{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T12:10:12Z","timestamp":1734351012760,"version":"3.30.2"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","funder":[{"name":"National Science Foundation","award":["CNS-1941617"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,4]]},"DOI":"10.1145\/3646547.3689009","type":"proceedings-article","created":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T13:40:26Z","timestamp":1730468426000},"page":"731-738","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Panning for gold.eth: Understanding and Analyzing ENS Domain Dropcatching"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-6616-546X","authenticated-orcid":false,"given":"Muhammad","family":"Muzammil","sequence":"first","affiliation":[{"name":"Stony Brook University, Stony Brook, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7618-2870","authenticated-orcid":false,"given":"Zhengyu","family":"Wu","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3720-2215","authenticated-orcid":false,"given":"Aruna","family":"Balasubramanian","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9366-357X","authenticated-orcid":false,"given":"Nick","family":"Nikiforakis","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ENS. Ens April 2024. https:\/\/app.ens.domains\/."},{"key":"e_1_3_2_1_2_1","volume-title":"May","author":"Hernandez Ornella","year":"2024","unstructured":"Ornella Hernandez. Puma registers ens domain, changes name to puma.eth on twitter, May 2024. https:\/\/cointelegraph.com\/news\/puma-rebrands-to-pumaeth- on-twitter."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561469"},{"key":"e_1_3_2_1_4_1","volume-title":"August","author":"Lab Pragsec","year":"2024","unstructured":"Pragsec Lab. ens-dropcatching, August 2024. https:\/\/github.com\/pragseclab\/ensdropcatching."},{"key":"e_1_3_2_1_5_1","first-page":"257","volume-title":"Proceedings of the 2018World WideWeb Conference","author":"Miramirkhani Najmeh","unstructured":"Najmeh Miramirkhani, Timothy Barron, Michael Ferdman, and Nick Nikiforakis. Panning for gold.com: Understanding the dynamics of domain dropcatching. In Proceedings of the 2018World WideWeb Conference, pages 257--266."},{"key":"e_1_3_2_1_6_1","first-page":"691","volume-title":"2016 IEEE symposium on security and privacy (SP)","author":"Lever Chaz","unstructured":"Chaz Lever, Robert Walls, Yacin Nadji, David Dagon, Patrick McDaniel, and Manos Antonakakis. Domain-z: 28 registrations later measuring the exploitation of residual trust in domains. In 2016 IEEE symposium on security and privacy (SP), pages 691--706."},{"key":"e_1_3_2_1_7_1","first-page":"2130","volume-title":"2022 IEEE Symposium on Security and Privacy (SP)","author":"So Johnny","unstructured":"Johnny So, Najmeh Miramirkhani, Michael Ferdman, and Nick Nikiforakis. Domains do change their spots: Quantifying potential abuse of residual trust. In 2022 IEEE Symposium on Security and Privacy (SP), pages 2130--2144."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_3"},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"2022 APWG Symposium on Electronic Crime Research (eCrime)","author":"Randall Audrey","unstructured":"Audrey Randall,Wes Hardaker, Geoffrey M Voelker, Stefan Savage, and Aaron Schulman. The challenges of blockchain-based naming systems for malware defenders. In 2022 APWG Symposium on Electronic Crime Research (eCrime), pages 1--14."},{"key":"e_1_3_2_1_10_1","unstructured":"ENS. Ens subgraph March 2024. https:\/\/docs.ens.domains\/web\/subgraph."},{"key":"e_1_3_2_1_11_1","volume-title":"March","author":"Graph The","year":"2024","unstructured":"The Graph. The graph, March 2024. https:\/\/thegraph.com\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Etherscan. Etherscan.io March 2024. https:\/\/etherscan.io\/."},{"key":"e_1_3_2_1_13_1","first-page":"22","article-title":"Ethereum white paper","volume":"1","author":"Vitalik Buterin","year":"2013","unstructured":"Vitalik Buterin et al. Ethereum white paper. GitHub repository, 1:22--23, 2013.","journal-title":"GitHub repository"},{"key":"e_1_3_2_1_14_1","volume-title":"May","author":"Eigenmann Dean","year":"2024","unstructured":"Dean Eigenmann. Let's talk ens migration (post-mortem), May 2024. https:\/\/medium.com\/deaneigenmann\/lets-talk-ens-migration-a92d5c21df28."},{"key":"e_1_3_2_1_15_1","unstructured":"Opensea. Opensea.io April 2024. https:\/\/opensea.io\/."