{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T13:58:31Z","timestamp":1775829511424,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100010663","name":"H2020 European Research Council","doi-asserted-by":"publisher","award":["830927"],"award-info":[{"award-number":["830927"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["OAC-2131987, CNS-1705050, and CNS-2152644"],"award-info":[{"award-number":["OAC-2131987, CNS-1705050, and CNS-2152644"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["FA8750-19-2-0004"],"award-info":[{"award-number":["FA8750-19-2-0004"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.001.031"],"award-info":[{"award-number":["628.001.031"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,25]]},"DOI":"10.1145\/3517745.3561425","type":"proceedings-article","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T21:28:36Z","timestamp":1666387716000},"page":"14-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Retroactive identification of targeted DNS infrastructure hijacking"],"prefix":"10.1145","author":[{"given":"Gautam","family":"Akiwate","sequence":"first","affiliation":[{"name":"UC San Diego"}]},{"given":"Raffaele","family":"Sommese","sequence":"additional","affiliation":[{"name":"University of Twente"}]},{"given":"Mattijs","family":"Jonker","sequence":"additional","affiliation":[{"name":"University of Twente"}]},{"given":"Zakir","family":"Durumeric","sequence":"additional","affiliation":[{"name":"Censys\/Stanford University"}]},{"given":"KC","family":"Claffy","sequence":"additional","affiliation":[{"name":"CAIDA\/UC San Diego"}]},{"given":"Geoffrey M.","family":"Voelker","sequence":"additional","affiliation":[{"name":"UC San Diego"}]},{"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[{"name":"UC San Diego"}]}],"member":"320","published-online":{"date-parts":[[2022,10,25]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363192"},{"key":"e_1_3_2_2_2_1","unstructured":"Danny Adamitis David Maynor Warren Mercer Matthew Olney and Paul Rascagneres. 2019. DNS Hijacking Abuses Trust In Core Internet Service. https:\/\/blog.talosintelligence.com\/2019\/04\/seaturtle.html.  Danny Adamitis David Maynor Warren Mercer Matthew Olney and Paul Rascagneres. 2019. DNS Hijacking Abuses Trust In Core Internet Service. https:\/\/blog.talosintelligence.com\/2019\/04\/seaturtle.html."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423623"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487816"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417864"},{"key":"e_1_3_2_2_6_1","unstructured":"Comodo Certification Authority. 2022. Comodo SSL Single DV Certificate. https:\/\/ssl.comodo.com\/comodo-ssl-dv-trial.  Comodo Certification Authority. 2022. Comodo SSL Single DV Certificate. https:\/\/ssl.comodo.com\/comodo-ssl-dv-trial."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8555"},{"key":"e_1_3_2_2_8_1","unstructured":"Tara Siegel Bernard Tiffany Hsu Nicole Perlroth and Ron Lieber. 2017. Equifax Says Cyberattack May Have Affected 143 Million in the U.S. https:\/\/www.nytimes.com\/2017\/09\/07\/business\/equifax-cyberattack.html.  Tara Siegel Bernard Tiffany Hsu Nicole Perlroth and Ron Lieber. 2017. Equifax Says Cyberattack May Have Affected 143 Million in the U.S. https:\/\/www.nytimes.com\/2017\/09\/07\/business\/equifax-cyberattack.html."},{"key":"e_1_3_2_2_9_1","volume-title":"Bamboozling Certificate Authorities with BGP. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Birge-Lee Henry","year":"2018","unstructured":"Henry Birge-Lee , Yixin Sun , Anne Edmundson , Jennifer Rexford , and Prateek Mittal . 