{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:38:22Z","timestamp":1767339502387,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program","award":["2018YFB0803600"],"award-info":[{"award-number":["2018YFB0803600"]}]},{"name":"Qatar National Research Fund","award":["QNRF-AICC01-1228-170004"],"award-info":[{"award-number":["QNRF-AICC01-1228-170004"]}]},{"name":"National Natural Science Foundation of China","award":["62072046"],"award-info":[{"award-number":["62072046"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447840","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"209-220","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns"],"prefix":"10.1145","author":[{"given":"Pengcheng","family":"Xia","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Mohamed","family":"Nabeel","sequence":"additional","affiliation":[{"name":"Qatar Computing Research Institute, Doha, Qatar"}]},{"given":"Issa","family":"Khalil","sequence":"additional","affiliation":[{"name":"Qatar Computing Research Institute, Doha, Qatar"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Ting","family":"Yu","sequence":"additional","affiliation":[{"name":"Qatar Computing Research Institute, Doha, Qatar"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"volume-title":"HTTPS as a Ranking Signal. https:\/\/tinyurl.com\/jlb49mh. (2014). [Online","year":"2020","key":"e_1_3_2_2_1_1","unstructured":"2014. HTTPS as a Ranking Signal. https:\/\/tinyurl.com\/jlb49mh. (2014). [Online ; accessed 20- September - 2020 ]. 2014. HTTPS as a Ranking Signal. https:\/\/tinyurl.com\/jlb49mh. (2014). [Online; accessed 20-September-2020]."},{"key":"e_1_3_2_2_2_1","volume-title":"https: \/\/spycloud.com\/analyzing-136k-new-domains-with-covid-19-themes\/","author":"Analyzing","year":"2020","unstructured":"2020. Analyzing 136,000 New Domains with COVID-19 Themes . ( 2020 ). https: \/\/spycloud.com\/analyzing-136k-new-domains-with-covid-19-themes\/ . 2020. Analyzing 136,000 New Domains with COVID-19 Themes. (2020). https: \/\/spycloud.com\/analyzing-136k-new-domains-with-covid-19-themes\/."},{"key":"e_1_3_2_2_3_1","unstructured":"2020. CertStream: CT Log Update Stream. https:\/\/certstream.calidog.io\/. (2020).  2020. CertStream: CT Log Update Stream. https:\/\/certstream.calidog.io\/. (2020)."},{"key":"e_1_3_2_2_4_1","volume-title":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/covid-19-malwaremakes-hay-during-a-pandemic\/","author":"Hay Malware Makes","year":"2020","unstructured":"2020. COVID-19 ? Malware Makes Hay During a Pandemic . ( 2020 ). https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/covid-19-malwaremakes-hay-during-a-pandemic\/ . 2020. COVID-19 ? Malware Makes Hay During a Pandemic. (2020). https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/covid-19-malwaremakes-hay-during-a-pandemic\/."},{"key":"e_1_3_2_2_5_1","unstructured":"2020. Developing Story: COVID-19 Used in Malicious Campaigns. (2020). https:\/\/www.trendmicro.com\/vinfo\/in\/security\/news\/cybercrime-and-digitalthreats\/coronavirus-used-in-spam-malware-file-names-and-maliciousdomains.  2020. Developing Story: COVID-19 Used in Malicious Campaigns. (2020). https:\/\/www.trendmicro.com\/vinfo\/in\/security\/news\/cybercrime-and-digitalthreats\/coronavirus-used-in-spam-malware-file-names-and-maliciousdomains."},{"key":"e_1_3_2_2_6_1","unstructured":"2020. dnstwist - Domain name permutation engine for detecting homograph phishing attacks typo squatting and brand impersonation. (2020). https: \/\/github.com\/elceef\/dnstwist.  2020. dnstwist - Domain name permutation engine for detecting homograph phishing attacks typo squatting and brand impersonation. (2020). https: \/\/github.com\/elceef\/dnstwist."},{"key":"e_1_3_2_2_7_1","unstructured":"2020. Facebook Squatting Campaign - X-Force Early Warning. (2020). https:\/\/ exchange.xforce.ibmcloud.com\/collection\/0bba931626276966f9f7503a950fe8c0.  2020. Facebook Squatting Campaign - X-Force Early Warning. (2020). https:\/\/ exchange.xforce.ibmcloud.com\/collection\/0bba931626276966f9f7503a950fe8c0."},{"key":"e_1_3_2_2_8_1","unstructured":"2020. Facing down the myriad threats tied to COVID-19. (2020). https:\/\/news. sophos.com\/en-us\/2020\/04\/14\/covidmalware\/?cmp=30728.  