{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T09:48:58Z","timestamp":1743846538727},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308558.3313551","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Doppelg\u00e4ngers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services"],"prefix":"10.1145","author":[{"given":"Changhoon","family":"Yoon","sequence":"first","affiliation":[{"name":"S2W LAB Inc. and Korea Advanced Institute of Science and Technology, Republic of Korea"}]},{"given":"Kwanwoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Republic of Korea"}]},{"given":"Yongdae","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Republic of Korea"}]},{"given":"Seungwon","family":"Shin","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Republic of Korea"}]},{"given":"Sooel","family":"Son","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bitcoin Blender. http:\/\/bitblendervrfkzr.onion. Bitcoin Blender. http:\/\/bitblendervrfkzr.onion."},{"key":"e_1_3_2_1_2_1","unstructured":"Bitcoin Blender thread on Bitcoin Talk forum. https:\/\/bitcointalk.org\/index.php?topic=436467.0. Bitcoin Blender thread on Bitcoin Talk forum. https:\/\/bitcointalk.org\/index.php?topic=436467.0."},{"key":"e_1_3_2_1_3_1","unstructured":"Bitcoin Fog. http:\/\/foggeddriztrcar2.onion. Bitcoin Fog. http:\/\/foggeddriztrcar2.onion."},{"key":"e_1_3_2_1_4_1","unstructured":"Bitcoin Fog thread on Bitcoin Talk forum. https:\/\/bitcointalk.org\/index.php?topic=50037.0. Bitcoin Fog thread on Bitcoin Talk forum. https:\/\/bitcointalk.org\/index.php?topic=50037.0."},{"key":"e_1_3_2_1_5_1","unstructured":"Bitcoin Forum. https:\/\/bitcointalk.org. Bitcoin Forum. https:\/\/bitcointalk.org."},{"key":"e_1_3_2_1_6_1","unstructured":"Darknet Takedown: Authorities Shutter Online Criminal Market AlphaBay. https:\/\/www.fbi.gov\/news\/stories\/alphabay-takedown. Darknet Takedown: Authorities Shutter Online Criminal Market AlphaBay. https:\/\/www.fbi.gov\/news\/stories\/alphabay-takedown."},{"key":"e_1_3_2_1_7_1","unstructured":"DarkNetMarkets community on Reddit. https:\/\/www.reddit.com\/r\/DarkNetMarkets. DarkNetMarkets community on Reddit. https:\/\/www.reddit.com\/r\/DarkNetMarkets."},{"key":"e_1_3_2_1_8_1","unstructured":"EC2 Instance Pricing - Amazon Web Service (AWS). https:\/\/aws.amazon.com\/ec2\/pricing\/on-demand\/?nc1=hls. EC2 Instance Pricing - Amazon Web Service (AWS). https:\/\/aws.amazon.com\/ec2\/pricing\/on-demand\/?nc1=hls."},{"key":"e_1_3_2_1_9_1","unstructured":"Ethical Tor Research: Guidelines. https:\/\/blog.torproject.org\/ethical-tor-research-guidelines. Ethical Tor Research: Guidelines. https:\/\/blog.torproject.org\/ethical-tor-research-guidelines."},{"key":"e_1_3_2_1_10_1","unstructured":"FreshOnion: Tor Hidden Service Directory. http:\/\/zlal32teyptf4tvi.onion\/. FreshOnion: Tor Hidden Service Directory. http:\/\/zlal32teyptf4tvi.onion\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Google Custom Search JSON API. https:\/\/developers.google.com\/custom-search\/json-api\/v1\/overview. Google Custom Search JSON API. https:\/\/developers.google.com\/custom-search\/json-api\/v1\/overview."},{"key":"e_1_3_2_1_12_1","unstructured":"Grams The Google Of The Dark Web Has Shuttered Operations. https:\/\/www.forbes.com\/sites\/zarastone\/2017\/12\/16\/grams-the-google-of-the-dark-web-has-shuttered-operations\/#1ccbc5257624. Grams The Google Of The Dark Web Has Shuttered Operations. https:\/\/www.forbes.com\/sites\/zarastone\/2017\/12\/16\/grams-the-google-of-the-dark-web-has-shuttered-operations\/#1ccbc5257624."},{"key":"e_1_3_2_1_13_1","unstructured":"Hansa Market. https:\/\/www.deepdotweb.com\/marketplace-directory\/listing\/hansa-market\/. Hansa Market. https:\/\/www.deepdotweb.com\/marketplace-directory\/listing\/hansa-market\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Hidden Services need some love. https:\/\/blog.torproject.org\/hidden-services-need-some-love. Hidden Services need some love. https:\/\/blog.torproject.org\/hidden-services-need-some-love."},{"key":"e_1_3_2_1_15_1","unstructured":"International Raids Target Sites Selling Contraband on the Dark Web. https:\/\/www.nytimes.com\/2014\/11\/08\/world\/europe\/dark-market-websites-operation-onymous.html. International Raids Target Sites Selling Contraband on the Dark Web. https:\/\/www.nytimes.com\/2014\/11\/08\/world\/europe\/dark-market-websites-operation-onymous.html."},{"key":"e_1_3_2_1_16_1","unstructured":"Making Connections to Facebook more Secure. https:\/\/www.facebook.com\/notes\/protect-the-graph\/making-connections-to-facebook-more-secure\/1526085754298237\/. Making Connections to Facebook more Secure. https:\/\/www.facebook.com\/notes\/protect-the-graph\/making-connections-to-facebook-more-secure\/1526085754298237\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Microsoft Cognitive Services - Bing Web Search API. https:\/\/azure.microsoft.com\/en-us\/services\/cognitive-services\/bing-web-search-api\/. Microsoft Cognitive Services - Bing Web Search API. https:\/\/azure.microsoft.com\/en-us\/services\/cognitive-services\/bing-web-search-api\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Scrapy. https:\/\/scrapy.org. Scrapy. https:\/\/scrapy.org."