2018 . Bamboozling Certificate Authorities with BGP. In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD, 833--849. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/birge-lee Henry Birge-Lee, Yixin Sun, Anne Edmundson, Jennifer Rexford, and Prateek Mittal. 2018. Bamboozling Certificate Authorities with BGP. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 833--849. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/birge-lee"},{"key":"e_1_3_2_2_11_1","unstructured":"CAIDA. 2020. Routeviews Prefix to AS mappings Dataset for IPv4 and IPv6. http:\/\/www.caida.org\/data\/routing\/routeviews-prefix2as.xml.  CAIDA. 2020. Routeviews Prefix to AS mappings Dataset for IPv4 and IPv6. http:\/\/www.caida.org\/data\/routing\/routeviews-prefix2as.xml."},{"key":"e_1_3_2_2_12_1","unstructured":"CAIDA. 2021. Inferred AS to Organization Mapping Dataset. https:\/\/www.caida.org\/data\/as_organizations.xml.  CAIDA. 2021. Inferred AS to Organization Mapping Dataset. https:\/\/www.caida.org\/data\/as_organizations.xml."},{"key":"e_1_3_2_2_13_1","unstructured":"CAIDA and Ian Foster. 2021. CAIDA-DNS Zone Database (DZDB). https:\/\/dzdb.caida.org.  CAIDA and Ian Foster. 2021. CAIDA-DNS Zone Database (DZDB). https:\/\/dzdb.caida.org."},{"key":"e_1_3_2_2_14_1","unstructured":"Censys. 2021. Censys Bulk Data Access. https:\/\/censys.io\/data.  Censys. 2021. Censys Bulk Data Access. https:\/\/censys.io\/data."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3507"},{"key":"e_1_3_2_2_16_1","unstructured":"Cloudflare. 2018. BGP leaks and cryptocurrencies. https:\/\/blog.cloudflare.com\/bgp-leaks-and-crypto-currencies\/.  Cloudflare. 2018. BGP leaks and cryptocurrencies. https:\/\/blog.cloudflare.com\/bgp-leaks-and-crypto-currencies\/."},{"key":"e_1_3_2_2_17_1","unstructured":"Let's Encrypt Community. 2017. Why no CRL URL in the certificate? https:\/\/community.letsencrypt.org\/t\/why-no-crl-url-in-the-certificate\/25686.  Let's Encrypt Community. 2017. Why no CRL URL in the certificate? https:\/\/community.letsencrypt.org\/t\/why-no-crl-url-in-the-certificate\/25686."},{"key":"e_1_3_2_2_18_1","volume-title":"DNS Poisoning: Developments, Attacks and Research Directions. USENIX Security","author":"Dagon David","year":"2008","unstructured":"David Dagon . 2008. DNS Poisoning: Developments, Attacks and Research Directions. USENIX Security 2008 , DNS Panel Talk . https:\/\/www.usenix.org\/legacy\/events\/sec08\/tech\/slides\/dagon_slides.pdf. David Dagon. 2008. DNS Poisoning: Developments, Attacks and Research Directions. USENIX Security 2008, DNS Panel Talk. https:\/\/www.usenix.org\/legacy\/events\/sec08\/tech\/slides\/dagon_slides.pdf."},{"key":"e_1_3_2_2_19_1","unstructured":"Matt Dahl. 2019. Widespread DNS Hijacking Activity Targets Multiple Sectors. https:\/\/www.crowdstrike.com\/blog\/widespread-dns-hijacking-activity-targets-multiple-sectors\/.  Matt Dahl. 2019. Widespread DNS Hijacking Activity Targets Multiple Sectors. https:\/\/www.crowdstrike.com\/blog\/widespread-dns-hijacking-activity-targets-multiple-sectors\/."},{"key":"e_1_3_2_2_20_1","unstructured":"Department of Homeland Security. 2019. Emergency Directive 19-01: Mitigate DNS Infrastructure Tampering. https:\/\/cyber.dhs.gov\/ed\/19-01\/.  Department of Homeland Security. 2019. Emergency Directive 19-01: Mitigate DNS Infrastructure Tampering. https:\/\/cyber.dhs.gov\/ed\/19-01\/."},{"key":"e_1_3_2_2_21_1","unstructured":"Digicert. 