2020. Facing down the myriad threats tied to COVID-19. (2020). https:\/\/news. sophos.com\/en-us\/2020\/04\/14\/covidmalware\/?cmp=30728."},{"key":"e_1_3_2_2_9_1","unstructured":"2020. MaxMind: IP Geolocation and Online Fraud Prevention. (2020). https: \/\/www.maxmind.com\/en\/home.  2020. MaxMind: IP Geolocation and Online Fraud Prevention. (2020). https: \/\/www.maxmind.com\/en\/home."},{"volume-title":"Millions of people fell for crypto-Ponzi schemes","year":"2019","key":"e_1_3_2_2_10_1","unstructured":"2020. Millions of people fell for crypto-Ponzi schemes in 2019 . (2020). https:\/\/www.technologyreview.com\/2020\/01\/30\/275964\/cryptocurrency-ponziscams-chainalysis\/. 2020. Millions of people fell for crypto-Ponzi schemes in 2019. (2020). https:\/\/www.technologyreview.com\/2020\/01\/30\/275964\/cryptocurrency-ponziscams-chainalysis\/."},{"key":"e_1_3_2_2_11_1","unstructured":"2020. Nueva campa\u00f1a de Phishing del Banco de Chile vinculados a Covid-19. (2020). https:\/\/twitter.com\/lixah_cl\/status\/1244571674219106304.  2020. Nueva campa\u00f1a de Phishing del Banco de Chile vinculados a Covid-19. (2020). https:\/\/twitter.com\/lixah_cl\/status\/1244571674219106304."},{"key":"e_1_3_2_2_12_1","unstructured":"2020. Passive DNS historical internet database: Farsight DNSDB. (2020). https: \/\/www.farsightsecurity.com\/solutions\/dnsdb\/.  2020. Passive DNS historical internet database: Farsight DNSDB. (2020). https: \/\/www.farsightsecurity.com\/solutions\/dnsdb\/."},{"key":"e_1_3_2_2_13_1","unstructured":"2020. Studying How Cybercriminals Prey on the COVID-19 Pandemic. (2020). https:\/\/unit42.paloaltonetworks.com\/how-cybercriminals-prey-on-thecovid-19-pandemic\/.  2020. Studying How Cybercriminals Prey on the COVID-19 Pandemic. (2020). https:\/\/unit42.paloaltonetworks.com\/how-cybercriminals-prey-on-thecovid-19-pandemic\/."},{"key":"e_1_3_2_2_14_1","unstructured":"2020. URL and website scanner - urlscan.io. (2020). https:\/\/urlscan.io\/.  2020. URL and website scanner - urlscan.io. (2020). https:\/\/urlscan.io\/."},{"key":"e_1_3_2_2_15_1","volume-title":"https:whoisxmlapi.com. (2020). [Online","author":"XMLAPI.","year":"2020","unstructured":"2020. Whois XMLAPI. https:whoisxmlapi.com. (2020). [Online ; accessed 20- September- 2020 ]. 2020. WhoisXMLAPI. https:whoisxmlapi.com. (2020). [Online; accessed 20- September-2020]."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363192"},{"key":"e_1_3_2_2_17_1","volume-title":"Challenges of Cybercrimes and Cybersecurity. Available at SSRN 3568830","author":"Ahmad Tabrez","year":"2020","unstructured":"Tabrez Ahmad . 2020. Corona Virus (COVID-19) Pandemic and Work from Home : Challenges of Cybercrimes and Cybersecurity. Available at SSRN 3568830 ( 2020 ). Tabrez Ahmad. 2020. Corona Virus (COVID-19) Pandemic and Work from Home: Challenges of Cybercrimes and Cybersecurity. Available at SSRN 3568830 (2020)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996767"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the 19th USENIX Conference on Security. 273--290","author":"Antonakakis Manos","year":"2010","unstructured":"Manos Antonakakis , Roberto Perdisci , David Dagon , Wenke Lee , and Nick Feamster . 2010 . Building a Dynamic Reputation System for DNS . In Proceedings of the 19th USENIX Conference on Security. 273--290 . Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, and Nick Feamster. 2010. Building a Dynamic Reputation System for DNS. In Proceedings of the 19th USENIX Conference on Security. 273--290."},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the 20th USENIX Conference on Security. USENIX Association, 27--42","author":"Antonakakis Manos","year":"2011","unstructured":"Manos Antonakakis , Roberto Perdisci , Wenke Lee , Nikolaos Vasiloglou , II , and David Dagon . 2011 . Detecting Malware Domains at the Upper DNS Hierarchy . In Proceedings of the 20th USENIX Conference on Security. USENIX Association, 27--42 . Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou, II, and David Dagon. 2011. Detecting Malware Domains at the Upper DNS Hierarchy. In Proceedings of the 20th USENIX Conference on Security. USENIX Association, 27--42."