[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale

A Oest, P Zhang, B Wardman, E Nunes… - 29th {USENIX} Security …, 2020 - usenix.org
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …

Opening the blackbox of virustotal: Analyzing online phishing scan engines

P Peng, L Yang, L Song, G Wang - Proceedings of the Internet …, 2019 - dl.acm.org
Online scan engines such as VirusTotal are heavily used by researchers to label malicious
URLs and files. Unfortunately, it is not well understood how the labels are generated and …

Comar: Classification of compromised versus maliciously registered domains

S Maroofi, M Korczyński, C Hesselman… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Miscreants abuse thousands of domain names every day by launching large-scale attacks
such as phishing or malware campaigns. While some domains are solely registered for …

It's not what it looks like: Measuring attacks and defensive registrations of homograph domains

F Quinkert, T Lauinger, W Robertson… - … IEEE Conference on …, 2019 - ieeexplore.ieee.org
International Domain Names (IDNs) may contain Unicode in addition to ASCII characters.
This enables attackers to replace one or even more characters of a well-known domain with …

[PDF][PDF] Cracking wall of confinement: Understanding and analyzing malicious domain takedowns

E Alowaisheq - The Network and Distributed System Security …, 2019 - par.nsf.gov
Take-down operations aim to disrupt cybercrime involving malicious domains. In the past
decade, many successful take-down operations have been reported, including those against …

Are you human? resilience of phishing detection to evasion techniques based on human verification

S Maroofi, M Korczyński, A Duda - Proceedings of the ACM Internet …, 2020 - dl.acm.org
Phishing is one of the most common cyberattacks these days. Attackers constantly look for
new techniques to make their campaigns more lucrative by extending the lifespan of …

Panning for gold. eth: Understanding and Analyzing ENS Domain Dropcatching

M Muzammil, Z Wu, A Balasubramanian… - Proceedings of the …, 2024 - dl.acm.org
Ethereum Name Service (ENS) domains allow users to map human-readable names (such
as gold. eth) to their cryptocurrency addresses, simplifying cryptocurrency transactions. Like …

Unravelling ariadne's thread: Exploring the threats of decentralised dns

C Patsakis, F Casino, N Lykousas, V Katos - IEEE Access, 2020 - ieeexplore.ieee.org
The current landscape of the core Internet technologies shows considerable centralisation
with the big tech companies controlling the vast majority of traffic and services. This situation …

Stale TLS certificates: investigating precarious third-party access to valid TLS keys

Z Ma, A Faulkenberry, T Papastergiou… - Proceedings of the …, 2023 - dl.acm.org
Certificate authorities enable TLS server authentication by generating certificates that attest
to the map** between a domain name and a cryptographic keypair, for up to 398 days …

A large scale study and classification of virustotal reports on phishing and malware urls

E Choo, M Nabeel, D Kim, R De Silva, T Yu… - ACM SIGMETRICS …, 2024 - dl.acm.org
VirusTotal (VT) is a widely used scanning service for researchers and practitioners to label
malicious entities and predict new security threats. Unfortunately, it is little known to the end …