{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T16:56:16Z","timestamp":1762102576976,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"HORIZON EUROPE Culture, Creativity and Inclusive society","doi-asserted-by":"publisher","award":["101132686"],"award-info":[{"award-number":["101132686"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589335.3651466","type":"proceedings-article","created":{"date-parts":[[2024,5,12]],"date-time":"2024-05-12T18:41:21Z","timestamp":1715539281000},"page":"782-785","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Ad Laundering: How Websites Deceive Advertisers into Rendering Ads Next to Illicit Content"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8959-2465","authenticated-orcid":false,"given":"Emmanouil","family":"Papadogiannakis","sequence":"first","affiliation":[{"name":"FORTH &amp; University of Crete, Heraklion, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1928-6534","authenticated-orcid":false,"given":"Panagiotis","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"FORTH, Heraklion, Crete, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3563-7733","authenticated-orcid":false,"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[{"name":"FORTH &amp; University of Crete, Heraklion, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5674-1698","authenticated-orcid":false,"given":"Nicolas","family":"Kourtellis","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2024. Open Source Data. https:\/\/gitlab.com\/papamano\/ad-laundering-data."},{"key":"e_1_3_2_2_2_1","unstructured":"Adalytics Research LLC. 2021. Major brands appear to be blocking ad targeting keywords. https:\/\/adalytics.io\/blog\/major-brands-appear-to-be-blocking-adtargeting- keywords."},{"key":"e_1_3_2_2_3_1","first-page":"1","article-title":"Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A Survey","volume":"19","author":"Alzghoul Jamil R.","year":"2022","unstructured":"Jamil R. Alzghoul, Emad E. Abdallah, and Abdel-hafiz S. Al-khawaldeh. 2022. Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A Survey. Journal of Applied Security Research 19, 1 (Sept. 2022), 45--69.","journal-title":"Journal of Applied Security Research"},{"key":"e_1_3_2_2_4_1","unstructured":"IAB Australia. 2023. Digital ad fraud handbook. https:\/\/iabaustralia.com.au\/ resource\/digital-ad-fraud-handbook\/."},{"volume-title":"Brand Safety: The Ultimate Guide. https:\/\/ www.bannerflow.com\/blog\/the-ultimate-guide-to-brand-safety.","year":"2023","key":"e_1_3_2_2_5_1","unstructured":"BannerFlow. 2023. Brand Safety: The Ultimate Guide. https:\/\/ www.bannerflow.com\/blog\/the-ultimate-guide-to-brand-safety."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355603"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488405"},{"key":"e_1_3_2_2_8_1","unstructured":"Kumar Chellapilla and David Maxwell Chickering. 2006. Improving Cloaking Detection using Search Query Popularity and Monetizability. In AIRWeb. 17--23."},{"key":"e_1_3_2_2_9_1","volume-title":"Deltaphish: Detecting phishing webpages in compromised websites. In Computer Security -- ESORICS","author":"Corona Igino","year":"2017","unstructured":"Igino Corona, Battista Biggio, Matteo Contini, Luca Piras, Roberto Corda, Mauro Mereu, Guido Mureddu, Davide Ariu, and Fabio Roli. 2017. Deltaphish: Detecting phishing webpages in compromised websites. In Computer Security -- ESORICS 2017. Springer, Springer International Publishing, 370--388."},{"key":"e_1_3_2_2_10_1","unstructured":"Google. 2023. See how much you could earn from AdSense. https:\/\/ adsense.google.com\/start\/#calculator."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.50"},{"key":"e_1_3_2_2_12_1","volume-title":"20th USENIX Security Symposium (USENIX Security 11)","author":"John John P","year":"2011","unstructured":"John P John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, and Martin Abadi. 2011. {deSEO}: Combating {Search-Result} Poisoning. In 20th USENIX Security Symposium (USENIX Security 11). USENIX Association, San Francisco, CA."},{"key":"e_1_3_2_2_13_1","unstructured":"Similarweb LTD. 2023. Website Traffic. https:\/\/www.similarweb.com\/."},{"key":"e_1_3_2_2_14_1","volume-title":"Workshop on the Economics of Information Security.","author":"Marotta Veronica","year":"2019","unstructured":"Veronica Marotta, Vibhanshu Abhishek, and Alessandro Acquisti. 2019. Online tracking and publishers' revenues: An empirical analysis. In Workshop on the Economics of Information Security."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2687258"},{"key":"e_1_3_2_2_16_1","unstructured":"Nadejda Milanova. 2021. Fixing the WordPress Pharma Hack. https:\/\/ stablepoint.com\/blog\/fixing-the-wordpress-pharma-hack."},{"key":"e_1_3_2_2_17_1","unstructured":"Rocky Moss and Antonio Torres. 2021. A Case Study in Monetizing Piracy. https:\/\/deepsee.io\/blog\/a-case-study-in-monetizing-piracy."},{"key":"e_1_3_2_2_18_1","unstructured":"Alexi Mostrous. 2017. Big brands fund terror through online adverts. https: \/\/www.thetimes.co.uk\/article\/big-brands-fund-terror-knnxfgb98."},{"key":"e_1_3_2_2_19_1","unstructured":"NextDNS. 2022. Piracy Blocklists. https:\/\/github.com\/nextdns\/piracy-blocklists."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491044"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512124"},{"key":"e_1_3_2_2_22_1","unstructured":"Reddit. 2020. About Chill-game or any other domains we might use in the future! https:\/\/www.reddit.com\/r\/AnimeOWL\/comments\/jth9do\/ about_chillgame_or_any_other_domains_we_might_use\/."},{"key":"e_1_3_2_2_23_1","unstructured":"Reddit. 2021. So Mangago has new sites and I have a question on if they're safe. https:\/\/www.reddit.com\/r\/mangago\/comments\/p4hmtr\/ so_mangago_has_new_sites_and_i_have_a_question_on\/."},{"key":"e_1_3_2_2_24_1","volume-title":"25th USENIX Security Symposium. 1015--1032","author":"Stock Ben","year":"2016","unstructured":"Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, and Michael Backes. 2016. Hey, you have a problem: On the feasibility of {Large-Scale} web vulnerability notification. In 25th USENIX Security Symposium. 1015--1032."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-018-0328-8"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.17"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046763"},{"key":"e_1_3_2_2_28_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zhang Mingxue","year":"2019","unstructured":"Mingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, and Xinyu Xing. 2019. All your clicks belong to me: investigating click interception on the web. In 28th USENIX Security Symposium (USENIX Security 19). 941--957."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00021"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Singapore Singapore","acronym":"WWW '24"},"container-title":["Companion Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3651466","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589335.3651466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:31:24Z","timestamp":1755822684000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3651466"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":29,"alternative-id":["10.1145\/3589335.3651466","10.1145\/3589335"],"URL":"https:\/\/doi.org\/10.1145\/3589335.3651466","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}