Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

Sok: Hate, harassment, and the changing landscape of online abuse

K Thomas, D Akhawe, M Bailey… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
We argue that existing security, privacy, and antiabuse protections fail to address the
growing threat of online hate and harassment. In order for our community to understand and …

Phishing in organizations: Findings from a large-scale and long-term study

D Lain, K Kostiainen, S Čapkun - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …

The state of phishing attacks

J Hong - Communications of the ACM, 2012 - dl.acm.org
The state of phishing attacks Page 1 74 CoMMuniCations of the aCM | jAnUARY 2012 | VOL.
55 | nO. 1 contributed articles PHIsHInG Is a kind of social-engineering attack in which …

Data breaches, phishing, or malware? Understanding the risks of stolen credentials

K Thomas, F Li, A Zand, J Barrett, J Ranieri… - Proceedings of the …, 2017 - dl.acm.org
In this paper, we present the first longitudinal measurement study of the underground
ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the …

[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale

A Oest, P Zhang, B Wardman, E Nunes… - 29th {USENIX} Security …, 2020 - usenix.org
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …

Cantina+ a feature-rich machine learning framework for detecting phishing web sites

G **ang, J Hong, CP Rose, L Cranor - ACM Transactions on Information …, 2011 - dl.acm.org
Phishing is a plague in cyberspace. Typically, phish detection methods either use human-
verified URL blacklists or exploit Web page features via machine learning techniques …

{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists

A Oest, Y Safaei, P Zhang, B Wardman… - 29th USENIX Security …, 2020 - usenix.org
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense
against large-scale phishing attacks. However, sophistication in phishing websites—such as …

Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing

P Zhang, A Oest, H Cho, Z Sun… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Phishing is a critical threat to Internet users. Although an extensive ecosystem serves to
protect users, phishing websites are growing in sophistication, and they can slip past the …