{"id":"https://openalex.org/W4402955699","doi":"https://doi.org/10.1145/3678890.3678918","title":"Encrypted Endpoints: Defending Online Services from Illegitimate Bot Automation","display_name":"Encrypted Endpoints: Defending Online Services from Illegitimate Bot Automation","publication_year":2024,"publication_date":"2024-09-29","ids":{"openalex":"https://openalex.org/W4402955699","doi":"https://doi.org/10.1145/3678890.3678918"},"language":"en","primary_location":{"id":"doi:10.1145/3678890.3678918","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3678890.3678918","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029633305","display_name":"Richard See","orcid":"https://orcid.org/0009-0003-9588-7096"},"institutions":[{"id":"https://openalex.org/I159176309","display_name":"Universit\u00e4t Hamburg","ror":"https://ror.org/00g30e956","country_code":"DE","type":"education","lineage":["https://openalex.org/I159176309"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Richard August See","raw_affiliation_strings":["Universit\u00e4t Hamburg, Germany"],"affiliations":[{"raw_affiliation_string":"Universit\u00e4t Hamburg, Germany","institution_ids":["https://openalex.org/I159176309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076168958","display_name":"Kevin R\u00f6bert","orcid":"https://orcid.org/0009-0006-5377-6541"},"institutions":[{"id":"https://openalex.org/I159176309","display_name":"Universit\u00e4t Hamburg","ror":"https://ror.org/00g30e956","country_code":"DE","type":"education","lineage":["https://openalex.org/I159176309"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Kevin R\u00f6bert","raw_affiliation_strings":["Universit\u00e4t Hamburg, Germany"],"affiliations":[{"raw_affiliation_string":"Universit\u00e4t Hamburg, Germany","institution_ids":["https://openalex.org/I159176309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033270363","display_name":"Mathias Fischer","orcid":"https://orcid.org/0000-0002-6254-8288"},"institutions":[{"id":"https://openalex.org/I159176309","display_name":"Universit\u00e4t Hamburg","ror":"https://ror.org/00g30e956","country_code":"DE","type":"education","lineage":["https://openalex.org/I159176309"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mathias Fischer","raw_affiliation_strings":["Universit\u00e4t Hamburg, Germany"],"affiliations":[{"raw_affiliation_string":"Universit\u00e4t Hamburg, Germany","institution_ids":["https://openalex.org/I159176309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029633305"],"corresponding_institution_ids":["https://openalex.org/I159176309"],"apc_list":null,"apc_paid":null,"fwci":1.1206,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.77930074,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"166","last_page":"180"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6318538784980774},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5926792621612549},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.588236927986145},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5449402332305908},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4165674149990082},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34751224517822266},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15323200821876526}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6318538784980774},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5926792621612549},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.588236927986145},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5449402332305908},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4165674149990082},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34751224517822266},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15323200821876526},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3678890.3678918","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3678890.3678918","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.41999998688697815,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2000559366","https://openalex.org/W2026054276","https://openalex.org/W2056112725","https://openalex.org/W2063524226","https://openalex.org/W2109966155","https://openalex.org/W2114717587","https://openalex.org/W2548454342","https://openalex.org/W2560252021","https://openalex.org/W2800652629","https://openalex.org/W2977301519","https://openalex.org/W2980104381","https://openalex.org/W2982337928","https://openalex.org/W3147673361","https://openalex.org/W3159795246","https://openalex.org/W3171223431","https://openalex.org/W3199069885","https://openalex.org/W4281737183","https://openalex.org/W7001717360"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2519676117","https://openalex.org/W2060145807","https://openalex.org/W4248806346"],"abstract_inverted_index":{"Automated":[0],"usage":[1],"of":[2,26,74,103,136,150,193,232],"web":[3,104,159],"services":[4,151],"by":[5,31],"programs,":[6],"known":[7],"as":[8,13,95,201],"bots,":[9,105],"poses":[10],"risks":[11],"such":[12],"data":[14],"scraping,":[15],"spam,":[16],"and":[17,40,132,156,161,176],"cyber":[18],"attacks.":[19],"For":[20,114],"instance,":[21],"X":[22],"suffers":[23],"from":[24,50],"millions":[25],"bot":[27,127,140,257],"accounts":[28,131],"typically":[29],"controlled":[30],"relatively":[32],"fewer":[33],"adversarial":[34],"organizations":[35],"to":[36,47,56,70,78,99,121,146,220],"create":[37],"fake":[38],"likes":[39],"comments.":[41],"The":[42],"most":[43],"widely":[44],"used":[45],"solution":[46],"distinguish":[48],"humans":[49],"bots":[51,75,110,247],"(CAPTCHA)":[52],"is":[53,144,182],"perishing":[54],"due":[55],"advances":[57],"in":[58,63,107,208],"machine":[59],"learning.":[60],"Obfuscation":[61],"techniques":[62],"binaries,":[64],"applications,":[65,158,160],"or":[66,164],"websites":[67,230],"are":[68],"designed":[69],"impede":[71],"the":[72,101,134,179,194,221,233],"creation":[73],"but":[76,248],"fail":[77],"prevent":[79],"their":[80],"scalability.":[81],"Bypassing":[82],"these":[83],"measures":[84],"often":[85],"requires":[86],"only":[87,242],"a":[88,96,147,173],"one-time":[89],"effort.":[90,213],"We":[91,167],"propose":[92],"encrypted":[93,227],"endpoints":[94,119,138,228],"novel":[97],"strategy":[98],"combat":[100],"scalability":[102],"particularly":[106],"scenarios":[108],"where":[109],"leverage":[111],"multiple":[112],"accounts.":[113],"that":[115,178,238],"we":[116,215],"assign":[117],"unique":[118],"(URLs)":[120],"each":[122],"user":[123],"account,":[124],"thereby":[125,225],"restricting":[126],"applicability":[128],"across":[129],"different":[130],"necessitating":[133],"extraction":[135],"account-specific":[137],"per":[139,186],"instance.":[141],"Our":[142,198,235],"approach":[143,170,219,240],"applicable":[145],"wide":[148],"range":[149],"utilizing":[152],"endpoints,":[153],"including":[154],"desktop":[155],"mobile":[157],"even":[162],"static":[163],"HTML-only":[165],"websites.":[166],"implemented":[168],"our":[169,218,239],"directly":[171],"within":[172],"backend":[174],"framework":[175],"observed":[177],"latency":[180],"overhead":[181],"less":[183,190],"than":[184,191],"0.1ms":[185],"request,":[187],"which":[188],"constitutes":[189],"1%":[192],"total":[195],"request":[196],"time.":[197],"solution,":[199],"developed":[200],"simple":[202,246],"middleware,":[203],"can":[204],"be":[205],"easily":[206],"integrated":[207],"existing":[209],"projects":[210],"with":[211,252],"low":[212],"Additionally,":[214],"have":[216],"extended":[217],"Jinja2":[222],"template":[223],"engine,":[224],"supporting":[226],"for":[229],"out":[231],"box.":[234],"analysis":[236],"indicates":[237],"not":[241],"effectively":[243],"protects":[244],"against":[245],"also,":[249],"when":[250],"coupled":[251],"obfuscation":[253],"techniques,":[254],"further":[255],"impedes":[256],"creation.":[258]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
