{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:01:41Z","timestamp":1775815301027,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["830929"],"award-info":[{"award-number":["830929"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["NWA.1160.18.301 and CS.007"],"award-info":[{"award-number":["NWA.1160.18.301 and CS.007"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2092 CASA ? 390781972"],"award-info":[{"award-number":["EXC 2092 CASA ? 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485367","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"21-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale"],"prefix":"10.1145","author":[{"given":"Stijn","family":"Pletinckx","sequence":"first","affiliation":[{"name":"TU Delft, Delft, Netherlands"}]},{"given":"Kevin","family":"Borgolte","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"given":"Tobias","family":"Fiebig","sequence":"additional","affiliation":[{"name":"TU Delft, Delft, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","unstructured":"E. Alowaisheq S. Tang Z. Wang F. Alharbi X. Liao and X. Wang. \"Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral.\" In: Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS). 11\/2020. doi: 10.1145\/3372297.3417864.","DOI":"10.1145\/3372297.3417864"},{"key":"e_1_3_2_2_2_1","unstructured":"I. Archive. About the Internet Archvie. uRl: https:\/\/archive.org\/about\/ (visited on 04\/15\/2021)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--24592--8_2"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.52"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","unstructured":"H. L. Bijmans T. M. Booij and C. Doerr. \"Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking.\" In: Proceedings of the 25th ACM SIGSAC Conference on Computer and Communications Security (CCS). 10\/2018. doi: 10.1145\/3319535.3354230.","DOI":"10.1145\/3319535.3354230"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","unstructured":"K. Borgolte T. Fiebig S. Hao C. Kruegel and G. Vigna. \"Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates.\" In: Proceedings of the 25th Network and Distributed System Security Symposium (NDSS). 02\/2018. doi: 10.14722\/ndss.2018.23327.","DOI":"10.14722\/ndss.2018.23327"},{"key":"e_1_3_2_2_7_1","unstructured":"G. Born. Deloitte-Seite ?Test your Hacker IQ' legt Benutzerdaten offen. 11\/06\/2020. uRl: https:\/\/www.borncity.com\/blog\/2020\/11\/06\/deloitte-seite-test-your-hacker-iq-legt-benutzerdaten-offen\/ (visited on 03\/31\/2021)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169--7552(97)00031--7"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509965"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","unstructured":"A. Continella M. Polino M. Pogliani and S. Zanero. \"There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets.\" In: Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC). 12\/2018. doi: 10.1145\/3274694.3274736.","DOI":"10.1145\/3274694.3274736"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--48965-0_43"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","unstructured":"C. Dietrich K. Krombholz K. Borgolte and T. Fiebig. \"Investigating System Operators' Perspective on Security Misconfigurations.\" In: Proceedings of the 25th ACM SIGSAC Conference on Computer and Communications Security (CCS). 10\/2018. doi: 10.1145\/3243734.3243794.","DOI":"10.1145\/3243734.3243794"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"D. Dittrich and E. Kenneally. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. Tech. rep. U.S. Department of Homeland Security 08\/2012. uRl: https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/CSD-MenloPrinciplesCORE-20120803_1.pdf.","DOI":"10.2139\/ssrn.2445102"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427260"},{"key":"e_1_3_2_2_15_1","unstructured":"Google. Programmable Search Engine. 11\/10\/2020. uRl: https:\/\/developers.google.com\/custom- search\/docs\/overview (visited on 04\/13\/2021)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","unstructured":"D. Gruss M. Schwarz M. W\u00fcbbeling S. Guggi T. Malderle S. More and M. Lipp. \"Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services.\" In: Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS). 11\/2020. doi: 10.1145\/3196494.3196514.","DOI":"10.1145\/3196494.3196514"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM.2017.8256036"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148222"},{"key":"e_1_3_2_2_19_1","unstructured":"internetarchive. Wayback CDX Server API - BETA. 08\/07\/2013. uRl: https:\/\/github.com\/internetarchive\/wayback\/tree\/master\/wayback-cdx-server (visited on 04\/13\/2021)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879182"},{"key":"e_1_3_2_2_21_1","first-page":"2018","author":"Kaur M.","year":"2008","unstructured":"M. Kaur, M. van Eeten, M. Janssen, K. Borgolte, and T. Fiebig. \"Human Factors in Security Research: Lessons Learned from 2008--2018.