},{"key":"e_1_3_2_1_19_1","unstructured":"Shallot. https:\/\/github.com\/katmagic\/Shallot\/. Shallot. https:\/\/github.com\/katmagic\/Shallot\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Splash - A javascript rendering service. https:\/\/splash.readthedocs.io\/en\/stable\/. Splash - A javascript rendering service. https:\/\/splash.readthedocs.io\/en\/stable\/."},{"key":"e_1_3_2_1_21_1","unstructured":"The New York Times is Now Available as a Tor Onion Service. https:\/\/open.nytimes.com\/ https-open-nytimes-com-the-new-york-times-as-a-tor-onion-service-e0d0b67b7482. The New York Times is Now Available as a Tor Onion Service. https:\/\/open.nytimes.com\/ https-open-nytimes-com-the-new-york-times-as-a-tor-onion-service-e0d0b67b7482."},{"key":"e_1_3_2_1_22_1","unstructured":"Venezuela is blocking access to the Tor network. https:\/\/www.theverge.com\/2018\/6\/25\/17503680\/venezuela-tor-blocked-web-censorship. Venezuela is blocking access to the Tor network. https:\/\/www.theverge.com\/2018\/6\/25\/17503680\/venezuela-tor-blocked-web-censorship."},{"key":"e_1_3_2_1_23_1","unstructured":"Ahmia. Ahmia: Tor Hidden Service Search Engine. https:\/\/ahmia.fi\/. Ahmia. Ahmia: Tor Hidden Service Search Engine. https:\/\/ahmia.fi\/."},{"key":"e_1_3_2_1_24_1","volume-title":"Not an'Ebay for Drugs': The Cryptomarket'Silk Road'as a Paradigm Shifting Criminal Innovation","author":"Aldridge J.","year":"2014","unstructured":"J. Aldridge and D. Decary-Hetu . Not an'Ebay for Drugs': The Cryptomarket'Silk Road'as a Paradigm Shifting Criminal Innovation . 2014 . J. Aldridge and D. Decary-Hetu. Not an'Ebay for Drugs': The Cryptomarket'Silk Road'as a Paradigm Shifting Criminal Innovation. 2014."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/add.12470"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.15"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2014.20"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371977"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the Conference on USENIX Workshop on Offensive Technologies. USENIX Association","author":"Cova M.","year":"2008","unstructured":"M. Cova , C. Kruegel , and G. Vigna . There is no free phish: An analysis of \"free\" and live phishing kits . In Proceedings of the Conference on USENIX Workshop on Offensive Technologies. USENIX Association , 2008 . M. Cova, C. Kruegel, and G. Vigna. There is no free phish: An analysis of \"free\" and live phishing kits. In Proceedings of the Conference on USENIX Workshop on Offensive Technologies. USENIX Association, 2008."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_33_1","volume-title":"Naval Research Lab Washington DC","author":"Dingledine R.","year":"2004","unstructured":"R. Dingledine , N. Mathewson , and P. Syverson . Tor: The second-generation onion router. Technical report , Naval Research Lab Washington DC , 2004 . R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. Technical report, Naval Research Lab Washington DC, 2004."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2015.01.008"},{"key":"e_1_3_2_1_35_1","volume-title":"ATOL: A Framework for Automated Analysis and Categorization of the Darkweb Ecosystem. In AAAI Workshop on Artificial Intelligence for Cyber Security (AICS). AAAI","author":"Ghosh S.","year":"2017","unstructured":"S. Ghosh , P. Porras , V. Yegneswaran , D. Ken , and N. Ariyam . ATOL: A Framework for Automated Analysis and Categorization of the Darkweb Ecosystem. In AAAI Workshop on Artificial Intelligence for Cyber Security (AICS). AAAI , 2017 . S. Ghosh, P. Porras, V. Yegneswaran, D. Ken, and N. Ariyam. ATOL: A Framework for Automated Analysis and Categorization of the Darkweb Ecosystem. In AAAI Workshop on Artificial Intelligence for Cyber Security (AICS). AAAI, 2017."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978330"},{"key":"e_1_3_2_1_37_1","unstructured":"HERMES Center for Transparency and Digital Human Rights. Tor2web: Browse the Tor Onion Services. https:\/\/tor2web.org\/. HERMES Center for Transparency and Digital Human Rights. Tor2web: Browse the Tor Onion Services. https:\/\/tor2web.org\/."},{"key":"e_1_3_2_1_38_1","unstructured":"The New Research from Northeastern University. https:\/\/blog.torproject.org\/blog\/new-research-northeastern-university. The New Research from Northeastern University. https:\/\/blog.torproject.org\/blog\/new-research-northeastern-university."},{"key":"e_1_3_2_1_39_1","unstructured":"The Invisible Internet Project (I2P). https:\/\/geti2p.net\/. The Invisible Internet Project (I2P). https:\/\/geti2p.net\/."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_1_41_1","volume-title":"Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft","author":"Jakobsson M.","unstructured":"M. Jakobsson and S. Myers . Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft . Wiley-Interscience . M. Jakobsson and S. Myers. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. Wiley-Interscience."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23288"},{"key":"e_1_3_2_1_43_1","first-page":"287","volume-title":"Proceedings of the 24th USENIX Security Symposium","author":"Kwon A.","year":"2015","unstructured":"A. Kwon , M. AlSabah , D. Lazar , M. Dacier , and S. Devadas . Circuit fingerprinting attacks: Passive deanonymization of tor hidden services . In Proceedings of the 24th USENIX Security Symposium , pages 287 - 302 . USENIX Association , 2015 . A. Kwon, M. AlSabah, D. Lazar, M. Dacier, and S. Devadas. Circuit fingerprinting attacks: Passive deanonymization of tor hidden services. In Proceedings of the 24th USENIX Security Symposium, pages 287-302. USENIX Association, 2015."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851798"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813667"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_2_1_48_1","volume-title":"Discovering phishing dropboxes using email metadata. In eCrime Researchers Summit","author":"Moore T.","year":"2012","unstructured":"T. Moore and R. Clayton . Discovering phishing dropboxes using email metadata. In eCrime Researchers Summit , 2012 . T. Moore and R. Clayton. Discovering phishing dropboxes using email metadata. In eCrime Researchers Summit, 2012."},{"key":"e_1_3_2_1_49_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . Bitcoin: A peer-to-peer electronic cash system . 2008 . S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134005"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.24"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_13"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2015.0121"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23415"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860478"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052657"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831146"},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the Conference on Large-scale Exploits and Emergent Threats. USENIX Association","author":"Stone-Gross B.","year":"2011","unstructured":"B. Stone-Gross , T. Holz , G. Stringhini , and G. Vigna . The underground economy of spam: A botmaster's perspective of coordinating large-scale spam campaigns . In Proceedings of the Conference on Large-scale Exploits and Emergent Threats. USENIX Association , 2011 . B. Stone-Gross, T. Holz, G. Stringhini, and G. Vigna. The underground economy of spam: A botmaster's perspective of coordinating large-scale spam campaigns. In Proceedings of the Conference on Large-scale Exploits and Emergent Threats. USENIX Association, 2011."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.33"},{"key":"e_1_3_2_1_61_1","volume-title":"ACM Conference on Computer and Communications Security. ACM","author":"Thomas K.","year":"2017","unstructured":"K. Thomas , F. Li , A. Zand , J. Barrett , J. Ranieri , L. Invernizzi , Y. Markov , O. Comanescu , V. Eranti , A. Moscicki , D. Margolis , V. Paxson , and E. Bursztein . Data breaches, phishing, or malware? understanding the risks of stolen credentials . In ACM Conference on Computer and Communications Security. ACM , 2017 . K. Thomas, F. Li, A. Zand, J. Barrett, J. Ranieri, L. Invernizzi, Y. Markov, O. Comanescu, V. Eranti, A. Moscicki, D. Margolis, V. Paxson, and E. Bursztein. Data breaches, phishing, or malware? understanding the risks of stolen credentials. In ACM Conference on Computer and Communications Security. ACM, 2017."},{"key":"e_1_3_2_1_62_1","volume-title":"Obscuro: A bitcoin mixer using trusted execution environments. IACR Cryptology ePrint Archive","author":"Tran M.","year":"2017","unstructured":"M. Tran , L. Luu , M. S. Kang , I. Bentov , and P. Saxena . Obscuro: A bitcoin mixer using trusted execution environments. IACR Cryptology ePrint Archive , 2017 :974, 2017. M. Tran, L. Luu, M. S. Kang, I. Bentov, and P. Saxena. Obscuro: A bitcoin mixer using trusted execution environments. IACR Cryptology ePrint Archive, 2017:974, 2017."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2013.01.005"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/eCRS.2013.6805777"}],"event":{"name":"WWW '19: The Web Conference","location":"San Francisco CA USA","acronym":"WWW '19","sponsor":["IW3C2 International World Wide Web Conference Committee"]},"container-title":["The World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308558.3313551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T06:17:35Z","timestamp":1681798655000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313551"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":64,"alternative-id":["10.1145\/3308558.3313551","10.1145\/3308558"],"URL":"https:\/\/doi.org\/10.1145\/3308558.3313551","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}