{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T17:22:43Z","timestamp":1762104163734,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"CSCRC"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645510","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"1724-1733","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8750-3155","authenticated-orcid":false,"given":"Kevin","family":"Saric","sequence":"first","affiliation":[{"name":"QUT &amp; CSIRO Data61, Brisbane, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4122-2926","authenticated-orcid":false,"given":"Felix","family":"Savins","sequence":"additional","affiliation":[{"name":"QUT &amp; CSIRO Data61, Brisbane, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5944-1335","authenticated-orcid":false,"given":"Gowri Sankar","family":"Ramachandran","sequence":"additional","affiliation":[{"name":"QUT, Brisbane, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7517-0782","authenticated-orcid":false,"given":"Raja","family":"Jurdak","sequence":"additional","affiliation":[{"name":"QUT, Brisbane, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3289-6599","authenticated-orcid":false,"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"CSIRO Data61 &amp; CSCRC, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium (SEC '14)","author":"Alrwais Sumayah","year":"2014","unstructured":"Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, and XiaoFeng Wang. 2014. Understanding the Dark Side of Domain Parking. In Proceedings of the 23rd USENIX Conference on Security Symposium (SEC '14). USENIX Association, USA, 207--222."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.258"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169--7552(98)00110-X"},{"key":"e_1_3_2_2_5_1","unstructured":"Common Crawl. 2023. Overview. https:\/\/commoncrawl.org\/overview."},{"key":"e_1_3_2_2_6_1","unstructured":"DNIB Staff. 2023. The Domain Name Industry Brief Quarterly Report. https:\/\/dnib.com\/articles\/the-domain-name-industry-brief-q2--2023."},{"key":"e_1_3_2_2_7_1","unstructured":"Dnspython Contributors. 2020. About Dnspython | Dnspython. https:\/\/www.dnspython.org\/about\/."},{"key":"e_1_3_2_2_8_1","unstructured":"Benjamin Edelman. 2003. Large-Scale Registration of Domains with Typographical Errors. https:\/\/cyber.harvard.edu\/archived_content\/people\/edelman\/typo-domains\/."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3053064"},{"key":"e_1_3_2_2_10_1","unstructured":"ICANN. 2014. Centralized Zone Data Service (CZDS ) - ICANN. https:\/\/www.icann.org\/resources\/pages\/czds-2014-03-03-en."},{"key":"e_1_3_2_2_11_1","unstructured":"International Telecommunication Union. 2022. Facts and Figures 2022 - Internet Use. https:\/\/www.itu.int\/itu-d\/reports\/statistics\/2022\/11\/24\/ff22-internet-use."},{"key":"e_1_3_2_2_12_1","unstructured":"Internet Archive. 2023. Internet Archive : Wayback Machine. https:\/\/archive.org\/web\/."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24322"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24322"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.16"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134002"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2004.08.003"},{"key":"e_1_3_2_2_18_1","first-page":"2","article-title":"A Longitudinal Study of Web Pages Continued: A Consideration of Document Persistence. Web Documents, Half-life, Linkrot, Persistence","volume":"9","year":"2004","unstructured":"Koehler, Wallace. 2004. A Longitudinal Study of Web Pages Continued: A Consideration of Document Persistence. Web Documents, Half-life, Linkrot, Persistence, Web Citations. Information Research, Vol. 9, 2 (Jan. 2004).","journal-title":"Web Citations. Information Research"},{"key":"e_1_3_2_2_19_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Lauinger Tobias","year":"2017","unstructured":"Tobias Lauinger, Abdelberi Chaabane, Ahmet Salih Buyukkayhan, Kaan Onarlioglu, and William Robertson. 2017. Game of Registrars : An Empirical Analysis of vphantomPost-Expiration vphantom Domain Name Takeovers. In 26th USENIX Security Symposium (USENIX Security 17). 865--880."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--15986--3_12"},{"key":"e_1_3_2_2_21_1","volume-title":"Insertions and Reversals. Soviet Physics Doklady","volume":"10","author":"Levenshtein V. I.","year":"1966","unstructured":"V. I. Levenshtein. 1966. Binary Codes Capable of Correcting Deletions, Insertions and Reversals. Soviet Physics Doklady , Vol. 10 (Feb. 1966), 707."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--14577--3_15"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--14577--3_15"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--13257-0_17"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382274"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382274"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488474"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031--17143--7_9"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380124"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime51433.2020.9493251"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833609"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.84"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.221"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1184\/R1\/12766136.v1"},{"key":"e_1_3_2_2_35_1","volume-title":"Typosquatting Domain Names. In 23rd USENIX Security Symposium (USENIX Security 14)","author":"Szurdi Janos","year":"2014","unstructured":"Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, and Chris Kanich. 2014. The Long \u201cvphantomTaile \u201dvphantom of Typosquatting Domain Names. In 23rd USENIX Security Symposium (USENIX Security 14). San Diego, CA, USA, 191--206."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450071"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486271"},{"key":"e_1_3_2_2_38_1","unstructured":"Unit 42 Palo Alto Networks. 2022. 2022 Ransomware Threat Report. Technical Report. io"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Singapore Singapore","acronym":"WWW '24"},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645510","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:21:17Z","timestamp":1755822077000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645510"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":38,"alternative-id":["10.1145\/3589334.3645510","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645510","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}