{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T03:15:08Z","timestamp":1773717308225,"version":"3.50.1"},"reference-count":61,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836213,U19B2034"],"award-info":[{"award-number":["U1836213,U19B2034"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/eurospw55150.2022.00064","type":"proceedings-article","created":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T21:22:52Z","timestamp":1656364972000},"page":"538-545","source":"Crossref","is-referenced-by-count":6,"title":["Ethics in Security Research: Visions, Reality, and Paths Forward"],"prefix":"10.1109","author":[{"given":"Yiming","family":"Zhang","sequence":"first","affiliation":[{"name":"Tsinghua University,China"}]},{"given":"Mingxuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University,China"}]},{"given":"Mingming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University,China"}]},{"given":"Chaoyi","family":"Lu","sequence":"additional","affiliation":[{"name":"Tsinghua University,China"}]},{"given":"Haixin","family":"Duan","sequence":"additional","affiliation":[{"name":"Tsinghua University,China"}]}],"member":"263","reference":[{"key":"ref39","author":"panchenko","year":"2016","journal-title":"Website fin-gerprinting at internet scale"},{"key":"ref38","article-title":"Financial conflicts policy for s&p 2021","year":"0","journal-title":"IEEE symposium on security and privacy (S&P)"},{"key":"ref33","article-title":"Conference on Computer Vision and Pattern Recognition (CVPR)","year":"0","journal-title":"Call for papers for cvpr 2022"},{"key":"ref32","article-title":"International Joint Conference on Artificial Intelligence (IJCAI)","year":"0","journal-title":"Call for papers for ijcai 2022"},{"key":"ref31","article-title":"The Network and Distributed System Security (NDSS)","year":"2022","journal-title":"Call for papers for ndss 2022"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134082"},{"key":"ref37","article-title":"Call for papers for s&p 2021","year":"0","journal-title":"IEEE symposium on security and privacy (S&P)"},{"key":"ref36","article-title":"Call for papers for euros&p 2022","year":"0","journal-title":"IEEE symposium on security and privacy (S&P)"},{"key":"ref35","article-title":"Call for papers for esorics 2022","year":"0","journal-title":"European Symposium on Research in Computer Security (ES-ORICS)"},{"key":"ref34","article-title":"Call for papers for dsn 2022","year":"0","journal-title":"Annual IEEE\/IFIP International Conference on Dependable Systems and Networks"},{"key":"ref60","first-page":"521","author":"zhang","year":"2020","journal-title":"Lies in the Air Characterizing Fake-Base-Station Spam Ecosystem in China"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487812"},{"key":"ref28","first-page":"175","article-title":"Understanding tor usage with privacy-preserving measurement","author":"akshaya","year":"2018","journal-title":"Proceedings of the Internet Measurement Confer-ence 2018 IMC 2018"},{"key":"ref27","article-title":"Histor?: Differentially private and robust statistics collection for tor","author":"mani","year":"2017","journal-title":"NDSS"},{"key":"ref29","author":"murray","year":"1996","journal-title":"Ethical principles in university teaching"},{"key":"ref2","year":"2022","journal-title":"Survey Ethics in Security Research"},{"key":"ref1","year":"2022","journal-title":"The Chromium Projects"},{"key":"ref20","first-page":"415","article-title":"Enabling Fine-Grained permissions for augmented reality applications with rec-ognizers","author":"suman","year":"2013","journal-title":"22nd USENIX Security Symposium (USENIX Security'13) USENIX"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243815"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978310"},{"key":"ref24","first-page":"246","article-title":"if https were secure, i wouldn't need 2fa","author":"krombholz","year":"0","journal-title":"2019 IEEE Symposium on Security and Privacy (SP)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2445102"},{"key":"ref26","first-page":"2489","article-title":"Effective notification campaigns on the web: A matter of trust, framing, and support","author":"maass","year":"0","journal-title":"30th USENIX Security Symposium (USENIX Se-curity 21)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23134"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423617"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987480"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417252"},{"key":"ref58","year":"2019","journal-title":"Vulnerability disclosure FAQ"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133988"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987462"},{"key":"ref54","year":"0","journal-title":"Procedures for sensitive data destruction"},{"key":"ref53","first-page":"195","article-title":"Trafficking fraudulent accounts: The role of the under-ground market in twitter spam and abuse","author":"thomas","year":"2013","journal-title":"22nd USENIX Security Symposium (USENIX Security'13) USENIX"},{"key":"ref52","first-page":"493","author":"steffens","year":"2020","journal-title":"PMForce Systematically Analyzing PostMessage Handlers at Scale"},{"key":"ref10","first-page":"605","article-title":"ZMap: Fast internet-wide scanning and its security applications","author":"durumeric","year":"2013","journal-title":"22nd USENIX Security Symposium (USENIX Security'13) USENIX"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487836"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2896816"},{"key":"ref12","article-title":"Ekhunter: A counter-offensive toolkit for exploit kit infiltration","author":"birhanu","year":"2015","journal-title":"22nd Annual Network and Distributed System Security Symposium NDSS 2015"},{"key":"ref13","year":"2018","journal-title":"ACM Code of Ethics and Professional Conduct"},{"key":"ref14","year":"2021","journal-title":"Acm publications policy on research involving human participants and subjects"},{"key":"ref15","year":"0","journal-title":"AAAI Code of Professional Ethics and Conduct"},{"key":"ref16","article-title":"The Belmont report: ethical principles and guidelines for the protection of human subjects of research","year":"1979","journal-title":"The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978330"},{"key":"ref18","article-title":"Empirical Methods in Natural Language Processing (EMNLP)","year":"2021","journal-title":"Call for papers for emnlp 2021"},{"key":"ref19","year":"2022","journal-title":"Informed consent guide-lines & templates"},{"key":"ref4","year":"0","journal-title":"Annual Computer Security Applications Conference (ACSAC) Call for papers for acsac 2021"},{"key":"ref3","year":"2022","journal-title":"Tor Project Research Safety Board"},{"key":"ref6","year":"2019","journal-title":"Vulnerability Disclosure Policy"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298327"},{"key":"ref8","year":"0","journal-title":"Internet Measurement Conference Call for papers for imc 2022"},{"key":"ref7","year":"0","journal-title":"Internet Measurement Conference Call for papers for imc 2009"},{"key":"ref49","article-title":"Call for papers for usenix 2021","year":"2021","journal-title":"Usenix Security"},{"key":"ref9","first-page":"1571","article-title":"Boxer: Preventing fraud by scanning credit cards","author":"abi din","year":"0","journal-title":"29th USENIX Security Symposium (USENIX Security 20)"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23353"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23098"},{"key":"ref48","article-title":"Call for papers for raid 2022","year":"2022","journal-title":"Int'l Symp on Research in Attacks Intrusions and Defenses (RAID)"},{"key":"ref47","year":"2018","journal-title":"User research community in the U K Getting informed consent for user research"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"ref41","first-page":"307","article-title":"Global measurement of DNS manipulation","author":"pearce","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Se-curity 17)"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363195"},{"key":"ref43","year":"0","journal-title":"Best practices for data destruction"}],"event":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","location":"Genoa, Italy","start":{"date-parts":[[2022,6,6]]},"end":{"date-parts":[[2022,6,10]]}},"container-title":["2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9799286\/9799291\/09799391.pdf?arnumber=9799391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:18:03Z","timestamp":1658780283000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9799391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/eurospw55150.2022.00064","relation":{},"subject":[],"published":{"date-parts":[[2022,6]]}}}