Malicious URL detection using machine learning: A survey

D Sahoo, C Liu, SCH Hoi - arXiv preprint arXiv:1701.07179, 2017 - arxiv.org
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity.
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …

Utilisation of website logo for phishing detection

KL Chiew, EH Chang, WK Tiong - Computers & Security, 2015 - Elsevier
Phishing is a security threat which combines social engineering and website spoofing
techniques to deceive users into revealing confidential information. In this paper, we …

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence

D Kiwia, A Dehghantanha, KKR Choo… - Journal of computational …, 2018 - Elsevier
Malware such as banking Trojans are popular with financially-motivated cybercriminals.
Detection of banking Trojans remains a challenging task, due to the constant evolution of …

What is this url's destination? empirical evaluation of users' url reading

S Albakry, K Vaniea, MK Wolters - … of the 2020 CHI conference on human …, 2020 - dl.acm.org
Common anti-phishing advice tells users to mouse over links, look at the URL, and compare
to the expected destination, implicitly assuming that they are able to read the URL. To test …

Targeted Threat Index: Characterizing and Quantifying {Politically-Motivated} Targeted Malware

S Hardy, M Crete-Nishihata, K Kleemola… - 23rd USENIX Security …, 2014 - usenix.org
Targeted attacks on civil society and non-governmental organizations have gone
underreported despite the fact that these organizations have been shown to be frequent …

On obstructing obscenity obfuscation

S Rojas-Galeano - ACM Transactions on the Web (TWEB), 2017 - dl.acm.org
Obscenity (the use of rude words or offensive expressions) has spread from informal verbal
conversations to digital media, becoming increasingly common on user-generated …

Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications

C Marforio, R Jayaram Masti, C Soriente… - Proceedings of the …, 2016 - dl.acm.org
Mobile application phishing happens when a malicious mobile application masquerades as
a legitimate one to steal user credentials. Personalized security indicators may help users to …

Using attribute-based feature selection approaches and machine learning algorithms for detecting fraudulent website URLs

M Aydin, I Butun, K Bicakci… - 2020 10th Annual …, 2020 - ieeexplore.ieee.org
Phishing is a malicious form of online theft and needs to be prevented in order to increase
the overall trust of the public on the Internet. In this study, for that purpose, the authors …

Personalized security indicators to detect application phishing attacks in mobile platforms

C Marforio, RJ Masti, C Soriente, K Kostiainen… - arXiv preprint arXiv …, 2015 - arxiv.org
Phishing in mobile applications is a relevant threat with successful attacks reported in the
wild. In such attacks, malicious mobile applications masquerade as legitimate ones to steal …

Hardened setup of personalized security indicators to counter phishing attacks in mobile banking

C Marforio, RJ Masti, C Soriente, K Kostiainen… - Proceedings of the 6th …, 2016 - dl.acm.org
Application phishing attacks are rooted in users inability to distinguish legitimate
applications from malicious ones. Previous work has shown that personalized security …