{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:30Z","timestamp":1750219770638,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Hasler Foundation","award":["19024"],"award-info":[{"award-number":["19024"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583326","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:25Z","timestamp":1682551825000},"page":"2155-2165","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Empirical Study of the Usage of Checksums for Web Downloads"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7299-1286","authenticated-orcid":false,"given":"Ga\u00ebl","family":"Bernard","sequence":"first","affiliation":[{"name":"EPFL, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4784-568X","authenticated-orcid":false,"given":"R\u00e9mi","family":"Coudert","sequence":"additional","affiliation":[{"name":"Department of Information Systems, University of Lausanne, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3168-5375","authenticated-orcid":false,"given":"Bertil","family":"Chapuis","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Western Switzerland, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7147-1828","authenticated-orcid":false,"given":"K\u00e9vin","family":"Huguenin","sequence":"additional","affiliation":[{"name":"Department of Information Systems, University of Lausanne, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. Transmission hijacked again to spread malware. https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/09\/transmission-hijacked-again-to-spread-malware\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380092"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243746"},{"key":"e_1_3_2_1_4_1","unstructured":"Common Crawl. 2019. Common Crawl. https:\/\/commoncrawl.org\/"},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of the USENIX Security Symp. (USENIX Security). USENIX.","author":"Dechand Sergej","year":"2016","unstructured":"Sergej Dechand, Dominik Sch\u00fcrmann, Karoline Busse, Yasemin Acar, Sascha Fahl, and Matthew Smith. 2016. An Empirical Study of Textual Key-Fingerprint Representations. In Proc. of the USENIX Security Symp. (USENIX Security). USENIX."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0031619"},{"key":"e_1_3_2_1_7_1","unstructured":"Ghacks. 2022. Symantec says that hackers distributed a modified version of VLC and exploited it for malware attacks. https:\/\/www.ghacks.net\/2022\/04\/11\/symantec-says-that-hackers-distributed-a-modified-version-of-vlc-and-exploited-it-for-malware-attacks\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.20982\/tqmp.08.1.p023"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3436817"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052686"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24055"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410154"},{"key":"e_1_3_2_1_14_1","volume-title":"The Coding Manual for Qualitative Researchers","author":"Saldana Johnny","unstructured":"Johnny Saldana. 2021. The Coding Manual for Qualitative Researchers (4th ed ed.). SAGE Publishing, Thousand Oaks, California.","edition":"4"},{"volume-title":"Active learning literature survey. (2009)","author":"Settles Burr","key":"e_1_3_2_1_15_1","unstructured":"Burr Settles. 2009. Active learning literature survey. (2009). Publisher: University of Wisconsin-Madison Department of Computer Sciences."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2018.092474"},{"key":"e_1_3_2_1_17_1","first-page":"5","article-title":"Securing Third-party Web Resources Using Subresource Integrity Automation","volume":"4","author":"Shah N","year":"2017","unstructured":"Ronak\u00a0N Shah and Kailas\u00a0R Patil. 2017. Securing Third-party Web Resources Using Subresource Integrity Automation. International Journal on Emerging Trends in Technology 4, 2 (2017), 5. http:\/\/ijett.in\/index.php\/IJETT\/article\/view\/345","journal-title":"International Journal on Emerging Trends in Technology"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24028"},{"volume-title":"Cicada: Chinese APT group widens targeting in recent espionage activity. https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/cicada-apt10-china-ngo-government-attacks","year":"2022","key":"e_1_3_2_1_19_1","unstructured":"Symantec. 2022. Cicada: Chinese APT group widens targeting in recent espionage activity. https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/cicada-apt10-china-ngo-government-attacks"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025733"},{"key":"e_1_3_2_1_21_1","unstructured":"W3C. 2016. Subresource Integrity. https:\/\/www.w3.org\/TR\/SRI\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Xiaoyun Wang Yiqun\u00a0Lisa Yin and Hongbo Yu. 2005. Finding collisions in the full SHA-1. In Annual international cryptology conference. 17\u201336. tex.organization: Springer.","DOI":"10.1007\/11535218_2"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_2"},{"key":"e_1_3_2_1_24_1","unstructured":"Christina Warren. [n.d.]. Popular BitTorrent Client Transmission Gets Infected With Malware Again. https:\/\/gizmodo.com\/mac-bittorrent-client-transmission-gets-infected-with-m-1785957214"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12874-016-0200-9"}],"event":{"name":"WWW '23: The ACM Web Conference 2023","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Austin TX USA","acronym":"WWW '23"},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583326","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:23Z","timestamp":1750178243000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583326"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":25,"alternative-id":["10.1145\/3543507.3583326","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583326","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}