{"id":"https://openalex.org/W2980676478","doi":"https://doi.org/10.1145/3355369.3355587","title":"ShamFinder","display_name":"ShamFinder","publication_year":2019,"publication_date":"2019-10-18","ids":{"openalex":"https://openalex.org/W2980676478","doi":"https://doi.org/10.1145/3355369.3355587","mag":"2980676478"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3355369.3355587","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3355369.3355587","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3355369.3355587","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5105422309","display_name":"Suzuki Hiroaki","orcid":null},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"funder","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroaki Suzuki","raw_affiliation_strings":["Waseda University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Waseda University, Tokyo, Japan","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053184316","display_name":"Daiki Chiba","orcid":"https://orcid.org/0000-0002-7532-6633"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"funder","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Daiki Chiba","raw_affiliation_strings":["NTT Secure Platform Laboratories, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories, Tokyo, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077711865","display_name":"Yoshiro Yoneya","orcid":null},"institutions":[],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yoshiro Yoneya","raw_affiliation_strings":["Japan Registry Services, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Japan Registry Services, Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064493291","display_name":"Tatsuya Mori","orcid":"https://orcid.org/0000-0003-1583-4174"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"funder","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tatsuya Mori","raw_affiliation_strings":["Waseda University/NICT/RIKEN AIP, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Waseda University/NICT/RIKEN AIP, Tokyo, Japan","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108503249","display_name":"Shigeki Goto","orcid":null},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"funder","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Shigeki Goto","raw_affiliation_strings":["Waseda University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Waseda University, Tokyo, Japan","institution_ids":["https://openalex.org/I150744194"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.301,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.771049,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"449","last_page":"462"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/unicode","display_name":"Unicode","score":0.91900986},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7342887},{"id":"https://openalex.org/keywords/domain-name","display_name":"Domain name","score":0.48411357}],"concepts":[{"id":"https://openalex.org/C500551929","wikidata":"https://www.wikidata.org/wiki/Q8819","display_name":"Unicode","level":2,"score":0.91900986},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7342887},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6483172},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5233466},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.48508728},{"id":"https://openalex.org/C2988987868","wikidata":"https://www.wikidata.org/wiki/Q32635","display_name":"Domain name","level":3,"score":0.48411357},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.43067247},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.415727},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3984764},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3519577},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.16375366},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16149697},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3355369.3355587","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3355369.3355587","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3355369.3355587","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3355369.3355587","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":20,"referenced_works":["https://openalex.org/W1501503468","https://openalex.org/W1631722984","https://openalex.org/W1637101047","https://openalex.org/W1657640485","https://openalex.org/W1984816986","https://openalex.org/W1998843210","https://openalex.org/W2064076387","https://openalex.org/W2083055907","https://openalex.org/W2133665775","https://openalex.org/W2292038309","https://openalex.org/W2516482208","https://openalex.org/W2795481720","https://openalex.org/W2806944993","https://openalex.org/W2883994809","https://openalex.org/W2902942389","https://openalex.org/W2921261235","https://openalex.org/W2922040758","https://openalex.org/W2969671680","https://openalex.org/W2971250991","https://openalex.org/W2972760196"],"related_works":["https://openalex.org/W4390064265","https://openalex.org/W4225264873","https://openalex.org/W3020148863","https://openalex.org/W2969671680","https://openalex.org/W2899652169","https://openalex.org/W2768189152","https://openalex.org/W2599222874","https://openalex.org/W2547753601","https://openalex.org/W2073214876","https://openalex.org/W1989156132"],"abstract_inverted_index":{"The":[0,18],"internationalized":[1],"domain":[2,16,90],"name":[3,91],"(IDN)":[4],"is":[5,79,129,140],"a":[6,124,145,175],"mechanism":[7],"that":[8,28,179,186],"enables":[9],"us":[10],"to":[11,67,108,133,159,181],"use":[12],"Unicode":[13,21,65],"characters":[14,22,27,48],"in":[15,88,98,188],"names.":[17],"set":[19],"of":[20,26,85,101,144,165,194],"contains":[23],"several":[24],"pairs":[25],"are":[29,52,61],"visually":[30],"identical":[31,47],"with":[32],"each":[33],"other;":[34],"e.g.,":[35],"the":[36,72,82,99,141,156,163,170,183,189,192,205,209],"Latin":[37],"character":[38,43],"'a'":[39,44],"(U+0061)":[40],"and":[41,93,158],"Cyrillic":[42],"(U+0430).":[45],"Visually":[46],"such":[49,112],"as":[50,55,113],"these":[51,102],"generally":[53],"known":[54],"homoglyphs.":[56],"IDN":[57,76,86,135,167,184,210],"homograph":[58,77,211],"attacks,":[59],"which":[60,128,148],"widely":[62],"known,":[63],"abuse":[64],"homoglyphs":[66],"create":[68],"lookalike":[69],"URLs.":[70],"Although":[71],"threat":[73,100],"posed":[74],"by":[75,208],"attacks":[78,103,111],"not":[80],"new,":[81],"recent":[83],"rise":[84],"adoption":[87],"both":[89],"registries":[92],"web":[94],"browsers":[95],"has":[96],"resulted":[97],"becoming":[104],"increasingly":[105],"widespread,":[106],"leading":[107],"large-scale":[109,176],"phishing":[110],"those":[114],"targeting":[115],"cryptocurrency":[116],"exchange":[117],"companies.":[118],"In":[119],"this":[120],"work,":[121],"we":[122,173,197],"developed":[123],"framework":[125],"named":[126],"\"ShamFinder,\"":[127],"an":[130,166,201],"automated":[131],"scheme":[132],"detect":[134],"homographs.":[136],"Our":[137],"key":[138],"contribution":[139],"automatic":[142],"construction":[143],"homoglyph":[146],"database,":[147],"can":[149],"be":[150],"used":[151],"for":[152],"direct":[153],"countermeasures":[154],"against":[155,204],"attack":[157],"inform":[160],"users":[161],"about":[162],"context":[164],"homograph.":[168],"Using":[169],"ShamFinder":[171],"framework,":[172],"perform":[174],"measurement":[177],"study":[178],"aims":[180],"understand":[182],"homographs":[185],"exist":[187],"wild.":[190],"On":[191],"basis":[193],"our":[195],"approach,":[196],"provide":[198],"insights":[199],"into":[200],"effective":[202],"countermeasure":[203],"threats":[206],"caused":[207],"attack.":[212]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2980676478","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":7}],"updated_date":"2025-02-17T15:07:07.158682","created_date":"2019-10-25"}