2021. Domain Control Validation (DCV) Methods. https:\/\/docs.digicert.com\/manage-certificates\/dv-certificate-enrollment\/domain-control-validation-dcv-methods\/#dns-txt-validation  Digicert. 2021. Domain Control Validation (DCV) Methods. https:\/\/docs.digicert.com\/manage-certificates\/dv-certificate-enrollment\/domain-control-validation-dcv-methods\/#dns-txt-validation"},{"key":"e_1_3_2_2_22_1","unstructured":"Digicert. 2022. What's The Difference Between DV OV & EV SSL Certificates? https:\/\/www.digicert.com\/difference-between-dv-ov-and-ev-ssl-certificates.  Digicert. 2022. What's The Difference Between DV OV & EV SSL Certificates? https:\/\/www.digicert.com\/difference-between-dv-ov-and-ev-ssl-certificates."},{"key":"e_1_3_2_2_23_1","unstructured":"DomainTools. 2022. Iris Investigation Platform - Passive DNS. https:\/\/www.domaintools.com\/products\/iris.  DomainTools. 2022. Iris Investigation Platform - Passive DNS. https:\/\/www.domaintools.com\/products\/iris."},{"key":"e_1_3_2_2_24_1","unstructured":"Zakir Durumeric. 2021. Censys Search 2.0. https:\/\/support.censys.io\/hc\/en-us\/articles\/360060941211-Censys-Search-2-0-Official-Announcement.  Zakir Durumeric. 2021. Censys Search 2.0. https:\/\/support.censys.io\/hc\/en-us\/articles\/360060941211-Censys-Search-2-0-Official-Announcement."},{"key":"e_1_3_2_2_25_1","unstructured":"Digital Element. 2021. NetAcuity IP Geolocation Data. https:\/\/www.digitalelement.com\/geolocation\/.  Digital Element. 2021. NetAcuity IP Geolocation Data. https:\/\/www.digitalelement.com\/geolocation\/."},{"key":"e_1_3_2_2_26_1","unstructured":"Let's Encrypt. 2021. Challenge Types - DNS-01 Challenge. https:\/\/letsencrypt.org\/docs\/challenge-types\/.  Let's Encrypt. 2021. Challenge Types - DNS-01 Challenge. https:\/\/letsencrypt.org\/docs\/challenge-types\/."},{"key":"e_1_3_2_2_27_1","unstructured":"Entrust. 2019. What is a SAN (Subject Alternative Name) and how is it used? https:\/\/www.entrust.com\/blog\/2019\/03\/what-is-a-san-and-how-is-it-used\/.  Entrust. 2019. What is a SAN (Subject Alternative Name) and how is it used? https:\/\/www.entrust.com\/blog\/2019\/03\/what-is-a-san-and-how-is-it-used\/."},{"key":"e_1_3_2_2_28_1","unstructured":"Gandi. 2022. How to Turn On Transfer Lock for a Domain. https:\/\/docs.gandi.net\/en\/domain_names\/transfer_out\/transfer_lock.html.  Gandi. 2022. How to Turn On Transfer Lock for a Domain. https:\/\/docs.gandi.net\/en\/domain_names\/transfer_out\/transfer_lock.html."},{"key":"e_1_3_2_2_29_1","unstructured":"Google. 2017. Broadening HSTS to secure more of the Web. https:\/\/security.googleblog.com\/2017\/09\/broadening-hsts-to-secure-more-of-web.html.  Google. 2017. Broadening HSTS to secure more of the Web. https:\/\/security.googleblog.com\/2017\/09\/broadening-hsts-to-secure-more-of-web.html."},{"key":"e_1_3_2_2_30_1","unstructured":"Google. 2017. Next steps toward more connection security. https:\/\/blog.chromium.org\/2017\/04\/next-steps-toward-more-connection.html.  Google. 2017. Next steps toward more connection security. https:\/\/blog.chromium.org\/2017\/04\/next-steps-toward-more-connection.html."},{"key":"e_1_3_2_2_31_1","unstructured":"Google. 2021. A safer default for navigation: HTTPS. https:\/\/blog.chromium.org\/2021\/03\/a-safer-default-for-navigation-https.html.  Google. 2021. A safer default for navigation: HTTPS. https:\/\/blog.chromium.org\/2021\/03\/a-safer-default-for-navigation-https.html."},{"key":"e_1_3_2_2_32_1","unstructured":"The Guardian. 2017. WikiLeaks hacked as OurMine group answers \"hack us\" challenge. https:\/\/www.theguardian.com\/technology\/2017\/aug\/31\/wikileaks-hacked-ourmine-group-julian-assange-dns-attack.  