[PDF][PDF] Double and nothing: Understanding and detecting cryptocurrency giveaway scams

X Li, A Yepuri, N Nikiforakis - … of the Network and Distributed System …, 2023 - par.nsf.gov
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites

W Li, S Manickam, SUA Laghari, YW Chong - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals
to unlawfully acquire sensitive user information, including passwords, account details, credit …

Spacephish: The evasion-space of adversarial attacks against phishing website detectors using machine learning

G Apruzzese, M Conti, Y Yuan - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks
that break every ML model, or defenses that withstand most attacks. Unfortunately, little …

Attacking logo-based phishing website detectors with adversarial perturbations

J Lee, Z **n, MNP See, K Sabharwal… - … on Research in …, 2023 - Springer
Recent times have witnessed the rise of anti-phishing schemes powered by deep learning
(DL). In particular, logo-based phishing detectors rely on DL models from Computer Vision …

TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum

B He, Y Chen, Z Chen, X Hu, Y Hu, L Wu… - Proceedings of the …, 2023 - dl.acm.org
The prosperity of Ethereum attracts many users to send transactions and trade crypto assets.
However, this has also given rise to a new form of transaction-based phishing scam, named …

[HTML][HTML] Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection

Y Yuan, G Apruzzese, M Conti - Computers & Security, 2025 - Elsevier
Phishing attacks are on the rise, and phishing websites are everywhere, denoting the
brittleness of security mechanisms reliant on blocklists. To cope with this threat, many works …

Knowledge Expansion and Counterfactual Interaction for {Reference-Based} Phishing Detection

R Liu, Y Lin, Y Zhang, PH Lee, JS Dong - 32nd USENIX Security …, 2023 - usenix.org
Phishing attacks have been increasingly prevalent in recent years, significantly eroding
societal trust. As a state-of-the-art defense solution, reference-based phishing detection …

A State-of-the-art Review on Phishing Website Detection Techniques

W Li, S Manickam, YW Chong, W Leng… - IEEE Access, 2024 - ieeexplore.ieee.org
Phishing attacks remain a significant cybersecurity threat, with phishing websites serving as
a primary tool for attackers to deceive users and steal sensitive information. The rapid …

Beneath the phishing scripts: A script-level analysis of phishing kits and their impact on real-world phishing websites

W Lee, J Hur, D Kim - Proceedings of the 19th ACM Asia Conference on …, 2024 - dl.acm.org
Phishing kits have become increasingly popular among cybercriminals because they offer
an easy-to-use and efficient way for phishing attackers to build phishing websites. Prior work …