{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:41:20Z","timestamp":1755823280223,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"The Irwin Mark and Joan Klein Jacobs Chair in Information and Computer Science"},{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2152644"],"award-info":[{"award-number":["CNS-2152644"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"The CSE Professorship in Internet Privacy and\/or Internet Data Security"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645499","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"1702-1711","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Unfiltered: Measuring Cloud-based Email Filtering Bypasses"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0075-457X","authenticated-orcid":false,"given":"Sumanth","family":"Rao","sequence":"first","affiliation":[{"name":"UC San Diego, La Jolla, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4288-8485","authenticated-orcid":false,"given":"Enze","family":"Liu","sequence":"additional","affiliation":[{"name":"UC San Diego, La Jolla, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4216-951X","authenticated-orcid":false,"given":"Grant","family":"Ho","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0865-7499","authenticated-orcid":false,"given":"Geoffrey M.","family":"Voelker","sequence":"additional","affiliation":[{"name":"UC San Diego, La Jolla, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6617-8029","authenticated-orcid":false,"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[{"name":"UC San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052812.1052822"},{"key":"e_1_3_2_2_2_1","volume-title":"How attackers bypass third-party mail filtering to Office 365. (Nov","author":"Akers Tony","year":"2018","unstructured":"Tony Akers. 2018. How attackers bypass third-party mail filtering to Office 365. (Nov. 2018). https:\/\/practical365.com\/how-to-ensure-your-third-party-filtering-gateway-is-secure"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241275"},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of the 32nd USENIX Security Symposium","author":"Ishtiaq Ashiq Md.","year":"2023","unstructured":"Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig, and Taejoong Chung. 2023. You've Got Report: Measurement and Security Implications of DMARC Reporting. In Proceedings of the 32nd USENIX Security Symposium. Anaheim, CA, USA, 4123--4137."},{"volume-title":"2023 a. Email Security Gateway. (Sept","year":"2023","key":"e_1_3_2_2_5_1","unstructured":"Barracuda. 2023 a. Email Security Gateway. (Sept. 2023). https:\/\/www.barracuda.com\/products\/email-protection\/email-security-gateway"},{"volume-title":"2023 b. How to Configure Microsoft 365 for Inbound and Outbound Mail. (Feb","year":"2023","key":"e_1_3_2_2_6_1","unstructured":"Barracuda. 2023 b. How to Configure Microsoft 365 for Inbound and Outbound Mail. (Feb. 2023). https:\/\/campus.barracuda.com\/product\/emailgatewaydefense\/doc\/96022752\/step-2-configure-microsoft-365-for-inbound-and-outbound-mail\/."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561468"},{"key":"e_1_3_2_2_9_1","volume-title":"Proceedings of the 29th USENIX Security Symposium. Virtual Event, 2183--2199","author":"Chen Jianjun","year":"2020","unstructured":"Jianjun Chen, Vern Paxson, and Jian Jiang. 2020. Composition Kills: A Case Study of Email Sender Authentication. In Proceedings of the 29th USENIX Security Symposium. Virtual Event, 2183--2199."},{"volume-title":"Configure Microsoft 365 with Secure Email. (Dec","year":"2022","key":"e_1_3_2_2_10_1","unstructured":"Cisco. 2022. Configure Microsoft 365 with Secure Email. (Dec. 2022). https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/security\/cloud-email-security\/214812-configuring-office-365-microsoft-with.html."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624827"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494868"},{"volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS)","author":"Durumeric Zakir","key":"e_1_3_2_2_13_1","unstructured":"Zakir Durumeric, David Adrian, Ariana Mirian, Michael Bailey, and J. Alex Halderman. 