{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:41:51Z","timestamp":1772905311316,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423632","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"78-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Are You Human?"],"prefix":"10.1145","author":[{"given":"Sourena","family":"Maroofi","sequence":"first","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG, France"}]},{"given":"Maciej","family":"Korczy\u0144ski","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG, France"}]},{"given":"Andrzej","family":"Duda","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG, France"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1095","volume-title":"Hu and Gang Wang. End-to-end Measurements of Email Spoofing Attacks. In 27th USENIX Security Symposium","author":"Hang","year":"2018","unstructured":"Hang Hu and Gang Wang. End-to-end Measurements of Email Spoofing Attacks. In 27th USENIX Security Symposium, pages 1095--1112, 2018."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"Christopher Kruegel. Visual-Similarity-Based Phishing Detection. In 4th International Conference on Security and Privacy in Communication Netoworks","author":"Medvet Eric","year":"2008","unstructured":"Eric Medvet, Engin Kirda, and Christopher Kruegel. Visual-Similarity-Based Phishing Detection. In 4th International Conference on Security and Privacy in Communication Netoworks, pages 1--6, 2008."},{"key":"e_1_3_2_1_4_1","volume-title":"New Rule-Based Phishing Detection Method. Expert Systems with Applications, 53:231--242","author":"Moghimi Mahmood","year":"2016","unstructured":"Mahmood Moghimi and Ali Yazdian Varjani. New Rule-Based Phishing Detection Method. Expert Systems with Applications, 53:231--242, 2016."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2743528"},{"issue":"4","key":"e_1_3_2_1_7_1","first-page":"458","volume":"11","author":"Marchal Samuel","year":"2014","unstructured":"Samuel Marchal, J\u00e9r\u00f4me Fran\u00e7ois, Radu State, and Thomas Engel. Phishstorm: Detecting Phishing with Streaming Analytics. IEEE Transactions on Network and Service Management, 11(4):458--471, 2014.","journal-title":"Thomas Engel. Phishstorm: Detecting Phishing with Streaming Analytics. IEEE Transactions on Network and Service Management"},{"key":"e_1_3_2_1_8_1","volume-title":"http:\/\/www.antiphishing.org","author":"Anti-Phishing Working Group (APWG):Cross-Industry Global Group Supporting Tackling the Phishing Menace.","year":"2020","unstructured":"Anti-Phishing Working Group (APWG):Cross-Industry Global Group Supporting Tackling the Phishing Menace. http:\/\/www.antiphishing.org, 2020."},{"key":"e_1_3_2_1_9_1","unstructured":"PhishTank: A Nonprofit Anti-Phishing Organization. http:\/\/www.phishtank.com 2020."},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/www.cyberthreatcoalition.org","author":"Coalition Cyber Threat","year":"2020","unstructured":"COVID-19 Cyber Threat Coalition. https:\/\/www.cyberthreatcoalition.org, 2020."},{"key":"e_1_3_2_1_11_1","unstructured":"X-Force Threat Intelligence Index 2020. URL https:\/\/www.ibm.com\/account\/reg\/us-en\/signup?formid=urx-42703."},{"key":"e_1_3_2_1_12_1","first-page":"92","volume-title":"Anti-Abuse and Spam Conference","author":"Chhabra Sidharth","year":"2011","unstructured":"Sidharth Chhabra, Anupama Aggarwal, Fabricio Benevenuto, and Ponnurangam Kumaraguru. Phi.sh\/\u00f4iaL: The Phishing Landscape through Short URLs. In 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, pages 92--101, 2011."},{"key":"e_1_3_2_1_13_1","volume-title":"Threat Landscape Report. https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/threat-reports\/threat-report-q2-2019.pdf","author":"Fortinet","year":"2019","unstructured":"Fortinet: Threat Landscape Report. https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/threat-reports\/threat-report-q2-2019.pdf, 2019."},{"key":"e_1_3_2_1_14_1","volume-title":"A Survey on Automated Dynamic Malware-Analysis Techniques and Tools. ACM Computing Surveys (CSUR), 44(2):1--42","author":"Egele Manuel","year":"2008","unstructured":"Manuel Egele, Theodoor Scholte, Engin Kirda, and Christopher Kruegel. A Survey on Automated Dynamic Malware-Analysis Techniques and Tools. ACM Computing Surveys (CSUR), 44(2):1--42, 2008."