The Guardian. 2017. WikiLeaks hacked as OurMine group answers \"hack us\" challenge. https:\/\/www.theguardian.com\/technology\/2017\/aug\/31\/wikileaks-hacked-ourmine-group-julian-assange-dns-attack."},{"key":"e_1_3_2_2_33_1","unstructured":"Muks Hirani Sarah Jones and Ben Read. 2019. Global DNS Hijacking Campaign: DNS Record Manipulation at Scale. https:\/\/www.mandiant.com\/resources\/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.  Muks Hirani Sarah Jones and Ben Read. 2019. Global DNS Hijacking Campaign: DNS Record Manipulation at Scale. https:\/\/www.mandiant.com\/resources\/global-dns-hijacking-campaign-dns-record-manipulation-at-scale."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS53918.2021.00029"},{"key":"e_1_3_2_2_35_1","unstructured":"Brian Krebs. 2019. A Deep Dive on the Recent Widespread DNS Hijacking Attacks. https:\/\/krebsonsecurity.com\/2019\/02\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks.  Brian Krebs. 2019. A Deep Dive on the Recent Widespread DNS Hijacking Attacks. https:\/\/krebsonsecurity.com\/2019\/02\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks."},{"key":"e_1_3_2_2_36_1","unstructured":"Brian Krebs. 2020. Does your domain have a Registry Lock? https:\/\/krebsonsecurity.com\/2020\/01\/does-your-domain-have-a-registry-lock\/.  Brian Krebs. 2020. Does your domain have a Registry Lock? https:\/\/krebsonsecurity.com\/2020\/01\/does-your-domain-have-a-registry-lock\/."},{"key":"e_1_3_2_2_37_1","unstructured":"Ivan Kwiatkowski and Pierre Delcher. 2021. DarkHalo after SolarWinds: the Tomiris connection. https:\/\/securelist.com\/darkhalo-after-solarwinds-the-tomiris-connection\/104311\/.  Ivan Kwiatkowski and Pierre Delcher. 2021. DarkHalo after SolarWinds: the Tomiris connection. https:\/\/securelist.com\/darkhalo-after-solarwinds-the-tomiris-connection\/104311\/."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9162"},{"key":"e_1_3_2_2_39_1","volume-title":"Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Liu Baojun","year":"2018","unstructured":"Baojun Liu , Chaoyi Lu , Haixin Duan , Ying Liu , Zhou Li , Shuang Hao , and Min Yang . 2018 . Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path. In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD, 1113--1128. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/liu-baojun Baojun Liu, Chaoyi Lu, Haixin Duan, Ying Liu, Zhou Li, Shuang Hao, and Min Yang. 2018. Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1113--1128. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/liu-baojun"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978387"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417280"},{"key":"e_1_3_2_2_42_1","unstructured":"Robert McMillan and Dustin Volz. 2021. Suspected Russian Hack Extends Far Beyond SolarWinds Software Investigators Say. https:\/\/www.wsj.com\/articles\/suspected-russian-hack-extends-far-beyond-solarwinds-software-investigators-say-11611921601.  Robert McMillan and Dustin Volz. 2021. Suspected Russian Hack Extends Far Beyond SolarWinds Software Investigators Say. https:\/\/www.wsj.com\/articles\/suspected-russian-hack-extends-far-beyond-solarwinds-software-investigators-say-11611921601."},{"key":"e_1_3_2_2_43_1","unstructured":"Warren Mercer and Paul Rascagneres. 2018. DNSpionage Campaign Targets Middle East. https:\/\/blog.talosintelligence.com\/2018\/11\/dnspionage-campaign-targets-middle-east.html.  Warren Mercer and Paul Rascagneres. 