2015a. A Search Engine Backed by Internet-Wide Scanning. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS). Denver, Colorado, USA, 542--553."},{"volume-title":"Proceedings of the 2015 Internet Measurement Conference (IMC)","author":"Durumeric Zakir","key":"e_1_3_2_2_14_1","unstructured":"Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Elie Bursztein, Nicolas Lidzborski, Kurt Thomas, Vijay Eranti, Michael Bailey, and J. Alex Halderman. 2015b. Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security. In Proceedings of the 2015 Internet Measurement Conference (IMC). Tokyo, Japan, 27--39."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0044"},{"volume-title":"Q2","year":"2023","key":"e_1_3_2_2_16_1","unstructured":"Forrester. 2023. The Forrester Wave: Enterprise Email Security, Q2 2023. (June 2023). https:\/\/reprints2.forrester.com\/#\/assets\/2\/108\/RES178496\/report"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813607"},{"key":"e_1_3_2_2_18_1","volume-title":"Fix: gsuite username is a reserved word Error (postmaster, abuse email). (May","author":"Ghosh Abhishek","year":"2019","unstructured":"Abhishek Ghosh. 2019. Fix: gsuite username is a reserved word Error (postmaster, abuse email). (May 2019). https:\/\/ thecustomizewindows.com\/2019\/05\/fix-gsuite-username- is-a-reserved-word-error-postmaster-abuse-email\/."},{"key":"e_1_3_2_2_19_1","unstructured":"Google. 2022. About CrUX. (June 2022). https:\/\/developer.chrome.com\/docs\/crux\/about\/"},{"volume-title":"Handling reports of abuse and technical issues. (May","year":"2023","key":"e_1_3_2_2_20_1","unstructured":"Google. 2023. Handling reports of abuse and technical issues. (May 2023). https:\/\/support.google.com\/a\/answer\/33389"},{"key":"e_1_3_2_2_21_1","volume-title":"Secure Email -- Market Quadrant","author":"The Radicati Group","year":"2023","unstructured":"The Radicati Group. 2023. Secure Email -- Market Quadrant 2023. (March 2023). https:\/\/docs.broadcom.com\/doc\/radicati-secure-email-market-quadrant-2023"},{"key":"e_1_3_2_2_22_1","volume-title":"Google Workspace Rejecting Sophos Setup Messages (and other important messages). (Jan","author":"Hoeft Justin","year":"2021","unstructured":"Justin Hoeft. 2021. Google Workspace Rejecting Sophos Setup Messages (and other important messages). (Jan. 2021). https:\/\/community.sophos.com\/sophos-email\/f\/discussions\/133526\/google-workspace-rejecting-sophos-setup-messages-and-other-important-messages"},{"key":"e_1_3_2_2_23_1","volume-title":"TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication. arXiv preprint arXiv:1511.00341","author":"Holz Ralph","year":"2015","unstructured":"Ralph Holz, Johanna Amann, Olivier Mehani, Matthias Wachs, and Mohamed Ali Kaafar. 2015. TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication. arXiv preprint arXiv:1511.00341 (2015)."},{"key":"e_1_3_2_2_24_1","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC)","author":"Holzbauer Florian","year":"2022","unstructured":"Florian Holzbauer, Johanna Ullrich, Martina Lindorfer, and Tobias Fiebig. 2022. Not that Simple: Email Delivery in the 21st Century. In 2022 USENIX Annual Technical Conference (USENIX ATC). Carlsbad, CA, USA, 295--308."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277285"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561434"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"S. Kitterman. 2014. Sender Policy Framework (SPF) for Authorizing Use of Domains in Email Version 1. RFC 7208. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc7208.txt http:\/\/www.rfc-editor.org\/rfc\/rfc7208.txt.","DOI":"10.17487\/rfc7208"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC5321"},{"volume-title":"How to Whitelist by IP Address in Google Workspace. (Oct","year":"2023","key":"e_1_3_2_2_29_1","unstructured":"KnowBe4. 2023. How to Whitelist by IP Address in Google Workspace. (Oct. 2023). https:\/\/support.knowbe4.com\/hc\/en-us\/articles\/115002797527-Whitelisting-by-IP-Address-in-Google-Workspace."