},{"key":"e_1_3_2_1_16_1","volume-title":"Top nft marketplaces of august","author":"Rodeck David","year":"2024","unstructured":"David Rodeck. Top nft marketplaces of august 2024, August 2024. https: \/\/www.forbes.com\/advisor\/investing\/cryptocurrency\/best-nft-marketplaces\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Opensea API. Opensea.io api April 2024. https:\/\/docs.opensea.io\/reference\/apioverview\/."},{"volume-title":"April","year":"2024","key":"e_1_3_2_1_18_1","unstructured":"Gnosis. Gnosis chain, April 2024. https:\/\/www.gnosis.io\/."},{"volume-title":"April","year":"2024","key":"e_1_3_2_1_19_1","unstructured":"Etherscan. Etherscan: Gnosis active treasury management smart contract, April 2024. https:\/\/etherscan.io\/address\/ \\0x849d52316331967b6ff1198e5e32a0eb168d039d."},{"key":"e_1_3_2_1_20_1","volume-title":"May","author":"Boey Nicholas","year":"2024","unstructured":"Nicholas Boey. Most expensive crypto domains, May 2024. https: \/\/www.coingecko.com\/research\/publications\/most-expensive-crypto-domains."},{"volume-title":"April","year":"2024","key":"e_1_3_2_1_21_1","unstructured":"Vision. Vision.io 3 letters club, April 2024. https:\/\/vision.io\/category\/3-letters."},{"volume-title":"May","year":"2024","key":"e_1_3_2_1_22_1","unstructured":"Yahoo. Ethereum usd (eth-usd), May 2024. https:\/\/nz.finance.yahoo.com\/quote\/ ETH-USD\/history\/."},{"key":"e_1_3_2_1_23_1","volume-title":"March","author":"ENS.","year":"2024","unstructured":"ENS. Ens faq: What happens if i forget to renew my name, March 2024. https:\/\/docs.ens.domains\/faq."},{"key":"e_1_3_2_1_24_1","first-page":"865","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Lauinger Tobias","year":"2017","unstructured":"Tobias Lauinger, Abdelberi Chaabane, Ahmet Salih Buyukkayhan, Kaan Onarlioglu, and William Robertson. Game of registrars: An empirical analysis of {Post-Expiration} domain name takeovers. In 26th USENIX Security Symposium (USENIX Security 17), pages 865--880, 2017."},{"key":"e_1_3_2_1_25_1","first-page":"322","volume-title":"Proceedings of the Internet Measurement Conference","author":"Lauinger Tobias","year":"2018","unstructured":"Tobias Lauinger, Ahmet S Buyukkayhan, Abdelberi Chaabane, William Robertson, and Engin Kirda. From deletion to re-registration in zero seconds: Domain registrar behaviour during the drop. In Proceedings of the Internet Measurement Conference 2018, pages 322--328."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567995"},{"key":"e_1_3_2_1_27_1","first-page":"221","volume-title":"Passive and Active Measurement: 13th International Conference, PAM 2012, Vienna, Austria, March 12--14th. Proceedings 13","author":"Halvorson Tristan","unstructured":"Tristan Halvorson, Janos Szurdi, Gregor Maier, Mark Felegyhazi, Christian Kreibich, NicholasWeaver, Kirill Levchenko, and Vern Paxson. The biz top-level domain: ten years later. In Passive and Active Measurement: 13th International Conference, PAM 2012, Vienna, Austria, March 12--14th. Proceedings 13, pages 221--230. Springer."},{"key":"e_1_3_2_1_28_1","first-page":"736","volume-title":"Proceedings of the 2012 ACM conference on Computer and communications security","author":"Nikiforakis Nick","unstructured":"Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, and Giovanni Vigna. You are what you include: large-scale evaluation of remote javascript inclusions. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 736--747."},{"key":"e_1_3_2_1_29_1","first-page":"957","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Vissers Thomas","unstructured":"Thomas Vissers, Timothy Barron, Tom Van Goethem, Wouter Joosen, and Nick Nikiforakis. The wolf of name street: Hijacking domains through their nameservers. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 957--970."},{"key":"e_1_3_2_1_30_1","first-page":"188","volume-title":"Traffic Monitoring and Analysis: 7th International Workshop, TMA 2015, Barcelona, Spain, April 21--24, 2015. Proceedings 7","author":"Schlamp Johann","unstructured":"Johann Schlamp, Josef Gustafsson, Matthias W\u00e4hlisch, Thomas C Schmidt, and Georg Carle. The abandoned side of the internet: Hijacking internet resources when domain names expire. In Traffic Monitoring and Analysis: 7th International Workshop, TMA 2015, Barcelona, Spain, April 21--24, 2015. Proceedings 7, pages 188--201. Springer."},{"key":"e_1_3_2_1_31_1","first-page":"247","volume-title":"Proceedings of the 2016 Internet Measurement Conference","author":"Lauinger Tobias","unstructured":"Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, and Engin Kirda. Whois lost in translation: (mis) understanding domain name expiration and re-registration. In Proceedings of the 2016 Internet Measurement Conference, pages 247--253."