2018. DNSpionage Campaign Targets Middle East. https:\/\/blog.talosintelligence.com\/2018\/11\/dnspionage-campaign-targets-middle-east.html."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"crossref","unstructured":"Paul Mockapetris. 1987. Domain Names - Implementation and Specification. RFC 1035. https:\/\/rfc-editor.org\/rfc\/rfc1035.txt.  Paul Mockapetris. 1987. Domain Names - Implementation and Specification. RFC 1035. https:\/\/rfc-editor.org\/rfc\/rfc1035.txt.","DOI":"10.17487\/rfc1035"},{"key":"e_1_3_2_2_45_1","unstructured":"Elizabeth Montalbano. 2022. Thousands of Malicious npm Packages Threaten Web Apps. https:\/\/threatpost.com\/malicious-npm-packages-web-apps\/178137\/.  Elizabeth Montalbano. 2022. Thousands of Malicious npm Packages Threaten Web Apps. https:\/\/threatpost.com\/malicious-npm-packages-web-apps\/178137\/."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487817"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2818"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_2_49_1","unstructured":"Rick Lamb. 2022. DNSSEC Deployment Report. http:\/\/rick.eng.br\/dnssecstat\/.  Rick Lamb. 2022. DNSSEC Deployment Report. http:\/\/rick.eng.br\/dnssecstat\/."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4033"},{"key":"e_1_3_2_2_51_1","unstructured":"Sectigo. 2022. crt.sh - Certificate Search. https:\/\/crt.sh\/.  Sectigo. 2022. crt.sh - Certificate Search. https:\/\/crt.sh\/."},{"key":"e_1_3_2_2_52_1","unstructured":"Andreas Sfakianakis. 2020. On Sea Turtle campaign targeting Greek governmental organisations. https:\/\/www.linkedin.com\/pulse\/sea-turtle-campaign-targeting-greek-governmental-andreas-sfakianakis\/.  Andreas Sfakianakis. 2020. On Sea Turtle campaign targeting Greek governmental organisations. https:\/\/www.linkedin.com\/pulse\/sea-turtle-campaign-targeting-greek-governmental-andreas-sfakianakis\/."},{"key":"e_1_3_2_2_53_1","unstructured":"Aftab Siddiqui. 2022. KlaySwap - Another BGP Hijack Targeting Crypto Wallets. https:\/\/www.manrs.org\/2022\/02\/klayswap-another-bgp-hijack-targeting-crypto-wallets\/.  Aftab Siddiqui. 2022. KlaySwap - Another BGP Hijack Targeting Crypto Wallets. https:\/\/www.manrs.org\/2022\/02\/klayswap-another-bgp-hijack-targeting-crypto-wallets\/."},{"key":"e_1_3_2_2_54_1","unstructured":"Internet Society. 2018. What Happened? The Amazon Route 53 BGP Hijack to Take Over Ethereum Cryptocurrency Wallets. https:\/\/www.internetsociety.org\/es\/blog\/2018\/04\/amazons-route-53-bgp-hijack\/.  Internet Society. 2018. What Happened? The Amazon Route 53 BGP Hijack to Take Over Ethereum Cryptocurrency Wallets. https:\/\/www.internetsociety.org\/es\/blog\/2018\/04\/amazons-route-53-bgp-hijack\/."},{"key":"e_1_3_2_2_55_1","volume-title":"Security and Privacy in Communication Networks","author":"Son Sooel","unstructured":"Sooel Son and Vitaly Shmatikov . 2010. The Hitchhiker's Guide to DNS Cache Poisoning . In Security and Privacy in Communication Networks . Springer Berlin Heidelberg , Berlin, Heidelberg , 466--483. Sooel Son and Vitaly Shmatikov. 2010. The Hitchhiker's Guide to DNS Cache Poisoning. In Security and Privacy in Communication Networks. Springer Berlin Heidelberg, Berlin, Heidelberg, 466--483."},{"key":"e_1_3_2_2_56_1","unstructured":"Cisco Talos. 2019. Sea Turtle keeps on swimming finds new victims DNS hijacking techniques. https:\/\/blog.talosintelligence.com\/2019\/07\/sea-turtle-keeps-on-swimming.html.  Cisco Talos. 2019. Sea Turtle keeps on swimming finds new victims DNS hijacking techniques. https:\/\/blog.talosintelligence.com\/2019\/07\/sea-turtle-keeps-on-swimming.html."