{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:45Z","timestamp":1750220625968,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3420018","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T18:27:04Z","timestamp":1604341624000},"page":"2101-2103","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Continuous and Multiregional Monitoring of Malicious Hosts"],"prefix":"10.1145","author":[{"given":"Shota","family":"Fujii","sequence":"first","affiliation":[{"name":"Hitachi, Ltd. &amp; Okayama University, Tokyo, Japan"}]},{"given":"Takayuki","family":"Sato","sequence":"additional","affiliation":[{"name":"Hitachi, Ltd., Tokyo, Japan"}]},{"given":"Sho","family":"Aoki","sequence":"additional","affiliation":[{"name":"Hitachi, Ltd., Tokyo, Japan"}]},{"given":"Yu","family":"Tsuda","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Tokyo, Japan"}]},{"given":"Yusuke","family":"Okano","sequence":"additional","affiliation":[{"name":"FFRI Security, Inc., Tokyo, Japan"}]},{"given":"Tomohiro","family":"Shigemoto","sequence":"additional","affiliation":[{"name":"Hitachi, Ltd., Tokyo, Japan"}]},{"given":"Nobutaka","family":"Kawaguchi","sequence":"additional","affiliation":[{"name":"Hitachi, Ltd., Tokyo, Japan"}]},{"given":"Masato","family":"Terada","sequence":"additional","affiliation":[{"name":"Hitachi, Ltd., Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964114.1964123"},{"volume-title":"AWS IP Address Ranges","year":"2020","key":"e_1_3_2_1_2_1","unstructured":"Amazon. 2020. AWS IP Address Ranges . 2020 . http:\/\/docs.aws.amazon.com\/general\/latest\/gr\/aws-ip-ranges.html Amazon. 2020. AWS IP Address Ranges. 2020. http:\/\/docs.aws.amazon.com\/general\/latest\/gr\/aws-ip-ranges.html"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2017.1283910"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23218"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 23rd USENIX conference on Security Symposium (SEC","author":"Soska Kyle","year":"2014","unstructured":"Kyle Soska and Nicolas Christin . 2014 . Automatically detecting vulnerable websites before they turn malicious , In Proceedings of the 23rd USENIX conference on Security Symposium (SEC 2014), 625--640. Kyle Soska and Nicolas Christin. 2014. Automatically detecting vulnerable websites before they turn malicious, In Proceedings of the 23rd USENIX conference on Security Symposium (SEC 2014), 625--640."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.50"},{"key":"e_1_3_2_1_7_1","volume-title":"TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks. 2020 IEEE Symposium on Security and Privacy (S&P","author":"Kasturi Ranjita Pai","year":"2020","unstructured":"Ranjita Pai Kasturi , Yiting Sun , Ruian Duan , Omar Alrawi , Ehsan Asdar , Victor Zhu , Yonghwi Kwon , and Brendan Saltaformaggio . 2020 . TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks. 2020 IEEE Symposium on Security and Privacy (S&P 2020), 1156--1171. Ranjita Pai Kasturi, Yiting Sun, Ruian Duan, Omar Alrawi, Ehsan Asdar, Victor Zhu, Yonghwi Kwon, and Brendan Saltaformaggio. 2020. TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks. 2020 IEEE Symposium on Security and Privacy (S&P 2020), 1156--1171."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134614"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.55"},{"key":"e_1_3_2_1_10_1","volume-title":"Longitudinal Internet Censorship Measurement Platform. 2020 IEEE Symposium on Security and Privacy (S&P","author":"Niaki Arian Akhavan","year":"2020","unstructured":"Arian Akhavan Niaki , Shinyoung Cho , Zachary Weinberg , Nguyen Phong Hoang , Abbas Razaghpanah , Nicolas Christin , and Phillipa Gill . 2020 . ICLab: A Global , Longitudinal Internet Censorship Measurement Platform. 2020 IEEE Symposium on Security and Privacy (S&P 2020), 135--151. Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, and Phillipa Gill. 2020. ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. 2020 IEEE Symposium on Security and Privacy (S&P 2020), 135--151."}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CCS '20"},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3420018","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3420018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:32Z","timestamp":1750197692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3420018"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":10,"alternative-id":["10.1145\/3372297.3420018","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3420018","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}