},{"key":"e_1_3_2_1_32_1","first-page":"607","volume-title":"2020 IEEE European Symposium on Security and Privacy (EuroS&P)","author":"Maroofi Sourena","unstructured":"Sourena Maroofi, Maciej Korczy'ski, Cristian Hesselman, Benoit Ampeau, and Andrzej Duda. Comar: Classification of compromised versus maliciously registered domains. In 2020 IEEE European Symposium on Security and Privacy (EuroS&P), pages 607--623."},{"key":"e_1_3_2_1_33_1","first-page":"383","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Barron Timothy","year":"2019","unstructured":"Timothy Barron, Najmeh Miramirkhani, and Nick Nikiforakis. Now You See It, Now You Don't: A Large-scale Analysis of Early Domain Deletions. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), pages 383--397."},{"key":"e_1_3_2_1_34_1","first-page":"198","volume-title":"Proceedings of the 2023 ACM on Internet Measurement Conference","author":"Liu Guannan","unstructured":"Guannan Liu, Lin Jin, Shuai Hao, Yubao Zhang, Daiping Liu, Angelos Stavrou, and HainingWang. Dial\" n\" for nxdomain: The scale, origin, and security implications of dns queries to non-existent domains. In Proceedings of the 2023 ACM on Internet Measurement Conference, pages 198--212."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879182"},{"key":"e_1_3_2_1_36_1","first-page":"538","volume-title":"2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","author":"Sommese Raffaele","unstructured":"Raffaele Sommese, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, Kimberly C Claffy, and Anna Sperotto. The forgotten side of dns: Orphan and abandoned records. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 538--543."},{"key":"e_1_3_2_1_37_1","first-page":"1568","volume-title":"Proceedings of the 2016 ACM SIGSAC conference on computer and communications security","author":"Hao Shuang","unstructured":"Shuang Hao, Alex Kantchelian, Brad Miller, Vern Paxson, and Nick Feamster. Predator: proactive recognition and elimination of domain abuse at time-ofregistration. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pages 1568--1579."},{"key":"e_1_3_2_1_38_1","first-page":"63","volume-title":"Proceedings of the 2013 conference on Internet measurement conference","author":"Hao Shuang","unstructured":"Shuang Hao, Matthew Thomas, Vern Paxson, Nick Feamster, Christian Kreibich, Chris Grier, and Scott Hollenbeck. Understanding the domain registration behavior of spammers. In Proceedings of the 2013 conference on Internet measurement conference, pages 63--76."},{"key":"e_1_3_2_1_39_1","first-page":"1414","volume-title":"Proceedings of the 2016ACM SIGSAC Conference on Computer and Communications Security","author":"Liu Daiping","unstructured":"Daiping Liu, Shuai Hao, and HainingWang. All your dns records point to us: Understanding the security threats of dangling dns records. In Proceedings of the 2016ACM SIGSAC Conference on Computer and Communications Security, pages 1414--1425."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23243"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the Symposium on Electronic Crime Research (eCrime)","author":"Muzammil Muhammad","year":"2024","unstructured":"Muhammad Muzammil, ZhengyuWu, Lalith Harisha, Brian Kondracki, and Nick Nikiforakis. Typosquatting 3.0: Characterizing Squatting in Blockchain Naming Systems. In Proceedings of the Symposium on Electronic Crime Research (eCrime), 2024."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3004727"},{"key":"e_1_3_2_1_43_1","first-page":"1","volume-title":"WEIS","volume":"1","author":"Kalodner Harry A","year":"2015","unstructured":"Harry A Kalodner, Miles Carlsten, Paul M Ellenbogen, Joseph Bonneau, and Arvind Narayanan. An empirical study of namecoin and lessons for decentralized namespace design. In WEIS, volume 1, pages 1--23, 2015."},{"key":"e_1_3_2_1_44_1","unstructured":"Muneeb Ali Jude Nelson Ryan Shea and Michael J Freedman. Blockstack: A global naming and storage system secured by blockchains. In 2016 USENIX annual technical conference (USENIX ATC) pages 181--194."},{"key":"e_1_3_2_1_45_1","first-page":"226","volume-title":"2018 14th International Conference on Network and Service Management (CNSM)","author":"Dong Yuhao","unstructured":"Yuhao Dong,Woojung Kim, and Raouf Boutaba. Bitforest: a portable and efficient blockchain-based naming system. In 2018 14th International Conference on Network and Service Management (CNSM), pages 226--232."