{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:36Z","timestamp":1750219716856,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,29]]},"DOI":"10.1145\/3600160.3604989","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:54:41Z","timestamp":1691621681000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name Notation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3227-6090","authenticated-orcid":false,"given":"Vincent","family":"Drury","sequence":"first","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6750-3190","authenticated-orcid":false,"given":"Jakob","family":"Drees","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2569-1042","authenticated-orcid":false,"given":"Ulrike","family":"Meyer","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/3313831.3376168"},{"key":"e_1_3_2_1_2_1","volume-title":"3rd Quarter","author":"APWG.","year":"2022","unstructured":"APWG. 2022. APWG Phishing Activity Trends Report, 3rd Quarter 2022. Technical Report. Anti-Phishing Working Group. https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q3_2022.pdf"},{"key":"e_1_3_2_1_3_1","volume":"196","author":"Fred\u00a0","unstructured":"Fred\u00a0J Damerau. 1964. A technique for computer detection and correction of spelling errors. Commun. ACM 7, 3 (1964).","journal-title":"J Damerau."},{"key":"e_1_3_2_1_4_1","volume-title":"SoK: a comprehensive reexamination of phishing research from the security perspective","author":"Das Avisha","year":"2019","unstructured":"Avisha Das, Shahryar Baki, Ayman El\u00a0Aassal, Rakesh Verma, and Arthur Dunbar. 2019. SoK: a comprehensive reexamination of phishing research from the security perspective. IEEE Communications Surveys & Tutorials 22, 1 (2019)."},{"doi-asserted-by":"publisher","unstructured":"Vincent Drury. 2023. Data of Phishing URL Categories and Reverse Domain Name (RDN) Studies. https:\/\/doi.org\/10.17605\/OSF.IO\/Q563M","key":"e_1_3_2_1_5_1","DOI":"10.17605\/OSF.IO"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.14722\/usec.2022.23085"},{"key":"e_1_3_2_1_7_1","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS","author":"Franz Anjuli","year":"2021","unstructured":"Anjuli Franz, Verena Zimmermann, Gregor Albrecht, Katrin Hartwig, Christian Reuter, Alexander Benlian, and Joachim Vogt. 2021. SoK: Still Plenty of Phish in the Sea\u2014A Taxonomy of User-Oriented Phishing Interventions and Avenues for Future Research. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1978942.1979244"},{"key":"e_1_3_2_1_9_1","volume-title":"Differential processing of consonants and vowels in lexical access through reading. Psychological Science 19, 12","author":"New Boris","year":"2008","unstructured":"Boris New, Ver\u00f3nica Ara\u00fajo, and Thierry Nazzi. 2008. Differential processing of consonants and vowels in lexical access through reading. Psychological Science 19, 12 (2008)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/3313831.3376298"},{"unstructured":"Richard Roberts Rachel Walter Daniela Lulli and Dave Levin. [n. d.]. .how.you.spot.whoswho.online.sucks: Deceiving Users with Generic Top-Level Domains. ([n. d.]).","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/ICDCS.2017.221"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium.","author":"Szurdi Janos","year":"2014","unstructured":"Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, and Chris Kanich. 2014. The long \u201ctaile\u201d of typosquatting domain names. In Proceedings of the 23rd USENIX Security Symposium."},{"key":"e_1_3_2_1_15_1","volume-title":"Influences of human demographics, brand familiarity and security backgrounds on homograph recognition. arXiv preprint arXiv:1904.10595","author":"Thao Tran\u00a0Phuong","year":"2019","unstructured":"Tran\u00a0Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Ayumu Kubota, Tran Van\u00a0Sang, and Rie\u00a0Shigetomi Yamaguchi. 2019. Influences of human demographics, brand familiarity and security backgrounds on homograph recognition. arXiv preprint arXiv:1904.10595 (2019)."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 28th USENIX Security Symposium.","author":"Thompson Christopher","year":"2019","unstructured":"Christopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, and Adrienne\u00a0Porter Felt. 2019. The web\u2019s identity crisis: understanding the effectiveness of website identity indicators. In Proceedings of the 28th USENIX Security Symposium."},{"key":"e_1_3_2_1_17_1","volume-title":"Spot the phish by checking the pruned URL. Information & Computer Security 24, 4","author":"Volkamer Melanie","year":"2016","unstructured":"Melanie Volkamer, Karen Renaud, and Paul Gerber. 2016. Spot the phish by checking the pruned URL. Information & Computer Security 24, 4 (2016)."}],"event":{"acronym":"ARES 2023","name":"ARES 2023: The 18th International Conference on Availability, Reliability and Security","location":"Benevento Italy"},"container-title":["Proceedings of the 18th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3604989","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600160.3604989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:13Z","timestamp":1750178173000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3604989"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":16,"alternative-id":["10.1145\/3600160.3604989","10.1145\/3600160"],"URL":"https:\/\/doi.org\/10.1145\/3600160.3604989","relation":{},"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}