Chatspamdetector: Leveraging large language models for effective phishing email detection

T Koide, N Fukushi, H Nakano, D Chiba - arXiv preprint arXiv:2402.18093, 2024 - arxiv.org
The proliferation of phishing sites and emails poses significant challenges to existing
cybersecurity efforts. Despite advances in spam filters and email security protocols …

A large-scale and longitudinal measurement study of {DKIM} deployment

C Wang, K Shen, M Guo, Y Zhao, M Zhang… - 31st USENIX Security …, 2022 - usenix.org
DomainKeys Identified Mail (DKIM) is an email authentication protocol to protect the integrity
of email contents. It has been proposed and standardized for over a decade and adopted by …

How iot re-using threatens your sensitive data: Exploring the user-data disposal in used iot devices

P Liu, S Ji, L Fu, K Lu, X Zhang, J Qin… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
With the rapid technology evolution of the Internet of Things (IoT) and increasing user needs,
IoT device re-using becomes more and more common nowadays. For instance, more than …

You've Got Report: Measurement and Security Implications of {DMARC} Reporting

MI Ashiq, W Li, T Fiebig, T Chung - 32nd USENIX Security Symposium …, 2023 - usenix.org
Email, since its invention, has become the most widely used communication system and
SMTP is the standard for email transmission on the Internet. However, SMTP lacks built-in …

The Maginot Line: Attacking the Boundary of {DNS} Caching Protection

X Li, C Lu, B Liu, Q Zhang, Z Li, H Duan… - 32nd USENIX Security …, 2023 - usenix.org
In this paper, we report MaginotDNS, a powerful cache poisoning attack against DNS
servers that simultaneously act as forwarder and recursive resolver (termed as CDNS). The …

Spfail: discovering, measuring, and remediating vulnerabilities in email sender validation

N Bennett, R Sowards, C Deccio - Proceedings of the 22nd ACM Internet …, 2022 - dl.acm.org
Email is an important medium for Internet communication. Secure email infrastructure is
therefore of utmost importance. In this paper we discuss two software vulnerabilities …

Hdiff: A semi-automatic framework for discovering semantic gap attack in http implementations

K Shen, J Lu, Y Yang, J Chen, M Zhang… - 2022 52nd Annual …, 2022 - ieeexplore.ieee.org
The Internet has become a complex distributed network with numerous middle-boxes, where
an end-to-end HTTP request is often processed by multiple intermediate servers before it …

Measuring email sender validation in the wild

C Deccio, T Yadav, N Bennett, A Hilton… - Proceedings of the 17th …, 2021 - dl.acm.org
Email is a critical Internet application, and its security is important. The Sender Policy
Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message …

Who's got your mail? characterizing mail service provider usage

E Liu, G Akiwate, M Jonker, A Mirian… - Proceedings of the 21st …, 2021 - dl.acm.org
E-mail has long been a critical component of daily communication and the core medium for
modern business correspondence. While traditionally e-mail service was provisioned and …

A Comparative Long-Term Study of Fallback Authentication Schemes

L Lassak, P Markert, M Golla, E Stobert… - Proceedings of the CHI …, 2024 - dl.acm.org
Fallback authentication, the process of re-establishing access to an account when the
primary authenticator is unavailable, holds critical significance. Approaches range from …