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2584679"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423621"},{"key":"e_1_3_2_2_23_1","volume-title":"Impact of the COVID-19 pandemic on the Internet latency: A large-scale study","author":"Candela Massimo","year":"2020","unstructured":"Massimo Candela , Valerio Luconi , and Alessio Vecchio . 2020. Impact of the COVID-19 pandemic on the Internet latency: A large-scale study . Elsevier Public Health Emergency Collection ( 2020 ). Massimo Candela, Valerio Luconi, and Alessio Vecchio. 2020. Impact of the COVID-19 pandemic on the Internet latency: A large-scale study. Elsevier Public Health Emergency Collection (2020)."},{"key":"e_1_3_2_2_24_1","unstructured":"Farsight Security Inc. 2019. DNS Database. https:\/\/www.dnsdb.info\/. (2019). Accessed: 28-02-2019.  Farsight Security Inc. 2019. DNS Database. https:\/\/www.dnsdb.info\/. (2019). Accessed: 28-02-2019."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423658"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815706"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_2_28_1","unstructured":"Ren He Haoyu Wang Pengcheng Xia Liu Wang Yuanchun Li Lei Wu Yajin Zhou Xiapu Luo Yao Guo and Guoai Xu. 2020. Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware. (2020). arXiv:cs.CR\/2005.14619  Ren He Haoyu Wang Pengcheng Xia Liu Wang Yuanchun Li Lei Wu Yajin Zhou Xiapu Luo Yao Guo and Guoai Xu. 2020. Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware. (2020). arXiv:cs.CR\/2005.14619"},{"key":"e_1_3_2_2_29_1","volume-title":"CONTAIN: Privacy-oriented Contact Tracing Protocols for Epidemics. arXiv preprint arXiv:2004.05251","author":"Hekmati Arvin","year":"2020","unstructured":"Arvin Hekmati , Gowri Ramachandran , and Bhaskar Krishnamachari . 2020 . CONTAIN: Privacy-oriented Contact Tracing Protocols for Epidemics. arXiv preprint arXiv:2004.05251 (2020). Arvin Hekmati, Gowri Ramachandran, and Bhaskar Krishnamachari. 2020. CONTAIN: Privacy-oriented Contact Tracing Protocols for Epidemics. arXiv preprint arXiv:2004.05251 (2020)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176329"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134002"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Orsolya Kir\u00e1ly Marc N Potenza Dan J Stein Daniel L King David C Hodgins John B Saunders Mark D Griffiths Biljana Gjoneska Jo\u00ebl Billieux Matthias Brand etal 2020. Preventing problematic internet use during the COVID-19 pandemic: Consensus guidance. Comprehensive Psychiatry (2020) 152180.  Orsolya Kir\u00e1ly Marc N Potenza Dan J Stein Daniel L King David C Hodgins John B Saunders Mark D Griffiths Biljana Gjoneska Jo\u00ebl Billieux Matthias Brand et al. 2020. Preventing problematic internet use during the COVID-19 pandemic: Consensus guidance. Comprehensive Psychiatry (2020) 152180.","DOI":"10.1016\/j.comppsych.2020.152180"},{"key":"e_1_3_2_2_33_1","volume-title":"Proceedings of the 18th Conference on USENIX Security Symposium. USENIX Association, 351--366","author":"Kolbitsch Clemens","year":"2009","unstructured":"Clemens Kolbitsch , Paolo Milani Comparetti , Christopher Kruegel , Engin Kirda , Xiaoyong Zhou , and XiaoFeng Wang . 2009 . Effective and Efficient Malware Detection at the End Host . In Proceedings of the 18th Conference on USENIX Security Symposium. USENIX Association, 351--366 . Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiaoyong Zhou, and XiaoFeng Wang. 2009. Effective and Efficient Malware Detection at the End Host. In Proceedings of the 18th Conference on USENIX Security Symposium. USENIX Association, 351--366."},{"key":"e_1_3_2_2_34_1","unstructured":"Harjinder Singh Lallie Lynsay A. Shepherd Jason R. C. Nurse Arnau Erola Gregory Epiphaniou Carsten Maple and Xavier Bellekens. 2020. Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and CyberAttacks during the Pandemic. (2020). arXiv:cs.CR\/2006.11929  Harjinder Singh Lallie Lynsay A. Shepherd Jason R. C. Nurse Arnau Erola Gregory Epiphaniou Carsten Maple and Xavier Bellekens. 2020. Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and CyberAttacks during the Pandemic. (2020). arXiv:cs.CR\/2006.11929"},{"key":"e_1_3_2_2_35_1","volume-title":"Hong","author":"Li Tianshi","year":"2020","unstructured":"Tianshi Li , Jackie, Yang, Cori Faklaris , Jennifer King , Yuvraj Agarwal , Laura Dabbish , and Jason I . Hong . 