},{"key":"e_1_3_2_2_30_1","volume-title":"Proceedings of the 31st USENIX Security Symposium","author":"Lee Hyeonmin","year":"2022","unstructured":"Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz M\u00fcller, Roland van Rijswijk-Deij, Taekyoung \"Ted\" Kwon, and Taejoong Chung. 2022. Under the Hood of DANE Mismanagement in SMTP. Proceedings of the 31st USENIX Security Symposium. Boston, MA, USA, 1--16."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489247"},{"key":"e_1_3_2_2_32_1","volume-title":"Proceedings of the 25th USENIX Security Symposium","author":"Li Frank","year":"2016","unstructured":"Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael Bailey, Damon McCoy, Stefan Savage, and Vern Paxson. 2016. You've Got Vulnerability: Exploring Effective Vulnerability Notifications. In Proceedings of the 25th USENIX Security Symposium. Austin, TX, USA, 1033--1050."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00030"},{"volume-title":"Proceedings of the 21st ACM Internet Measurement Conference (IMC). Virtual Event, 122--136","author":"Liu Enze","key":"e_1_3_2_2_34_1","unstructured":"Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, and Geoffrey M. Voelker. 2021. Who's Got Your Mail? Characterizing Mail Service Provider Usage. In Proceedings of the 21st ACM Internet Measurement Conference (IMC). Virtual Event, 122--136."},{"key":"e_1_3_2_2_35_1","volume-title":"Shue","author":"Liu Yu","year":"2019","unstructured":"Yu Liu, Matthew R. Squires, Curtis R. Taylor, Robert J. Walls, and Craig A. Shue. 2019. Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks. In Security and Privacy in Communication Networks, , Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, and Aziz Mohaisen (Eds.). Cham, 26--46."},{"key":"e_1_3_2_2_36_1","unstructured":"Zoho Mail. 2023. Spam Control Guidelines and Best Practices. (2023). https:\/\/www.zoho.com\/mail\/help\/guidelines-spam-control.html"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.11"},{"volume-title":"External Domain Name System records for Office 365. (Dec","year":"2022","key":"e_1_3_2_2_38_1","unstructured":"Microsoft. 2022. External Domain Name System records for Office 365. (Dec. 2022). https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/enterprise\/external-domain-name-system-records"},{"volume-title":"2023 a. Configure mail flow using connectors in Exchange Online. (May","year":"2023","key":"e_1_3_2_2_39_1","unstructured":"Microsoft. 2023 a. Configure mail flow using connectors in Exchange Online. (May 2023). https:\/\/learn.microsoft.com\/en-us\/exchange\/mail-flow-best-practices\/use-connectors-to-configure-mail-flow\/use-connectors-to-configure-mail-flow"},{"volume-title":"2023 b. How to set up a multifunction device or application to send email using Microsoft 365 or Office 365. (March","year":"2023","key":"e_1_3_2_2_40_1","unstructured":"Microsoft. 2023 b. How to set up a multifunction device or application to send email using Microsoft 365 or Office 365. (March 2023). https:\/\/learn.microsoft.com\/en-us\/exchange\/mail-flow-best-practices\/ how-to-set-up-a-multifunction-device-or-application-to-send- email-using-microsoft-365-or-office-365."},{"volume-title":"2023 c. Mail flow rules (transport rules) in Exchange Online. (Feb","year":"2023","key":"e_1_3_2_2_41_1","unstructured":"Microsoft. 2023 c. Mail flow rules (transport rules) in Exchange Online. (Feb. 2023). https:\/\/learn.microsoft.com\/en-us\/exchange\/security-and-compliance\/mail-flow-rules\/mail-flow-rules"},{"volume-title":"2023 d. Manage mail flow using a third-party cloud service with Exchange Online. (Feb","year":"2023","key":"e_1_3_2_2_42_1","unstructured":"Microsoft. 2023 d. Manage mail flow using a third-party cloud service with Exchange Online. (Feb. 2023). https:\/\/learn.microsoft.com\/en-us\/exchange\/mail-flow-best-practices\/manage-mail-flow-using-third-party-cloud"},{"volume-title":"2023 e. Office 365 URLs and IP address ranges. (April","year":"2023","key":"e_1_3_2_2_43_1","unstructured":"Microsoft. 