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3150376.3150378"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2018.8376206"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00045"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.50"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Workshop on Offensive Technologies, 8: 1--8","author":"Cova Marco","year":"2008","unstructured":"Marco Cova, Christopher Kruegel, and Giovanni Vigna. There Is No Free Phish: An Analysis of \"Free\" and Live Phishing Kits. USENIX Workshop on Offensive Technologies, 8:1--8, 2008."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00049"},{"key":"e_1_3_2_1_22_1","unstructured":"Yi-Min Wang and Ming Ma. Detecting Stealth Web Pages That Use Click-Through Cloaking. In Microsoft Research Technical Report MSR-TR 2006."},{"key":"e_1_3_2_1_23_1","volume-title":"29th USENIX Security Symposium","author":"Oest Adam","year":"2020","unstructured":"Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doup\u00e9, and Gail-Joon Ahn. Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. In 29th USENIX Security Symposium, 2020."},{"key":"e_1_3_2_1_24_1","volume-title":"Malicious use of reCaptcha","author":"Spotlight Threat","year":"2020","unstructured":"Threat Spotlight: Malicious use of reCaptcha, 2020. URL https:\/\/blog.barracuda.com\/2020\/04\/30\/threat-spotlight-malicious-recaptcha\/."},{"key":"e_1_3_2_1_25_1","first-page":"v2","author":"Google","year":"2020","unstructured":"Google reCAPTCHA v2, 2020. URL https:\/\/developers.google.com\/recaptcha\/docs\/display.","journal-title":"CAPTCHA"},{"key":"e_1_3_2_1_26_1","unstructured":"PhishTank FAQ 2020. URL https:\/\/www.phishtank.com\/faq.php."},{"key":"e_1_3_2_1_27_1","unstructured":"Comparison of web browsers 2020. URL https:\/\/en.wikipedia.org\/wiki\/Comparison_of_web_browsers."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052596"},{"key":"e_1_3_2_1_29_1","unstructured":"Multiple Sign-In Pages 2015. URL https:\/\/support.google.com\/mail\/forum\/AAAAK7un8RUoAsE-6wmaSU\/?hl=en&gpf=%23!topic%2Fgmail%2FoAsE-6wmaSU."},{"key":"e_1_3_2_1_30_1","unstructured":"Safe Browsing APIs (v4) - Caching 2020. URL https:\/\/developers.google.com\/safe-browsing\/v4\/caching."},{"key":"e_1_3_2_1_31_1","unstructured":"Browsers Market Share 2020. URL https:\/\/netmarketshare.com\/browser-market-share.aspx."},{"key":"e_1_3_2_1_32_1","unstructured":"Opera Browser FAQ 2020. URL https:\/\/security.opera.com\/mobile-browsers-faq\/."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186092"},{"key":"e_1_3_2_1_34_1","first-page":"865","volume-title":"William Robertson. Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers. In 26th USENIX Security Symposium","author":"Lauinger Tobias","year":"2017","unstructured":"Tobias Lauinger, Abdelberi Chaabane, Ahmet Salih Buyukkayhan, Kaan Onarlioglu, and William Robertson. Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers. In 26th USENIX Security Symposium, pages 865--880, 2017."},{"key":"e_1_3_2_1_35_1","unstructured":"Alexa: Actionable Analytics for the Web. https:\/\/www.alexa.com."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/15332861.2011.558454"},{"key":"e_1_3_2_1_37_1","unstructured":"Phishlabs. https:\/\/www.phishlabs.com."},{"key":"e_1_3_2_1_38_1","first-page":"379","volume-title":"29th USENIX Security Symposium","author":"Oest Adam","year":"2020","unstructured":"Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, and Adam Doup\u00e9. Phishtime: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists. In 29th USENIX Security Symposium, pages 379--396, 2020."},{"key":"e_1_3_2_1_39_1","volume-title":"1st Quarter 2020 APWG. https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q1_2020.pdf","author":"Trends Report Phishing Activity","year":"2020","unstructured":"Phishing Activity Trends Report: 1st Quarter 2020 APWG. https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q1_2020.pdf, 2020."}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","location":"Virtual Event USA","acronym":"IMC '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423632","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:38:50Z","timestamp":1765841930000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423632"}},"subtitle":["Resilience of Phishing Detection to Evasion Techniques Based on Human Verification"],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":39,"alternative-id":["10.1145\/3419394.3423632","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423632","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}