{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:58:56Z","timestamp":1769749136289,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427258","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"597-610","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Understanding Promotion-as-a-Service on GitHub"],"prefix":"10.1145","author":[{"given":"Kun","family":"Du","sequence":"first","affiliation":[{"name":"Tsinghua University"}]},{"given":"Hao","family":"Yang","sequence":"additional","affiliation":[{"name":"TsingHua University"}]},{"given":"Yubao","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Delaware"}]},{"given":"Haixin","family":"Duan","sequence":"additional","affiliation":[{"name":"Institute for Network Science and Cyberspace Tsinghua University; Qi An Xin Group Corp., China"}]},{"given":"Haining","family":"Wang","sequence":"additional","affiliation":[{"name":"Virginia Tech, United States of America"}]},{"given":"Shuang","family":"Hao","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, United States of America"}]},{"given":"Zhou","family":"Li","sequence":"additional","affiliation":[{"name":"University of California Irvine, United States of America"}]},{"given":"Min","family":"Yang","sequence":"additional","affiliation":[{"name":"Fudan University, China"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"api.github.com. 2019. GitHub API Interface. https:\/\/api.github.com\/.  api.github.com. 2019. GitHub API Interface. https:\/\/api.github.com\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983695"},{"key":"e_1_3_2_1_3_1","unstructured":"brunch.co.kr. 2019. SKT-Github-Abuse. https:\/\/brunch.co.kr\/@supims\/595.  brunch.co.kr. 2019. SKT-Github-Abuse. https:\/\/brunch.co.kr\/@supims\/595."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 32nd AAAI Conference on Artificial Intelligence.","author":"Cai Qingpeng","year":"2018"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053022"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145396"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the ACM Internet Measurement Conference.","author":"De\u00a0Cristofaro Emiliano","year":"2014"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194932.3194936"},{"key":"e_1_3_2_1_9_1","unstructured":"devskiller.com. 2019. Devskiller. https:\/\/devskiller.com\/.  devskiller.com. 2019. Devskiller. https:\/\/devskiller.com\/."},{"key":"e_1_3_2_1_10_1","volume-title":"The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO. In USENIX Security Symposium.","author":"Du Kun","year":"2016"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the Symposium on Network and Distributed System Security.","author":"Egele Manuel","year":"2013"},{"key":"e_1_3_2_1_12_1","unstructured":"farsightsecurity.com. 2019. Passive DNS historical internet database: Farsight DNSDB. https:\/\/www.farsightsecurity.com\/solutions\/dnsdb\/.  farsightsecurity.com. 2019. Passive DNS historical internet database: Farsight DNSDB. https:\/\/www.farsightsecurity.com\/solutions\/dnsdb\/."},{"key":"e_1_3_2_1_13_1","unstructured":"freecodecamp.org. 2016. How I Got 1 000 Stars on My GitHub Project and the Lessons Learned Along the Way. https:\/\/medium.freecodecamp.org\/how-i-got-1000\u2013on-my-github-project-654d3d394ca6.  freecodecamp.org. 2016. How I Got 1 000 Stars on My GitHub Project and the Lessons Learned Along the Way. https:\/\/medium.freecodecamp.org\/how-i-got-1000\u2013on-my-github-project-654d3d394ca6."},{"key":"e_1_3_2_1_14_1","unstructured":"gharchive.org. 2019. GH Archive. https:\/\/www.gharchive.org\/.  gharchive.org. 2019. GH Archive. https:\/\/www.gharchive.org\/."},{"key":"e_1_3_2_1_15_1","unstructured":"gimhub.com. 2019. GimHub - Buy GitHub Stars and Followers. https:\/\/gimhub.com\/.  gimhub.com. 2019. GimHub - Buy GitHub Stars and Followers. https:\/\/gimhub.com\/."