A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing

P Zhang, A Oest, H Cho, Z Sun… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Phishing is a critical threat to Internet users. Although an extensive ecosystem serves to
protect users, phishing websites are growing in sophistication, and they can slip past the …

[PDF][PDF] Double and nothing: Understanding and detecting cryptocurrency giveaway scams

X Li, A Yepuri, N Nikiforakis - … of the Network and Distributed System …, 2023 - par.nsf.gov
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …

Unleash the simulacrum: shifting browser realities for robust {Extension-Fingerprinting} prevention

S Karami, F Kalantari, M Zaeifi, XJ Maso… - 31st USENIX Security …, 2022 - usenix.org
Online tracking has garnered significant attention due to the privacy risk it poses to users.
Among the various approaches, techniques that identify which extensions are installed in a …

Targeted and Troublesome: Tracking and Advertising on Children's Websites

Z Moti, A Senol, H Bostani, FZ Borgesius… - arXiv preprint arXiv …, 2023 - arxiv.org
On the modern web, trackers and advertisers frequently construct and monetize users'
detailed behavioral profiles without consent. Despite various studies on web tracking …

{TRIDENT}: Towards Detecting and Mitigating Web-based Social Engineering Attacks

Z Yang, J Allen, M Landen, R Perdisci… - 32nd USENIX Security …, 2023 - usenix.org
As the weakest link in cybersecurity, humans have become the main target of attackers who
take advantage of sophisticated web-based social engineering techniques. These attackers …

Harpo: Learning to subvert online behavioral advertising

J Zhang, K Psounis, M Haroon, Z Shafiq - arXiv preprint arXiv:2111.05792, 2021 - arxiv.org
Online behavioral advertising, and the associated tracking paraphernalia, poses a real
privacy threat. Unfortunately, existing privacy-enhancing tools are not always effective …

Cross-Country Examination of People's Experience with Targeted Advertising on Social Media

S Kaushik, T Sharma, Y Yu, AF Ali, Y Wang… - Extended Abstracts of the …, 2024 - dl.acm.org
Social media effectively connects businesses with diverse audiences. However, research
related to targeted advertising and social media is rarely done beyond Western contexts …

Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey

TT Longtchi, RM Rodriguez, L Al-Shawaf… - Proceedings of the …, 2024 - ieeexplore.ieee.org
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …