Phishing environments, techniques, and countermeasures: A survey
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …
web, mobile, and social networking technologies. Previous phishing taxonomies have …
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
Sok: Hate, harassment, and the changing landscape of online abuse
We argue that existing security, privacy, and antiabuse protections fail to address the
growing threat of online hate and harassment. In order for our community to understand and …
growing threat of online hate and harassment. In order for our community to understand and …
Phishing in organizations: Findings from a large-scale and long-term study
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …
we conducted in collaboration with a partner company. Our experiment ran for 15 months …
Data breaches, phishing, or malware? Understanding the risks of stolen credentials
In this paper, we present the first longitudinal measurement study of the underground
ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the …
ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the …
[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …
Cantina+ a feature-rich machine learning framework for detecting phishing web sites
Phishing is a plague in cyberspace. Typically, phish detection methods either use human-
verified URL blacklists or exploit Web page features via machine learning techniques …
verified URL blacklists or exploit Web page features via machine learning techniques …
{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense
against large-scale phishing attacks. However, sophistication in phishing websites—such as …
against large-scale phishing attacks. However, sophistication in phishing websites—such as …
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
Phishing is a critical threat to Internet users. Although an extensive ecosystem serves to
protect users, phishing websites are growing in sophistication, and they can slip past the …
protect users, phishing websites are growing in sophistication, and they can slip past the …