2023 e. Office 365 URLs and IP address ranges. (April 2023). https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/enterprise\/urls-and-ip-address-ranges?view=o365-worldwide"},{"volume-title":"2023 f. Set up connectors for secure mail flow with a partner organization in Exchange Online. (Feb","year":"2023","key":"e_1_3_2_2_44_1","unstructured":"Microsoft. 2023 f. Set up connectors for secure mail flow with a partner organization in Exchange Online. (Feb. 2023). https:\/\/learn.microsoft.com\/en-us\/exchange\/mail-flow-best-practices\/use-connectors-to-configure-mail-flow\/set-up-connectors-for-secure-mail-flow-with-a-partner."},{"volume-title":"2023 g. Use Directory-Based Edge Blocking to reject messages sent to invalid recipients in Exchange Online. (Feb","year":"2023","key":"e_1_3_2_2_45_1","unstructured":"Microsoft. 2023 g. Use Directory-Based Edge Blocking to reject messages sent to invalid recipients in Exchange Online. (Feb. 2023). https:\/\/learn.microsoft.com\/en-us\/exchange\/mail-flow-best-practices\/use-directory-based-edge-blocking."},{"volume-title":"2023 a. Email Security Cloud Gateway -- Connect Process -- Office 365 mail lockdown. (March","year":"2023","key":"e_1_3_2_2_46_1","unstructured":"Mimecast. 2023 a. Email Security Cloud Gateway -- Connect Process -- Office 365 mail lockdown. (March 2023). https:\/\/community.mimecast.com\/s\/article\/email-security-cloud-gateway-connect-process-0365-mail-lockdown."},{"volume-title":"2023 b. Email Security Cloud Gateway -- Setting Up Your Inbound Email. (March","year":"2023","key":"e_1_3_2_2_47_1","unstructured":"Mimecast. 2023 b. Email Security Cloud Gateway -- Setting Up Your Inbound Email. (March 2023). https:\/\/community.mimecast.com\/s\/article\/email-security-cloud-gateway-setting-up-your-inbound-email."},{"volume-title":"How to find Microsoft 365 MX record. (Aug","year":"2023","key":"e_1_3_2_2_48_1","unstructured":"o365info. 2023. How to find Microsoft 365 MX record. (Aug. 2023). https:\/\/o365info.com\/microsoft-365-mx-record\/"},{"key":"e_1_3_2_2_49_1","volume-title":"The answer to life, the universe, and everything offensive security. (Sept","author":"Pearce Will","year":"2019","unstructured":"Will Pearce and Nick Landers. 2019. The answer to life, the universe, and everything offensive security. (Sept. 2019). https:\/\/github.com\/moohax\/Talks\/blob\/master\/slides\/DerbyCon19.pdf"},{"key":"e_1_3_2_2_50_1","volume-title":"Proceedings of the 30th USENIX Security Symposium. Virtual Event, 4365--4382","author":"Poddebniak Damian","year":"2021","unstructured":"Damian Poddebniak, Fabian Ising, Hanno B\u00f6ck, and Sebastian Schinzel. 2021. Why TLS is Better Without STARTTLS: A Security Analysis of STARTTLS in the Email Context. In Proceedings of the 30th USENIX Security Symposium. Virtual Event, 4365--4382."},{"volume-title":"2023 a. Configuring Google Workspace (Gsuite) for Proofpoint Essentials. (May","year":"2023","key":"e_1_3_2_2_51_1","unstructured":"Proofpoint. 2023 a. Configuring Google Workspace (Gsuite) for Proofpoint Essentials. (May 2023). https:\/\/help.proofpoint.com\/Proofpoint_Essentials\/Email_Security\/Administrator_Topics\/hostedemailservices\/Configuring_Google_Workspace_(Gsuite)_for_Proofpoint_Essentials"},{"volume-title":"2023 b. Configuring Microsoft 365 for Proofpoint Essentials. (March","year":"2023","key":"e_1_3_2_2_52_1","unstructured":"Proofpoint. 2023 b. Configuring Microsoft 365 for Proofpoint Essentials. (March 2023). https:\/\/web.archive.org\/web\/20230328135954\/https:\/\/help.proofpoint.com\/Proofpoint_Essentials\/Email_Security\/Administrator_Topics\/hostedemailservices\/Configuring_Microsoft_365_for_Proofpoint_Essentials"},{"volume-title":"2023 c. Email Protection Solutions - Secure Email Provider. (Sept","year":"2023","key":"e_1_3_2_2_53_1","unstructured":"Proofpoint. 2023 c. Email Protection Solutions - Secure Email Provider. (Sept. 2023). https:\/\/www.proofpoint.com\/us\/products\/email-security-and-protection\/email-protection"},{"key":"e_1_3_2_2_54_1","volume-title":"Performance Comparison of Anti-Spam Technology Using Confusion Matrix Classification. In IOP Conference Series: Materials Science and Engineering","volume":"879","author":"Rahmad F","year":"2020","unstructured":"F Rahmad, Y Suryanto, and K Ramli. 