2020 . Decentralized is not risk-free: Understanding public perceptions of privacy-utility trade-offs in COVID- 19 contact-tracing apps. arXiv preprint arXiv:2005.11957 (2020). Tianshi Li, Jackie, Yang, Cori Faklaris, Jennifer King, Yuvraj Agarwal, Laura Dabbish, and Jason I. Hong. 2020. Decentralized is not risk-free: Understanding public perceptions of privacy-utility trade-offs in COVID-19 contact-tracing apps. arXiv preprint arXiv:2005.11957 (2020)."},{"key":"e_1_3_2_2_36_1","volume-title":"Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, and Li Li.","author":"Liu Joseph K.","year":"2020","unstructured":"Joseph K. Liu , Man Ho Au , Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, and Li Li. 2020 . Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. Cryptology ePrint Archive, Report 2020\/528. (2020). https:\/\/eprint.iacr.org\/2020\/528. Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, and Li Li. 2020. Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. Cryptology ePrint Archive, Report 2020\/528. (2020). https:\/\/eprint.iacr.org\/2020\/528."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423655"},{"key":"e_1_3_2_2_38_1","volume-title":"Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference. 23, 4","author":"Nabeel Mohamed","year":"2020","unstructured":"Mohamed Nabeel , Issa M. Khalil , Bei Guan , and Ting Yu. 2020. Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference. 23, 4 ( 2020 ). https:\/\/doi.org\/10.1145\/3401897 10.1145\/3401897 Mohamed Nabeel, Issa M. Khalil, Bei Guan, and Ting Yu. 2020. Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference. 23, 4 (2020). https:\/\/doi.org\/10.1145\/3401897"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2020.1771222"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98192-5_22"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355585"},{"volume-title":"Proceedings of the 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. 403--414","author":"Rahbarinia B.","key":"e_1_3_2_2_42_1","unstructured":"B. Rahbarinia , R. Perdisci , and M. Antonakakis . 2015. Segugio: Efficient BehaviorBased Tracking of Malware-Control Domains in Large ISP Networks . In Proceedings of the 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. 403--414 . B. Rahbarinia, R. Perdisci, and M. Antonakakis. 2015. Segugio: Efficient BehaviorBased Tracking of Malware-Control Domains in Large ISP Networks. In Proceedings of the 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. 403--414."},{"key":"e_1_3_2_2_43_1","volume-title":"arXiv preprint arXiv:2004.13219","author":"Redmiles Elissa M.","year":"2020","unstructured":"Elissa M. Redmiles . 2020. User Concerns & Tradeoffs in Technology-Facilitated Contact Tracing. arXiv preprint arXiv:2004.13219 ( 2020 ). Elissa M. Redmiles. 2020. User Concerns & Tradeoffs in Technology-Facilitated Contact Tracing. arXiv preprint arXiv:2004.13219 (2020)."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0410"},{"key":"e_1_3_2_2_45_1","volume-title":"An Early Look on the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID19. arXiv preprint arXiv:2004.04046","author":"Schild Leonard","year":"2020","unstructured":"Leonard Schild , Chen Ling , Jeremy Blackburn , Gianluca Stringhini , Yang Zhang , and Savvas Zannettou . 2020. \" Go eat a bat, Chang!\" : An Early Look on the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID19. arXiv preprint arXiv:2004.04046 ( 2020 ). Leonard Schild, Chen Ling, Jeremy Blackburn, Gianluca Stringhini, Yang Zhang, and Savvas Zannettou. 2020. \"Go eat a bat, Chang!\": An Early Look on the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID19. arXiv preprint arXiv:2004.04046 (2020)."},{"key":"e_1_3_2_2_46_1","volume-title":"Vetting Security and Privacy of Global COVID-19 Contact Tracing Applications. arXiv preprint arXiv:2006.10933","author":"Sun Ruoxi","year":"2020","unstructured":"Ruoxi Sun , Wei Wang , Minhui Xue , Gareth Tyson , Seyit Camtepe , and Damith Ranasinghe . 2020. Vetting Security and Privacy of Global COVID-19 Contact Tracing Applications. arXiv preprint arXiv:2006.10933 ( 2020 ). Ruoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, Seyit Camtepe, and Damith Ranasinghe. 