},{"key":"e_1_3_2_2_57_1","unstructured":"The Washington Post. 2013. The New York Times Web site was taken down by DNS hijacking. Here's what that means. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/08\/27\/the-new-york-times-web-site-was-taken-down-by-dns-hijacking-heres-what-that-means\/.  The Washington Post. 2013. The New York Times Web site was taken down by DNS hijacking. Here's what that means. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/08\/27\/the-new-york-times-web-site-was-taken-down-by-dns-hijacking-heres-what-that-means\/."},{"key":"e_1_3_2_2_58_1","unstructured":"United States of America v Zhang et al. 2017. Case No 13CR3132-H Indictment (superseding). https:\/\/www.justice.gov\/opa\/press-release\/file\/1106491\/download.  United States of America v Zhang et al. 2017. Case No 13CR3132-H Indictment (superseding). https:\/\/www.justice.gov\/opa\/press-release\/file\/1106491\/download."},{"key":"e_1_3_2_2_59_1","unstructured":"Verisign. 2022. Registry Lock Service. https:\/\/www.verisign.com\/en_US\/channel-resources\/domain-registry-products\/registry-lock\/index.xhtml.  Verisign. 2022. Registry Lock Service. https:\/\/www.verisign.com\/en_US\/channel-resources\/domain-registry-products\/registry-lock\/index.xhtml."},{"key":"e_1_3_2_2_60_1","volume-title":"Investigations Report","year":"2021","unstructured":"Verizon. 2021. Data Breach Investigations Report 2021 . https:\/\/enterprise.verizon.com\/resources\/reports\/2021-data-breach-investigations-report.pdf. Verizon. 2021. Data Breach Investigations Report 2021. https:\/\/enterprise.verizon.com\/resources\/reports\/2021-data-breach-investigations-report.pdf."},{"key":"e_1_3_2_2_61_1","unstructured":"VirusTotal. 2021. VirusTotal update_mfa.exe Details. https:\/\/www.virustotal.com\/gui\/file\/8900cf88a91fa4fbe871385c8747c7097537f1b5f4a003418d84c01dc383dd75\/.  VirusTotal. 2021. VirusTotal update_mfa.exe Details. https:\/\/www.virustotal.com\/gui\/file\/8900cf88a91fa4fbe871385c8747c7097537f1b5f4a003418d84c01dc383dd75\/."},{"key":"e_1_3_2_2_62_1","unstructured":"Dustin Volz. 2019. DNC Says Russia Tried to Hack Into its Computer Network Days After 2018 Midterms. https:\/\/www.wsj.com\/articles\/dnc-says-russia-tried-to-hack-into-its-computer-network-days-after-2018-midterms-11547831410.  Dustin Volz. 2019. DNC Says Russia Tried to Hack Into its Computer Network Days After 2018 Midterms. https:\/\/www.wsj.com\/articles\/dnc-says-russia-tried-to-hack-into-its-computer-network-days-after-2018-midterms-11547831410."},{"key":"e_1_3_2_2_64_1","unstructured":"Florian Weimer. 2005. Passive DNS Replication. https:\/\/www.first.org\/conference\/2005\/papers\/florian-weimer-paper-1.pdf.  Florian Weimer. 2005. Passive DNS Replication. https:\/\/www.first.org\/conference\/2005\/papers\/florian-weimer-paper-1.pdf."}],"event":{"name":"IMC '22: ACM Internet Measurement Conference","location":"Nice France","acronym":"IMC '22","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 22nd ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517745.3561425","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517745.3561425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:16Z","timestamp":1750182556000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,25]]},"references-count":62,"alternative-id":["10.1145\/3517745.3561425","10.1145\/3517745"],"URL":"https:\/\/doi.org\/10.1145\/3517745.3561425","relation":{},"subject":[],"published":{"date-parts":[[2022,10,25]]},"assertion":[{"value":"2022-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}