Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers
暂无分享,去创建一个
Tobias Lauinger | Abdelberi Chaabane | Kaan Onarlioglu | William Robertson | Ahmet Salih Buyukkayhan
[1] Nick Feamster,et al. PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration , 2016, CCS.
[2] Wouter Joosen,et al. You are what you include: large-scale evaluation of remote javascript inclusions , 2012, CCS.
[3] Vern Paxson,et al. The BIZ Top-Level Domain: Ten Years Later , 2012, PAM.
[4] Vern Paxson,et al. Redirecting DNS for Ads and Profit , 2011, FOCI.
[5] Zhou Li,et al. Understanding the Dark Side of Domain Parking , 2014, USENIX Security Symposium.
[6] Lawrence K. Saul,et al. Who is .com?: Learning to Parse WHOIS Records , 2015, Internet Measurement Conference.
[7] S. Savage,et al. Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting , 2014 .
[8] Gianluca Stringhini,et al. Why allowing profile name reuse is a bad idea , 2016, EuroSec '16.
[9] Stefan Savage,et al. XXXtortion?: inferring registration intent in the .XXX TLD , 2014, WWW.
[10] Wouter Joosen,et al. Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse , 2015, NDSS.
[11] Georg Carle,et al. The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire , 2015, TMA.
[12] Gianluca Stringhini,et al. What's in a Name? Understanding Profile Name Reuse on Twitter , 2017, ArXiv.
[13] Michael K. Reiter,et al. Understanding domain registration abuses , 2012, Comput. Secur..
[14] Tobias Lauinger,et al. WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration , 2016, Internet Measurement Conference.
[15] He Liu,et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.
[16] Patrick D. McDaniel,et al. Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[17] Wouter Joosen,et al. Parking Sensors: Analyzing and Detecting Parked Domains , 2015, NDSS.
[18] Chris Kanich,et al. The Long "Taile" of Typosquatting Domain Names , 2014, USENIX Security Symposium.
[19] Tyler Moore,et al. Measuring the Perpetrators and Funders of Typosquatting , 2010, Financial Cryptography.
[20] Nick Feamster,et al. Understanding the domain registration behavior of spammers , 2013, Internet Measurement Conference.
[21] Lawrence K. Saul,et al. From .academy to .zone: An Analysis of the New TLD Land Rush , 2015, Internet Measurement Conference.
[22] Stefan Savage,et al. Juice: A Longitudinal Study of an SEO Botnet , 2013, NDSS.