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2023.2294759"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.08.023"},{"key":"e_1_3_2_1_48_1","first-page":"48","volume-title":"2023 Fourth International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","author":"Theoder Joshua","unstructured":"Joshua Theoder, Binusha Shabu Metharath, and Sahel Alouneh. Securing domain name systems with blockchain. In 2023 Fourth International Conference on Intelligent Data Science Technologies and Applications (IDSTA), pages 48--53."},{"key":"e_1_3_2_1_49_1","first-page":"1","volume-title":"2023 IEEE 11th Region 10 Humanitarian Technology Conference (R10-HTC)","author":"Tamhankar Apurva","unstructured":"Apurva Tamhankar, Sunita Dhavale, Arun Mishra, Balaji Rajendran, and Gopinath Palaniappan. Blockchain based decentralized technology for internet naming systems. In 2023 IEEE 11th Region 10 Humanitarian Technology Conference (R10-HTC), pages 1--6."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645459"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645566"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559342"},{"key":"e_1_3_2_1_53_1","article-title":"How information manipulation on social media influences the nft investors? behavior: A case study of goblintown. wtf","author":"Chen Hongzhou","year":"2023","unstructured":"Hongzhou Chen andWei Cai. How information manipulation on social media influences the nft investors? behavior: A case study of goblintown. wtf. IEEE Transactions on Computational Social Systems, 2023.","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3649132"},{"key":"e_1_3_2_1_55_1","first-page":"769","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Torres Christof Ferreira","unstructured":"Christof Ferreira Torres, Fiona Willi, and Shweta Shinde. Is your wallet snitching on you? an analysis on the privacy implications of web3. In 32nd USENIX Security Symposium (USENIX Security 23), pages 769--786."},{"key":"e_1_3_2_1_56_1","volume-title":"Private key vulnerabilities in browser wallets","author":"Pentinsaari Jaakko","year":"2023","unstructured":"Jaakko Pentinsaari. Private key vulnerabilities in browser wallets. 2023."},{"key":"e_1_3_2_1_57_1","first-page":"2274","volume-title":"Proceedings of the ACMWeb Conference","author":"Yan Kailun","year":"2023","unstructured":"Kailun Yan, Jilian Zhang, Xiangyu Liu, Wenrui Diao, and Shanqing Guo. Bad apples: Understanding the centralized security risks in decentralized ecosystems. In Proceedings of the ACMWeb Conference 2023, pages 2274--2283."},{"key":"e_1_3_2_1_58_1","volume-title":"Peter Snyder, and Benjamin Livshits. Security, privacy, and decentralization in web3","author":"Winter Philipp","year":"2023","unstructured":"Philipp Winter, Anna Harbluk Lorimer, Peter Snyder, and Benjamin Livshits. Security, privacy, and decentralization in web3, 2023."},{"key":"e_1_3_2_1_59_1","volume-title":"andWenrui Diao. Stealing trust: Unraveling blind message attacks in web3 authentication. arXiv preprint arXiv:2406.00523","author":"Yan Kailun","year":"2024","unstructured":"Kailun Yan, Xiaokuan Zhang, andWenrui Diao. Stealing trust: Unraveling blind message attacks in web3 authentication. arXiv preprint arXiv:2406.00523, 2024."},{"key":"e_1_3_2_1_60_1","volume-title":"Mohsen Minaei, and Mainack Mondal. Sok: Web3 recovery mechanisms. Cryptology ePrint Archive","author":"Chatzigiannis Panagiotis","year":"2023","unstructured":"Panagiotis Chatzigiannis, Konstantinos Chalkias, Aniket Kate, Easwar Vivek Mangipudi, Mohsen Minaei, and Mainack Mondal. Sok: Web3 recovery mechanisms. Cryptology ePrint Archive, 2023."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583345"}],"event":{"name":"IMC '24: ACM Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Madrid Spain","acronym":"IMC '24"},"container-title":["Proceedings of the 2024 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3646547.3689009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T11:34:21Z","timestamp":1734348861000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646547.3689009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,4]]},"references-count":61,"alternative-id":["10.1145\/3646547.3689009","10.1145\/3646547"],"URL":"https:\/\/doi.org\/10.1145\/3646547.3689009","relation":{},"subject":[],"published":{"date-parts":[[2024,11,4]]},"assertion":[{"value":"2024-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}