2020. Performance Comparison of Anti-Spam Technology Using Confusion Matrix Classification. In IOP Conference Series: Materials Science and Engineering, Vol. 879. 012076."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616629"},{"key":"e_1_3_2_2_56_1","volume-title":"Using SPF Macros to Solve the Operational Challenges of SPF. (10","author":"Scaife Jamie","year":"2023","unstructured":"Jamie Scaife. 2023. Using SPF Macros to Solve the Operational Challenges of SPF. (10 2023). https:\/\/www.jamieweb.net\/blog\/using-spf-macros-to-solve-the-operational-challenges-of-spf\/"},{"key":"e_1_3_2_2_57_1","volume-title":"Proceedings of the 30th USENIX Security Symposium. Virtual Event, 3201--3217","author":"Shen Kaiwen","year":"2021","unstructured":"Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, and Min Yang. 2021. Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks. In Proceedings of the 30th USENIX Security Symposium. Virtual Event, 3201--3217."},{"key":"e_1_3_2_2_58_1","unstructured":"Sophos. 2023. Configure Microsoft 365. (March 2023). https:\/\/docs.sophos.com\/central\/customer\/help\/en-us\/ManageYourProducts\/EmailSecurity\/SophosGateway\/ExternalServices\/ConfigureM365\/index.html"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833755"},{"key":"e_1_3_2_2_60_1","volume-title":"Configuring Google Workspace (Gsuite) for Proofpoint Essentials. (April","author":"Support Vircom","year":"2023","unstructured":"Vircom Support. 2023. Configuring Google Workspace (Gsuite) for Proofpoint Essentials. (April 2023). https:\/\/vircomhelp.freshdesk.com\/support\/solutions\/articles\/48001171784-configuring-google-workspace-gsuite-for-proofpoint-essentials."},{"key":"e_1_3_2_2_61_1","volume-title":"How to configure Microsoft 365 to only accept mail from third-party spam filter. (May","author":"Tajran Ali","year":"2023","unstructured":"Ali Tajran. 2023. How to configure Microsoft 365 to only accept mail from third-party spam filter. (May 2023). https:\/\/www.alitajran.com\/only-accept-from-third-party-spam-filter."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471842"},{"volume-title":"Adding Office 365 Inbound Connectors. (Oct","year":"2023","key":"e_1_3_2_2_63_1","unstructured":"TrendMicro. 2023. Adding Office 365 Inbound Connectors. (Oct. 2023). https:\/\/success.trendmicro.com\/dcx\/s\/solution\/000250836-trend-micro-email-security-integration-with-microsoft-office-365."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2558918"},{"key":"e_1_3_2_2_65_1","volume-title":"Proceedings of the 31st USENIX Security Symposium","author":"Wang Chuhan","year":"2022","unstructured":"Chuhan Wang, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, and Qingfeng Pan. 2022. A Large-scale and Longitudinal Measurement Study of DKIM Deployment. In Proceedings of the 31st USENIX Security Symposium. Boston, MA, USA, 1185--1201."},{"volume-title":"Bounce message. (May","year":"2023","key":"e_1_3_2_2_66_1","unstructured":"Wikipedia. 2023. Bounce message. (May 2023). https:\/\/en.wikipedia.org\/wiki\/Bounce_message"},{"key":"e_1_3_2_2_67_1","volume-title":"How to access your Google Workplace's postmaster@ inbox. (May","author":"Willows Sophia","year":"2023","unstructured":"Sophia Willows. 2023. How to access your Google Workplace's postmaster@ inbox. (May 2023). https:\/\/sophiabits.com\/blog\/how-to-access-google-postmaster-email"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Singapore Singapore","acronym":"WWW '24"},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645499","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:27:12Z","timestamp":1755822432000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645499"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":67,"alternative-id":["10.1145\/3589334.3645499","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645499","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}