{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:00:49Z","timestamp":1750309249555,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3660354.3660355","type":"proceedings-article","created":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T22:19:09Z","timestamp":1719526749000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Honeyfile Camouflage: Hiding Fake Files in Plain Sight"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4621-3363","authenticated-orcid":false,"given":"Roelien C.","family":"Timmer","sequence":"first","affiliation":[{"name":"UNSW Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0561-7931","authenticated-orcid":false,"given":"David","family":"Liebowitz","sequence":"additional","affiliation":[{"name":"Penten, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3289-6599","authenticated-orcid":false,"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"CSIRO Data61, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1835-3475","authenticated-orcid":false,"given":"Salil S.","family":"Kanhere","sequence":"additional","affiliation":[{"name":"UNSW Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sulla determinazione empirica di una legge didistribuzione. Giorn Dell\u2019inst Ital Degli Att 4","author":"Kolmogorov An.","year":"1933","unstructured":"Kolmogorov An. 1933. Sulla determinazione empirica di una legge didistribuzione. Giorn Dell\u2019inst Ital Degli Att 4 (1933), 89\u201391."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1046920.1088718"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"volume-title":"SecureComm, Vol.\u00a019","author":"Bowen M","key":"e_1_3_2_1_4_1","unstructured":"Brian\u00a0M Bowen, Shlomo Hershkop, Angelos\u00a0D Keromytis, and Salvatore\u00a0J Stolfo. 2009. Baiting Inside Attackers Using Decoy Documents.. In SecureComm, Vol.\u00a019. Springer, 51\u201370."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 31st International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a032)","author":"Gopal Siddharth","year":"2014","unstructured":"Siddharth Gopal and Yiming Yang. 2014. Von Mises-Fisher Clustering Models. In Proceedings of the 31st International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a032), Eric\u00a0P. Xing and Tony Jebara (Eds.). PMLR, Bejing, China, 154\u2013162."},{"key":"e_1_3_2_1_6_1","volume-title":"Deception for Cyber Defence: Challenges and Opportunities. In 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 173\u2013182","author":"Liebowitz David","year":"2021","unstructured":"David Liebowitz, Surya Nepal, Kristen Moore, Cody\u00a0J Christopher, Salil\u00a0S Kanhere, David Nguyen, Roelien\u00a0C Timmer, Michael Longland, and Keerth Rathakumar. 2021. Deception for Cyber Defence: Challenges and Opportunities. In 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 173\u2013182."},{"key":"e_1_3_2_1_7_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2021.835"},{"key":"e_1_3_2_1_9_1","volume-title":"Glove: Global vectors for word representation.. In EMNLP, Vol.\u00a014. 1532\u20131543.","author":"Pennington Jeffrey","year":"2014","unstructured":"Jeffrey Pennington, Richard Socher, and Christopher\u00a0D Manning. 2014. Glove: Global vectors for word representation.. In EMNLP, Vol.\u00a014. 1532\u20131543."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0377-0427(87)90125-7"},{"key":"e_1_3_2_1_11_1","volume-title":"2005 International Conference on Intelligence Analysis","author":"Rowe C","year":"2005","unstructured":"Neil\u00a0C Rowe. 2005. Automatic detection of fake file systems. In 2005 International Conference on Intelligence Analysis. Monterey, California. Naval Postgraduate School."},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 35\u201354","author":"Salem Malek\u00a0Ben","year":"2011","unstructured":"Malek\u00a0Ben Salem and Salvatore\u00a0J Stolfo. 2011. Decoy document deployment for effective masquerade attack detection. In International Conference Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 35\u201354."},{"key":"e_1_3_2_1_13_1","volume-title":"Table for estimating the goodness of fit of empirical distributions. The annals of mathematical statistics 19, 2","author":"Smirnov Nickolay","year":"1948","unstructured":"Nickolay Smirnov. 1948. Table for estimating the goodness of fit of empirical distributions. The annals of mathematical statistics 19, 2 (1948), 279\u2013281."},{"key":"e_1_3_2_1_14_1","volume-title":"Honeypots: Catching the Insider Threat. In 19th Annual Computer Security Applications Conference, Proceedings. IEEE, 170\u2013179","author":"Spitzner Lance","year":"2003","unstructured":"Lance Spitzner. 2003. Honeypots: Catching the Insider Threat. In 19th Annual Computer Security Applications Conference, Proceedings. IEEE, 170\u2013179."},{"key":"e_1_3_2_1_15_1","volume-title":"Honeypots: Tracking Hackers. Vol.\u00a01","author":"Spitzner Lance","year":"2003","unstructured":"Lance Spitzner. 2003. Honeypots: Tracking Hackers. Vol.\u00a01. Addison-Wesley Reading."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/42411.42412"},{"volume-title":"The Cuckoo\u2019s Egg: Tracking a Spy through the Maze of Computer Espionage","author":"Stoll Clifford","key":"e_1_3_2_1_17_1","unstructured":"Clifford Stoll. 2005. The Cuckoo\u2019s Egg: Tracking a Spy through the Maze of Computer Espionage. Simon and Schuster."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2022.280"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings the cyber infrastructure protection Conference, Strategic Stud. Institute, September.","author":"Voris Jonathan","year":"2013","unstructured":"Jonathan Voris, Jill Jermyn, Angelos\u00a0D Keromytis, and Salvatore\u00a0J Stolfo. 2013. Bait and snitch: Defending computer systems with decoys. In Proceedings the cyber infrastructure protection Conference, Strategic Stud. Institute, September."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533088"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings the 16th Australian Inform. Warfare Conference, Security Research Institute","author":"Whitham Ben","year":"2014","unstructured":"Ben Whitham. 2014. Design requirements for generating deceptive content to protect document repositories. In Proceedings the 16th Australian Inform. Warfare Conference, Security Research Institute, Edith Cowan University."},{"key":"e_1_3_2_1_22_1","unstructured":"Ben Whitham. 2014. Towards a set of metrics to guide the generation of fake computer file systems. (2014)."},{"key":"e_1_3_2_1_23_1","unstructured":"Ben Whitham and David Liebowitz. 2020. Methods and systems for honeyfile creation deployment and management. https:\/\/patents.google.com\/patent\/US11330015B2"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437806"}],"event":{"name":"ASIA CCS '24: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Singapore","acronym":"ASIA CCS '24"},"container-title":["Proceedings of the 3rd ACM Workshop on the Security Implications of Deepfakes and Cheapfakes"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660354.3660355","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3660354.3660355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:56:49Z","timestamp":1750291009000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660354.3660355"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":24,"alternative-id":["10.1145\/3660354.3660355","10.1145\/3660354"],"URL":"https:\/\/doi.org\/10.1145\/3660354.3660355","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}