},{"key":"e_1_3_2_1_16_1","unstructured":"github.com. 2018. Abusing Github commit history for the lulz. https:\/\/github.com\/gelstudios\/gitfiti.  github.com. 2018. Abusing Github commit history for the lulz. https:\/\/github.com\/gelstudios\/gitfiti."},{"key":"e_1_3_2_1_17_1","unstructured":"github.com. 2018. Projects | The State of the Octoverse. https:\/\/octoverse.github.com\/projects.  github.com. 2018. Projects | The State of the Octoverse. https:\/\/octoverse.github.com\/projects."},{"key":"e_1_3_2_1_18_1","unstructured":"github.com. 2018. The State of the Octoverse | The State of the Octoverse celebrates a year of building across teams time zones and millions of merged pull requests.https:\/\/octoverse.github.com\/.  github.com. 2018. The State of the Octoverse | The State of the Octoverse celebrates a year of building across teams time zones and millions of merged pull requests.https:\/\/octoverse.github.com\/."},{"key":"e_1_3_2_1_19_1","unstructured":"github.com. 2019. GitHub - torvalds\/linux: Linux kernel source tree. https:\/\/github.com\/torvalds\/linux.  github.com. 2019. GitHub - torvalds\/linux: Linux kernel source tree. https:\/\/github.com\/torvalds\/linux."},{"key":"e_1_3_2_1_20_1","unstructured":"github.com. 2019. GitHub Report Abuse. https:\/\/github.com\/contact\/report-abuse\/.  github.com. 2019. GitHub Report Abuse. https:\/\/github.com\/contact\/report-abuse\/."},{"key":"e_1_3_2_1_21_1","unstructured":"github.com. 2019. Stop abuse GitHub Star metatron-app\/metatron-discovery \u00b7 GitHub. https:\/\/github.com\/metatron-app\/metatron-discovery\/issues\/2405.  github.com. 2019. Stop abuse GitHub Star metatron-app\/metatron-discovery \u00b7 GitHub. https:\/\/github.com\/metatron-app\/metatron-discovery\/issues\/2405."},{"key":"e_1_3_2_1_22_1","unstructured":"github.com. 2019. The world leading software development platform GitHub. https:\/\/github.com\/.  github.com. 2019. The world leading software development platform GitHub. https:\/\/github.com\/."},{"key":"e_1_3_2_1_23_1","unstructured":"gitstar.org. 2018. GitStar. http:\/\/218.241.135.34:88\/.  gitstar.org. 2018. GitStar. http:\/\/218.241.135.34:88\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382283"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Muhammad Ikram Lucky Onwuzurike Shehroze Farooqi Emiliano\u00a0De Cristofaro Arik Friedman Guillaume Jourjon Mohammed\u00a0Ali Kaafar and M\u00a0Zubair Shafiq. 2017. Measuring Characterizing and Detecting Facebook Like Farms. ACM Transactions on Privacy and Security(2017).  Muhammad Ikram Lucky Onwuzurike Shehroze Farooqi Emiliano\u00a0De Cristofaro Arik Friedman Guillaume Jourjon Mohammed\u00a0Ali Kaafar and M\u00a0Zubair Shafiq. 2017. Measuring Characterizing and Detecting Facebook Like Farms. ACM Transactions on Privacy and Security(2017).","DOI":"10.1145\/3121134"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746403"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597074"},{"key":"e_1_3_2_1_28_1","volume-title":"Show Me the Money: Characterizing Spam-advertised Revenue. In USENIX Security Symposium.","author":"Kanich Chris","year":"2011"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Paul\u00a0M Leonardi. 2014. Social media Knowledge sharing and Innovation: Toward a Theory of Communication Visibility. Information Systems Research(2014).  Paul\u00a0M Leonardi. 2014. Social media Knowledge sharing and Innovation: Toward a Theory of Communication Visibility. Information Systems Research(2014).","DOI":"10.1287\/isre.2014.0536"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441792"},{"key":"e_1_3_2_1_32_1","unstructured":"oschina.net. 2018. Github\u2019s fake industry chain is exposed. You can buy Stars when you spend money (Translated from Chinese). https:\/\/www.oschina.net\/news\/99612\/fake-star-on-github?from=20180909.  