Phishing in organizations: Findings from a large-scale and long-term study

D Lain, K Kostiainen, S Čapkun - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …

[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale

A Oest, P Zhang, B Wardman, E Nunes… - 29th {USENIX} Security …, 2020 - usenix.org
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …

{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists

A Oest, Y Safaei, P Zhang, B Wardman… - 29th USENIX Security …, 2020 - usenix.org
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense
against large-scale phishing attacks. However, sophistication in phishing websites—such as …

Visualphishnet: Zero-day phishing website detection by visual similarity

S Abdelnabi, K Krombholz, M Fritz - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
Phishing websites are still a major threat in today's Internet ecosystem. Despite numerous
previous efforts, similarity-based detection methods do not offer sufficient protection for the …

Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing

P Zhang, A Oest, H Cho, Z Sun… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Phishing is a critical threat to Internet users. Although an extensive ecosystem serves to
protect users, phishing websites are growing in sophistication, and they can slip past the …

A review of human-and computer-facing url phishing features

K Althobaiti, G Rummani… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
When detecting phishing websites, both humans and computers rely on aspects of the
website (features) to aid in their decision making. In this work, we conduct a review of URL …

Needle in a haystack: Tracking down elite phishing domains in the wild

K Tian, STK Jan, H Hu, D Yao, G Wang - Proceedings of the Internet …, 2018 - dl.acm.org
Today's phishing websites are constantly evolving to deceive users and evade the detection.
In this paper, we perform a measurement study on squatting phishing domains where the …

[PDF][PDF] Double and nothing: Understanding and detecting cryptocurrency giveaway scams

X Li, A Yepuri, N Nikiforakis - … of the Network and Distributed System …, 2023 - par.nsf.gov
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …

Phishfarm: A scalable framework for measuring the effectiveness of evasion techniques against browser phishing blacklists

A Oest, Y Safaei, A Doupé, GJ Ahn… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Phishing attacks have reached record volumes in recent years. Simultaneously, modern
phishing websites are growing in sophistication by employing diverse cloaking techniques …

Intelligent deep machine learning cyber phishing url detection based on bert features extraction

M Elsadig, AO Ibrahim, S Basheer, MA Alohali… - Electronics, 2022 - mdpi.com
Recently, phishing attacks have been a crucial threat to cyberspace security. Phishing is a
form of fraud that attracts people and businesses to access malicious uniform resource …