[PDF][PDF] Double and nothing: Understanding and detecting cryptocurrency giveaway scams
X Li, A Yepuri, N Nikiforakis - … of the Network and Distributed System …, 2023 - par.nsf.gov
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
W Li, S Manickam, SUA Laghari, YW Chong - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals
to unlawfully acquire sensitive user information, including passwords, account details, credit …
to unlawfully acquire sensitive user information, including passwords, account details, credit …
Spacephish: The evasion-space of adversarial attacks against phishing website detectors using machine learning
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks
that break every ML model, or defenses that withstand most attacks. Unfortunately, little …
that break every ML model, or defenses that withstand most attacks. Unfortunately, little …
Attacking logo-based phishing website detectors with adversarial perturbations
Recent times have witnessed the rise of anti-phishing schemes powered by deep learning
(DL). In particular, logo-based phishing detectors rely on DL models from Computer Vision …
(DL). In particular, logo-based phishing detectors rely on DL models from Computer Vision …
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum
The prosperity of Ethereum attracts many users to send transactions and trade crypto assets.
However, this has also given rise to a new form of transaction-based phishing scam, named …
However, this has also given rise to a new form of transaction-based phishing scam, named …
[HTML][HTML] Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection
Phishing attacks are on the rise, and phishing websites are everywhere, denoting the
brittleness of security mechanisms reliant on blocklists. To cope with this threat, many works …
brittleness of security mechanisms reliant on blocklists. To cope with this threat, many works …
Knowledge Expansion and Counterfactual Interaction for {Reference-Based} Phishing Detection
Phishing attacks have been increasingly prevalent in recent years, significantly eroding
societal trust. As a state-of-the-art defense solution, reference-based phishing detection …
societal trust. As a state-of-the-art defense solution, reference-based phishing detection …
A State-of-the-art Review on Phishing Website Detection Techniques
W Li, S Manickam, YW Chong, W Leng… - IEEE Access, 2024 - ieeexplore.ieee.org
Phishing attacks remain a significant cybersecurity threat, with phishing websites serving as
a primary tool for attackers to deceive users and steal sensitive information. The rapid …
a primary tool for attackers to deceive users and steal sensitive information. The rapid …
Beneath the phishing scripts: A script-level analysis of phishing kits and their impact on real-world phishing websites
Phishing kits have become increasingly popular among cybercriminals because they offer
an easy-to-use and efficient way for phishing attackers to build phishing websites. Prior work …
an easy-to-use and efficient way for phishing attackers to build phishing websites. Prior work …