2020. Vetting Security and Privacy of Global COVID-19 Contact Tracing Applications. arXiv preprint arXiv:2006.10933 (2020)."},{"key":"e_1_3_2_2_47_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019","author":"Sun Xiaoqing","year":"2019","unstructured":"Xiaoqing Sun , Mingkai Tong , Jiahai Yang , Liu Xinran , and Liu Heng . 2019 . HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification . In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019 ). USENIX Association, Chaoyang District, Beijing, 399--412. https:\/\/www.usenix.org\/conference\/raid 2019\/presentation\/sun Xiaoqing Sun, Mingkai Tong, Jiahai Yang, Liu Xinran, and Liu Heng. 2019. HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). USENIX Association, Chaoyang District, Beijing, 399--412. https:\/\/www.usenix.org\/conference\/raid2019\/presentation\/sun"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623342"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3011077.3011112"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423636"},{"key":"e_1_3_2_2_51_1","volume-title":"Market-level Analysis of Government-backed COVID-19 Contact Tracing Apps. arXiv preprint arXiv:2012.10866","author":"Wang Huiyi","year":"2020","unstructured":"Huiyi Wang , Liu Wang , and Haoyu Wang . 2020. Market-level Analysis of Government-backed COVID-19 Contact Tracing Apps. arXiv preprint arXiv:2012.10866 ( 2020 ). Huiyi Wang, Liu Wang, and Haoyu Wang. 2020. Market-level Analysis of Government-backed COVID-19 Contact Tracing Apps. arXiv preprint arXiv:2012.10866 (2020)."},{"key":"e_1_3_2_2_52_1","volume-title":"When the Open Source Community Meets COVID-19: Characterizing COVID-19 themed GitHub Repositories. arXiv preprint arXiv:2010.12218","author":"Wang Liu","year":"2020","unstructured":"Liu Wang , Ruiqing Li , Jiaxin Zhu , Guangdong Bai , and Haoyu Wang . 2020. When the Open Source Community Meets COVID-19: Characterizing COVID-19 themed GitHub Repositories. arXiv preprint arXiv:2010.12218 ( 2020 ). Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, and Haoyu Wang. 2020. When the Open Source Community Meets COVID-19: Characterizing COVID-19 themed GitHub Repositories. arXiv preprint arXiv:2010.12218 (2020)."},{"key":"e_1_3_2_2_53_1","volume-title":"Passive DNS Replication. In FIRST Conference on Computer Security Incident. 98","author":"Weimer Florian","year":"2005","unstructured":"Florian Weimer . 2005 . Passive DNS Replication. In FIRST Conference on Computer Security Incident. 98 . Florian Weimer. 2005. Passive DNS Replication. In FIRST Conference on Computer Security Incident. 98."},{"key":"e_1_3_2_2_54_1","volume-title":"Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. arXiv preprint arXiv:2007.13639","author":"Xia Pengcheng","year":"2020","unstructured":"Pengcheng Xia , Haoyu Wang , Xiapu Luo , Lei Wu , Yajin Zhou , Guangdong Bai , Guoai Xu , Gang Huang , and Xuanzhe Liu . 2020. Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. arXiv preprint arXiv:2007.13639 ( 2020 ). Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, and Xuanzhe Liu. 2020. Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. arXiv preprint arXiv:2007.13639 (2020)."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101993"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.70"},{"key":"e_1_3_2_2_57_1","volume-title":"Article 67 (July","author":"Zhauniarovich Yury","year":"2018","unstructured":"Yury Zhauniarovich , Issa Khalil , Ting Yu , and Marc Dacier . 2018. A Survey on Malicious Domains Detection Through DNS Data Analysis. ACM Comput. Surv. 51, 4 , Article 67 (July 2018 ), 36 pages. https:\/\/doi.org\/10.1145\/3191329 10.1145\/3191329 Yury Zhauniarovich, Issa Khalil, Ting Yu, and Marc Dacier. 2018. A Survey on Malicious Domains Detection Through DNS Data Analysis. ACM Comput. Surv. 51, 4, Article 67 (July 2018), 36 pages. https:\/\/doi.org\/10.1145\/3191329"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447840","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447840"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":57,"alternative-id":["10.1145\/3422337.3447840","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447840","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}