A survey of phishing attacks: Their types, vectors and technical approaches

KL Chiew, KSC Yong, CL Tan - Expert Systems with Applications, 2018 - Elsevier
Phishing was a threat in the cyber world a couple of decades ago and still is today. It has
grown and evolved over the years as phishers are getting creative in planning and …

A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy

R Goenka, M Chawla, N Tiwari - International Journal of Information …, 2024 - Springer
The recent surge in phishing incidents in the post-COVID era poses a serious threat towards
the social and economic well-being of users. The escalation in dependency upon the …

When the User Is Inside the User Interface: An Empirical Study of {UI} Security Properties in Augmented Reality

K Cheng, A Bhattacharya, M Lin, J Lee… - 33rd USENIX Security …, 2024 - usenix.org
Augmented reality (AR) experiences place users inside the user interface (UI), where they
can see and interact with three-dimensional virtual content. This paper explores UI security …

Towards discovering and understanding task hijacking in android

C Ren, Y Zhang, H Xue, T Wei, P Liu - 24th USENIX Security …, 2015 - usenix.org
Android multitasking provides rich features to enhance user experience and offers great
flexibility for app developers to promote app personalization. However, the security …

OAuch: Exploring security compliance in the OAuth 2.0 ecosystem

P Philippaerts, D Preuveneers, W Joosen - Proceedings of the 25th …, 2022 - dl.acm.org
The OAuth 2.0 protocol is a popular and widely adopted authorization protocol. It has been
proven secure in a comprehensive formal security analysis, yet new vulnerabilities continue …

{TRIDENT}: Towards Detecting and Mitigating Web-based Social Engineering Attacks

Z Yang, J Allen, M Landen, R Perdisci… - 32nd USENIX Security …, 2023 - usenix.org
As the weakest link in cybersecurity, humans have become the main target of attackers who
take advantage of sophisticated web-based social engineering techniques. These attackers …

Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language

MA Mohammed, DA Ibrahim… - Journal of Intelligent …, 2021 - degruyter.com
Spam electronic mails (emails) refer to harmful and unwanted commercial emails sent to
corporate bodies or individuals to cause harm. Even though such mails are often used for …

Android ui deception revisited: Attacks and defenses

E Fernandes, QA Chen, J Paupore, G Essl… - … Cryptography and Data …, 2017 - Springer
App-based deception attacks are increasingly a problem on mobile devices and they are
used to steal passwords, credit card numbers, text messages, etc. Current versions of …

A tale of two headers: a formal analysis of inconsistent {Click-Jacking} protection on the web

S Calzavara, S Roth, A Rabitti, M Backes… - 29th USENIX Security …, 2020 - usenix.org
Click-jacking protection on the modern Web is commonly enforced via client-side security
mechanisms for framing control, like the X-Frame-Options header (XFO) and Content …

[HTML][HTML] An intelligent spam detection model based on artificial immune system

AJ Saleh, A Karim, B Shanmugam, S Azam… - Information, 2019 - mdpi.com
Spam emails, also known as non-self, are unsolicited commercial or malicious emails, sent
to affect either a single individual or a corporation or a group of people. Besides advertising …