Detecting phishing sites using chatgpt

T Koide, N Fukushi, H Nakano, D Chiba - arXiv preprint arXiv:2306.05816, 2023 - arxiv.org
The rise of large language models (LLMs) has had a significant impact on various domains,
including natural language processing and artificial intelligence. While LLMs such as …

Spacephish: The evasion-space of adversarial attacks against phishing website detectors using machine learning

G Apruzzese, M Conti, Y Yuan - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks
that break every ML model, or defenses that withstand most attacks. Unfortunately, little …

Understanding the security of free content websites by analyzing their SSL certificates: a comparative study

A Alabduljabbar, R Ma, S Choi, R Jang… - Proceedings of the 1st …, 2022 - dl.acm.org
Online services that provide books, music, movies, etc., for free have existed on the Internet
for decades. While there are some common beliefs and warnings that such online services …

Canary in twitter mine: collecting phishing reports from experts and non-experts

H Nakano, D Chiba, T Koide, N Fukushi… - Proceedings of the 18th …, 2023 - dl.acm.org
The rise in phishing attacks via e-mail and short message service (SMS) has not slowed
down at all. The first thing we need to do to combat the ever-increasing number of phishing …

PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names

T Koide, N Fukushi, H Nakano, D Chiba - Proceedings of the 39th …, 2023 - dl.acm.org
Domain squatting is a technique used by attackers to create domain names for phishing
sites. In recent phishing attempts, we have observed many domain names that use multiple …

Multi-SpacePhish: Extending the evasion-space of adversarial attacks against phishing website detectors using machine learning

Y Yuan, G Apruzzese, M Conti - Digital Threats: Research and Practice, 2024 - dl.acm.org
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks
that break every ML model or defenses that withstand most attacks. Unfortunately, little …

Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study

M Alkinoon, A Alabduljabbar… - 2023 32nd …, 2023 - ieeexplore.ieee.org
The recent transformation of healthcare medical records from paper-based to digital and
connected systems raises concerns regarding patients' security and online privacy. For …

Revocation speedrun: how the webpki copes with fraudulent certificates

J Friess, H Schulmann, M Waidner - Proceedings of the ACM on …, 2023 - dl.acm.org
The TLS ecosystem depends on certificates to bootstrap secure connections. Certificate
Authorities (CAs) are trusted to issue these correctly. However, as a result of security …

Phishing Vs. Legit: Comparative Analysis of Client-Side Resources of Phishing and Target Brand Websites

K Lim, J Park, D Kim - Proceedings of the ACM on Web Conference 2024, 2024 - dl.acm.org
Phishing attacks have persistently remained a prevalent and widespread cybersecurity
threat for several years. This leads to numerous endeavors aimed at comprehensively …

Lost in Translation: AI-based Generator of Cross-Language Sound-squatting

R Valentim, I Drago, M Mellia… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
Sound-squatting is a phishing attack that tricks users into accessing malicious resources by
exploiting similarities in the pronunciation of words. It is an understudied threat that gains …