-development-indicators."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593240"},{"volume-title":"Feb","year":"2020","author":"Bisson D.","key":"e_1_3_2_2_6_1"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699390"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663749"},{"volume-title":"Usenix security symposium","year":"2011","author":"Caballero J.","key":"e_1_3_2_2_10_1"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00055"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557048"},{"volume-title":"Jun","year":"2019","author":"Cylance","key":"e_1_3_2_2_13_1"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23357"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_24"},{"key":"e_1_3_2_2_16_1","first-page":"375","volume-title":"Proc. of CCS'07","author":"Franklin J.","year":"2007"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23240"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"volume-title":"Feb","year":"2020","author":"Gatlan S.","key":"e_1_3_2_2_19_1"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382283"},{"volume-title":"28th USENIX Security Symposium (USENIX Security 19)","year":"2019","author":"Havron S.","key":"e_1_3_2_2_21_1"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"volume-title":"Proc. of WEIS'12","year":"2012","author":"Herley C.","key":"e_1_3_2_2_23_1"},{"volume-title":"28th USENIX Security Symposium (USENIX Security 19)","year":"2019","author":"Ho G.","key":"e_1_3_2_2_24_1"},{"key":"e_1_3_2_2_25_1","first-page":"469","volume-title":"Proceedings of the 26rd USENIX Security Symposium (USENIX Security'17)","author":"Ho G.","year":"2017"},{"volume-title":"Examining signals of trust in criminal markets online. Journal of Cybersecurity","year":"2016","author":"Holt T. J.","key":"e_1_3_2_2_26_1"},{"volume-title":"Technical white paper: Reversal and analysis of zeus and spyeye banking trojans","year":"2012","author":"Active","key":"e_1_3_2_2_27_1"},{"key":"e_1_3_2_2_28_1","first-page":"327","volume-title":"Eleventh Symposium On Usable Privacy and Security ($$SOUPS$$ 2015)","author":"Ion I.","year":"2015"},{"volume-title":"Mar","year":"2020","author":"Krebs B.","key":"e_1_3_2_2_29_1"},{"volume-title":"Feb","year":"2020","author":"Labs K.","key":"e_1_3_2_2_30_1"},{"volume-title":"CA","year":"2018","author":"Milka G.","key":"e_1_3_2_2_31_1"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39235-1_9"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2018.8376206"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987475"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCF.2016.7740434"},{"key":"e_1_3_2_2_37_1","first-page":"975","volume-title":"The agony of passwords: Can we learn from user coping strategies? In CHI'14 Extended Abstracts on Human Factors in Computing Systems. ACM New York","author":"Stobert E.","year":"2014"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_5"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660282"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134067"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_10"},{"volume-title":"Sextortion: Cybersecurity, teenagers, and remote sexual assault","year":"2016","author":"Wittes B.","key":"e_1_3_2_2_42_1"},{"volume-title":"19th Network and Distributed System Security Symposium (NDSS)","year":"2012","author":"Yan Q.","key":"e_1_3_2_2_43_1"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CCS '20"},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417892","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:32Z","timestamp":1750197692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417892"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":43,"alternative-id":["10.1145\/3372297.3417892","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3417892","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}