关注
Penghui Zhang
Penghui Zhang
Ph.D., Meta
在 asu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
1392020
{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists
A Oest, Y Safaei, P Zhang, B Wardman, K Tyers, Y Shoshitaishvili, ...
29th USENIX Security Symposium (USENIX Security 20), 379-396, 2020
962020
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
Proceedings of the IEEE Symposium on Security and Privacy, 2021
882021
Prime+ count: Novel cross-world covert channels on arm trustzone
H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
572018
Scam pandemic: How attackers exploit public fear through phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020
432020
Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service}
Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ...
30th USENIX Security Symposium (USENIX Security 21), 4169-4186, 2021
172021
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
82022
Neutralizing Evasion Techniques of Malicious Websites
A Oest, P Zhang, R Johnson
US Patent App. 17/079,190, 2022
12022
iCore continuous and proactive extrospection on multi-core IoT devices
P Zhang, H Cho, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 851-860, 2019
12019
Secore: Continuous extrospection with high visibility on multi-core ARM platforms
P Zhang, B Ngabonziza, H Cho, Z Zhao, A Doupé, GJ Ahn
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
12018
Systems and methods for detecting phishing websites
R Johnson, P Zhang, A Oest, B Wardman
US Patent 11,233,820, 2022
2022
Detection and Prevention of Sophisticated Cyberattacks
P Zhang
Arizona State University, 2022
2022
Prime+ Count
H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2018
Temperature Balancing among Servers with Workload Distribution
P Zhang
The Ohio State University, 2016
2016
系统目前无法执行此操作,请稍后再试。
文章 1–14