{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T09:00:08Z","timestamp":1769331608010,"version":"3.49.0"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T00:00:00Z","timestamp":1749513600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T00:00:00Z","timestamp":1749513600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004063","name":"Knut and Alice Wallenberg Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,10]]},"DOI":"10.23919\/tma66427.2025.11096998","type":"proceedings-article","created":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T18:07:24Z","timestamp":1754071644000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Characterizing the Trust Dilemma: Comparing Web Security of Malicious and Benign Domains"],"prefix":"10.23919","author":[{"given":"Rebecka","family":"Lindkvist","sequence":"first","affiliation":[{"name":"Link&#x00F6;ping University,Sweden"}]},{"given":"Linn","family":"Petersson","sequence":"additional","affiliation":[{"name":"Link&#x00F6;ping University,Sweden"}]},{"given":"Carl Magnus","family":"Bruhner","sequence":"additional","affiliation":[{"name":"Link&#x00F6;ping University,Sweden"}]},{"given":"David","family":"Hasselquist","sequence":"additional","affiliation":[{"name":"Link&#x00F6;ping University,Sweden"}]},{"given":"Martin","family":"Arlitt","sequence":"additional","affiliation":[{"name":"Corelight,Canada"}]},{"given":"Niklas","family":"Carlsson","sequence":"additional","affiliation":[{"name":"Link&#x00F6;ping University,Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1089\/big.2020.0062"},{"key":"ref2","volume-title":"URLHaus","year":"2025"},{"key":"ref3","volume-title":"PhishTank","year":"2025"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime61234.2023.10485549"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3373017.3373020"},{"key":"ref7","article-title":"Compromised or attacker-owned: A large scale classification and study of hosting domains of malicious URLs","volume-title":"Proc. USENIX Security","author":"Silva","year":"2021"},{"key":"ref8","article-title":"Most visited websites","year":"2023","journal-title":"Netcraft"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278574"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00032"},{"key":"ref13","volume-title":"OpenSSL","year":"2024"},{"key":"ref14","volume-title":"testssl.sh","year":"2025"},{"key":"ref15","volume-title":"Ciphersuite info","author":"Rudolph","year":"2024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813707"},{"key":"ref17","article-title":"CVE-2013\u20130169","journal-title":"N. I. of Standards and T. (NIST)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.42"},{"key":"ref19","article-title":"CVE-2011\u20133389","journal-title":"N. I. of Standards and T. (NIST)"},{"key":"ref20","volume-title":"Here come the \u2295 ninjas","author":"Duong","year":"2011"},{"key":"ref21","article-title":"CVE-2014\u20133566","journal-title":"N. I. of Standards and T. (NIST)"},{"key":"ref22","article-title":"This POODLE bites: Exploiting the SSL 3.0 fallback","author":"M\u00f6ller","year":"2014","journal-title":"Google Security Advisory"},{"key":"ref23","article-title":"CVE-2013\u20133587","journal-title":"N. I. of Standards and T. (NIST)"},{"key":"ref24","volume-title":"BREACH: Reviving the crime attack","author":"Gluck","year":"2013"},{"key":"ref25","article-title":"CVE-2016\u20130800","journal-title":"N. I. of Standards and T. (NIST)"},{"key":"ref26","article-title":"DROWN: Breaking TLS using SSLv2","volume-title":"Proc. USENIX Security","author":"Aviram","year":"2016"},{"key":"ref27","article-title":"CVE-2016\u20136329","journal-title":"N. I. of Standards and T. (NIST)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978423"},{"key":"ref29","article-title":"CVE-2015\u20132319","journal-title":"N. I. of Standards and T. (NIST)"},{"key":"ref30","article-title":"CVE-2015\u20134000","journal-title":"N. I. of Standards and T. (NIST)"},{"key":"ref31","article-title":"Recommendation for key management: Part 1 - general (NIST SP 800\u201357 part 1 rev. 5)","volume-title":"National Institute of Standards and Technology (NIST), Tech. Rep.","author":"McKay","year":"2017"},{"key":"ref32","article-title":"Exposing the hidden web: An analysis of third-party HTTP requests on 1 million websites","author":"Libert","year":"2015","journal-title":"International Journal of Communication"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3411740.3411742"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-52r2"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987480"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2888610"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786835"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431310"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.37"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNEEE.2015.7381362"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663758"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3494108.3522769"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking62109.2024.10619717"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.5220\/0010516600002998"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00077"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453100"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2016.18"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068856"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600981"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-19274-7_20"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00045"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.23919\/TMA58422.2023.10199059"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking57963.2023.10186356"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS56607.2022.00014"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624846"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561444"},{"key":"ref58","volume-title":"Characterizing the trust dilemma: Comparing web security of malicious and benign domains (extended)","author":"Lindkvist","year":"2025"}],"event":{"name":"2025 9th Network Traffic Measurement and Analysis Conference (TMA)","location":"Copenhagen, Denmark","start":{"date-parts":[[2025,6,10]]},"end":{"date-parts":[[2025,6,13]]}},"container-title":["2025 9th Network Traffic Measurement and Analysis Conference (TMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11096977\/11096962\/11096998.pdf?arnumber=11096998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:22:35Z","timestamp":1754108555000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11096998\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,10]]},"references-count":56,"URL":"https:\/\/doi.org\/10.23919\/tma66427.2025.11096998","relation":{},"subject":[],"published":{"date-parts":[[2025,6,10]]}}}