{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:39:59Z","timestamp":1743154799626,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319702773"},{"type":"electronic","value":"9783319702780"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70278-0_37","type":"book-chapter","created":{"date-parts":[[2017,11,17]],"date-time":"2017-11-17T21:03:19Z","timestamp":1510952599000},"page":"587-596","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["X-Platform Phishing: Abusing Trust for\u00a0Targeted Attacks Short Paper"],"prefix":"10.1007","author":[{"given":"Hossein","family":"Siadati","sequence":"first","affiliation":[]},{"given":"Toan","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Nasir","family":"Memon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,19]]},"reference":[{"key":"37_CR1","unstructured":"RFC 6376: DomainKeys Identified Mail (DKIM) Signatures. \nhttps:\/\/tools.ietf.org\/html\/rfc6376\n\n. Accessed 20 Dec 2016"},{"key":"37_CR2","unstructured":"Domain-based message authentication, reporting, and conformance (DMARC) (2015). \nhttps:\/\/tools.ietf.org\/html\/rfc7489\n\n. Accessed 17 Apr 2016"},{"key":"37_CR3","unstructured":"Bisson, D.: Sony Hackers Used Phishing Emails to Breach Company Networks. \nhttps:\/\/www.tripwire.com\/state-of-security\/latest-security-news\/sony-hackers-used-phishing-emails-to-breach-company-networks\/\n\n. Accessed 20 Dec 2016"},{"key":"37_CR4","unstructured":"Krebs, B.: FBI: $1.2B Lost to Business Email Scams. \nhttps:\/\/krebsonsecurity.com\/2015\/08\/fbi-1-2b-lost-to-business-email-scams\/\n\n. Accessed 20 Dec 2016"},{"key":"37_CR5","unstructured":"CBS: The phishing email that hacked the account of John Podesta. \nhttp:\/\/www.cbsnews.com\/news\/the-phishing-email-that-hacked-the-account-of-john-podesta\/\n\n. Accessed 20 Dec 2016"},{"key":"37_CR6","unstructured":"CISCO: Email Attacks: This Time Its Personal. \nhttp:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/email-security-appliance\/targeted_attacks.pdf\n\n. Accessed 20 Dec 2016"},{"key":"37_CR7","unstructured":"Geek.com: Major Open Source code repository hacked for months, says FSF. \nhttps:\/\/www.geek.com\/news\/major-open-source-code-repository-hacked-for-months-says-fsf-551344\/\n\n. Accessed 20 Dec 2016"},{"key":"37_CR8","unstructured":"Github: Mastering Markdown. \nhttps:\/\/guides.github.com\/features\/mastering-markdown\/\n\n. Accessed 20 Dec 2016"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Jung, J., Sit, E.: An empirical study of spam traffic and the use of DNS black lists. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 370\u2013375. ACM (2004)","DOI":"10.1145\/1028788.1028838"},{"key":"37_CR10","unstructured":"Kitterman, S.: Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1. \nhttps:\/\/tools.ietf.org\/html\/rfc7208\n\n. Accessed 20 Dec 2016"},{"key":"37_CR11","unstructured":"Metsis, V., Androutsopoulos, I., Paliouras, G.: Spam filtering with naive bayes-which naive bayes? In: CEAS, pp. 27\u201328 (2006)"},{"key":"37_CR12","unstructured":"Motherboard: The hack we can\u2019t see: All Signs Point to Russia Being Behind the DNC Hack. \nhttps:\/\/motherboard.vice.com\/read\/all-signs-point-to-russia-being-behind-the-dnc-hack\n\n. Accessed 20 Dec 2016"},{"key":"37_CR13","unstructured":"Palka, S., McCoy, D.: Fuzzing e-mail filters with generative grammars and n-gram analysis. In: 9th USENIX Workshop on Offensive Technologies (WOOT 2015) (2015)"},{"key":"37_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-1-4939-6457-4_5","volume-title":"Understanding Social Engineering Based Scams","author":"M Jakobsson","year":"2016","unstructured":"Jakobsson, M.: Traditional countermeasures to unwanted email. In: Jakobsson, M. (ed.) Understanding Social Engineering Based Scams, pp. 51\u201362. Springer, New York (2016). \nhttps:\/\/doi.org\/10.1007\/978-1-4939-6457-4_5"},{"key":"37_CR15","unstructured":"Symantec: Internet security threat report (ISTR) (2016). \nhttps:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-21-2016-en.pdf\n\n. Accessed 20 Dec 2016"},{"key":"37_CR16","unstructured":"Torres-Arias, S., Ammula, A.K., Curtmola, R., Cappos, J.: On omitting commits and committing omissions: preventing git metadata tampering that (re) introduces software vulnerabilities. In: 25th USENIX Security Symposium, USENIX Security, vol. 16, pp. 10\u201312 (2016)"},{"key":"37_CR17","unstructured":"Verizon: 2016 Data Breach Investigations Report. \nhttp:\/\/www.verizonenterprise.com\/resources\/reports\/rp_dbir-2016-executive-summary_xg_en.pd\n\n. Accessed 20 Dec 2016"},{"key":"37_CR18","unstructured":"Wikipedia: Github. \nhttps:\/\/en.wikipedia.org\/wiki\/Github\n\n. Accessed 20 Dec 2016"},{"key":"37_CR19","unstructured":"Wikipedia: Half a million widely trusted websites vulnerable to Heartbleed bug. \nhttps:\/\/news.netcraft.com\/archives\/2014\/04\/08\/half-a-million-widely-trusted-websites-vulnerable-to-heartbleed-bug.html\n\n. Accessed 20 Dec 2016"},{"key":"37_CR20","unstructured":"ZDNet: Anatomy of the Target data breach. \nhttp:\/\/www.zdnet.com\/article\/anatomy-of-the-target-data-breach-missed-opportunities-and-lessons-learned\/\n\n. Accessed 20 Dec 2016"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70278-0_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T03:22:01Z","timestamp":1519010521000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-70278-0_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319702773","9783319702780"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70278-0_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}