A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks

R Heartfield, G Loukas - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …

Measuring and modeling the label dynamics of online {Anti-Malware} engines

S Zhu, J Shi, L Yang, B Qin, Z Zhang, L Song… - 29th USENIX Security …, 2020 - usenix.org
VirusTotal provides malware labels from a large set of anti-malware engines, and is heavily
used by researchers for malware annotation and system evaluation. Since different engines …

Knowing your enemy: understanding and detecting malicious web advertising

Z Li, K Zhang, Y **e, F Yu, XF Wang - … of the 2012 ACM conference on …, 2012 - dl.acm.org
With the Internet becoming the dominant channel for marketing and promotion, online
advertisements are also increasingly used for illegal purposes such as propagating …

Spotless sandboxes: Evading malware analysis systems using wear-and-tear artifacts

N Miramirkhani, MP Appini, N Nikiforakis… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Malware sandboxes, widely used by antivirus companies, mobile application marketplaces,
threat detection appliances, and security researchers, face the challenge of environment …

Evilseed: A guided approach to finding malicious web pages

L Invernizzi, PM Comparetti, S Benvenuti… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
Malicious web pages that use drive-by download attacks or social engineering techniques to
install unwanted software on a user's computer have become the main avenue for the …

In-depth survey of digital advertising technologies

G Chen, JH Cox, AS Uluagac… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Some of the world's most well-known IT companies are in fact advertising companies
deriving their primary revenues through digital advertising. For this reason, these IT giants …

The dark alleys of madison avenue: Understanding malicious advertisements

A Zarras, A Kapravelos, G Stringhini, T Holz… - Proceedings of the …, 2014 - dl.acm.org
Online advertising drives the economy of the World Wide Web. Modern websites of any size
and popularity include advertisements to monetize visits from their users. To this end, they …

Ad injection at scale: Assessing deceptive advertisement modifications

K Thomas, E Bursztein, C Grier, G Ho… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Today, web injection manifests in many forms, but fundamentally occurs when malicious and
unwanted actors tamper directly with browser sessions for their own profit. In this work we …

Understanding malvertising through ad-injecting browser extensions

X **ng, W Meng, B Lee, U Weinsberg, A Sheth… - Proceedings of the 24th …, 2015 - dl.acm.org
Malvertising is a malicious activity that leverages advertising to distribute various forms of
malware. Because advertising is the key revenue generator for numerous Internet …

Talos: no more ransomware victims with formal methods

A Cimitile, F Mercaldo, V Nardone, A Santone… - International Journal of …, 2018 - Springer
Ransomware is a very effective form of malware that is recently spreading out on an
impressive number of workstations and smartphones. This malware blocks the access to the …