oschina.net. 2018. Github\u2019s fake industry chain is exposed. You can buy Stars when you spend money (Translated from Chinese). https:\/\/www.oschina.net\/news\/99612\/fake-star-on-github?from=20180909."},{"key":"e_1_3_2_1_33_1","unstructured":"pillow.readthedocs.io. 2018. Pillow. https:\/\/pillow.readthedocs.io\/en\/stable\/.  pillow.readthedocs.io. 2018. Pillow. https:\/\/pillow.readthedocs.io\/en\/stable\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264842"},{"key":"e_1_3_2_1_35_1","unstructured":"smexpt.com. 2018. SMEXPT | Github Stars. https:\/\/www.smexpt.com\/shop\/github-stars\/.  smexpt.com. 2018. SMEXPT | Github Stars. https:\/\/www.smexpt.com\/shop\/github-stars\/."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813661"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342549.2342551"},{"key":"e_1_3_2_1_38_1","unstructured":"theregister.co.uk. 2019. Drinks-for-stars. https:\/\/www.theregister.co.uk\/2019\/07\/30\/would_you_star_a_github_project_for_a_free_drink\/.  theregister.co.uk. 2019. Drinks-for-stars. https:\/\/www.theregister.co.uk\/2019\/07\/30\/would_you_star_a_github_project_for_a_free_drink\/."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the ACM Internet Measurement Conference.","author":"Thomas Kurt","year":"2011"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.41"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568315"},{"key":"e_1_3_2_1_42_1","volume-title":"Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. In USENIX Security Symposium.","author":"Wang Gang","year":"2014"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274451"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766510"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741650"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.11"},{"key":"e_1_3_2_1_47_1","unstructured":"zdnet.com. 2016. GitHub warns. https:\/\/www.zdnet.com\/article\/github-warns-some-accounts- compromised-after-reused-password-attack\/.  zdnet.com. 2016. GitHub warns. https:\/\/www.zdnet.com\/article\/github-warns-some-accounts- compromised-after-reused-password-attack\/."},{"key":"e_1_3_2_1_48_1","unstructured":"zdnet.com. 2018. GitHub says bug exposed some plaintext passwords | ZDNet. https:\/\/www.zdnet.com\/article\/github-says-bug-exposed-account-passwords\/.  zdnet.com. 2018. GitHub says bug exposed some plaintext passwords | ZDNet. https:\/\/www.zdnet.com\/article\/github-says-bug-exposed-account-passwords\/."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.28"},{"key":"e_1_3_2_1_50_1","unstructured":"zhaopin.com. 2019. Zhaopin. https:\/\/www.zhaopin.com\/.  zhaopin.com. 2019. Zhaopin. https:\/\/www.zhaopin.com\/."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Haizhong Zheng Minhui Xue Hao Lu Shuang Hao Haojin Zhu Xiaohui Liang and Keith Ross. 2017. Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. arXiv preprint arXiv:1709.06916(2017).  Haizhong Zheng Minhui Xue Hao Lu Shuang Hao Haojin Zhu Xiaohui Liang and Keith Ross. 2017. Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. arXiv preprint arXiv:1709.06916(2017).","DOI":"10.14722\/ndss.2018.23009"},{"key":"e_1_3_2_1_52_1","unstructured":"zhihu.com. 2018. China\u2019s mainland GitHub fraud has grown exponentially behind it... (Translated from Chinese). https:\/\/zhuanlan.zhihu.com\/p\/38791657.  zhihu.com. 2018. China\u2019s mainland GitHub fraud has grown exponentially behind it... (Translated from Chinese). https:\/\/zhuanlan.zhihu.com\/p\/38791657."}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427258","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427258"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":52,"alternative-id":["10.1145\/3427228.3427258","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427258","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}