\" In: arXiv preprint arXiv:2103.13287 (2021).","journal-title":"\"Human Factors in Security Research: Lessons Learned from"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","unstructured":"V. Le Pochat T. van Goethem S. Tajalizadehkhoob M. Korczynski and W. Joosen. \"Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation.\" In: Proceedings of the 26th Network and Distributed System Security Symposium (NDSS). 02\/2019. doi: 10.14722\/ndss.2019.23386.","DOI":"10.14722\/ndss.2019.23386"},{"issue":"1","key":"e_1_3_2_2_23_1","volume":"43","author":"Li F.","year":"2018","unstructured":"F. Li and V. Paxson. \"A Large-Scale Empirical Study of Security Patches.\" In: login Usenix Mag. 43.1 (2018).","journal-title":"login Usenix Mag."},{"key":"e_1_3_2_2_24_1","volume-title":"Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines.\" In: Proceedings of the 15th Symposium On Usable Privacy and Security (SOUPS). 08\/2019","author":"Li F.","unstructured":"F. Li, L. Rogers, A. Mathur, N. Malkin, and M. Chetty. \"Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines.\" In: Proceedings of the 15th Symposium On Usable Privacy and Security (SOUPS). 08\/2019."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","unstructured":"D. Liu S. Hao and H. Wang. \"All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records.\" In: Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security (CCS). 10\/2016. doi: 10.1145\/2976749.2978387.","DOI":"10.1145\/2976749.2978387"},{"key":"e_1_3_2_2_26_1","first-page":"6","volume-title":"The Johari Window: a graphic model of awareness in interpersonal relations.\" In: Human relations training news 5.9","author":"Luft J.","year":"1961","unstructured":"J. Luft and H. Ingham. \"The Johari Window: a graphic model of awareness in interpersonal relations.\" In: Human relations training news 5.9 (1961), pp. 6--7."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242592"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","unstructured":"W. Rweyemamu T. Lauinger C. Wilson W. Robertson and E. Kirda. \"Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research.\" In: Proceedings of the 20th Passive and Active Measurement (PAM). 03\/2019. doi: 10.1007\/978--3-030--15986--3_11.","DOI":"10.1007\/978--3-030--15986--3_11"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278574"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.52"},{"key":"e_1_3_2_2_31_1","unstructured":"N. Surribas. Wapiti: The Web Application Vulnerability Scanner. 02\/20\/2021. uRl: https:\/\/wapiti.sourceforge.io\/ (visited on 04\/30\/2021)."},{"key":"e_1_3_2_2_32_1","volume-title":"Exploring Update Behavior of System Administrators.\" In: Proceedings of the 16th Symposium On Usable Privacy and Security (SOUPS). 08\/2020","author":"Tiefenau C.","unstructured":"C. Tiefenau, M. H\u00e4ring, K. Krombholz, and E. von Zezschwitz. \"Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators.\" In: Proceedings of the 16th Symposium On Usable Privacy and Security (SOUPS). 08\/2020."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","unstructured":"F. Toffalini M. Abb\u00ed D. Carra and D. Balzarotti. \"Google Dorks: Analysis Creation and New Defenses.\" In: Proceedings of the 13th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment. 07\/2016. doi: 10.1007\/978--3--319--40667--1_13.","DOI":"10.1007\/978--3--319--40667--1_13"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","unstructured":"N. L. M. Van Adrichem A. R. Lua X. Wang M. Wasif F. Fatturrahman and F. A. Kuipers. \"DNSSEC Misconfigurations: How Incorrectly Configured Security Leads to Unreachability.\" In: Proceedings of the 3rd Joint Intelligence and Security Informatics Conference. 09\/2014. doi: 10.1109\/JISIC.2014.12.","DOI":"10.1109\/JISIC.2014.12"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"M. Vermeer J. West A. Cuevas S. Niu N. Christin M. van Eeten T. Fiebig C. Hernandez Ganan and T. Moore. \"SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations.\" In: Proceedings of the 6th IEEE European Symposium on Security & Privacy (EuroS&P). 09\/2021.","DOI":"10.1109\/EuroSP51992.2021.00037"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485367","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:48:20Z","timestamp":1763498900000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485367"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":35,"alternative-id":["10.1145\/3460120.3485367","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485367","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}