[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale

A Oest, P Zhang, B Wardman, E Nunes… - 29th {USENIX} Security …, 2020 - usenix.org
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …

{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists

A Oest, Y Safaei, P Zhang, B Wardman… - 29th USENIX Security …, 2020 - usenix.org
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense
against large-scale phishing attacks. However, sophistication in phishing websites—such as …

Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures

YR Siwakoti, M Bhurtel, DB Rawat… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Although the Internet of Things (IoT) incorporates millions of heterogeneous devices to
provide advanced intelligent services and has greatly impacted our lives over time, it has a …

Catching transparent phish: Analyzing and detecting mitm phishing toolkits

B Kondracki, BA Azad, O Starov… - Proceedings of the 2021 …, 2021 - dl.acm.org
For over a decade, phishing toolkits have been helping attackers automate and streamline
their phishing campaigns. Man-in-the-Middle (MITM) phishing toolkits are the latest …

ZITA: zero-interaction two-factor authentication using contact traces and in-band proximity verification

N Ghose, K Gupta, L Lazos, M Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Two-factor authentication provides an additional layer of protection to commonly-occurring
password breaches. However, existing TFA methods, often involve special hardware …

OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities

J Singh, NK Chaudhary - Journal of Information Security and Applications, 2022 - Elsevier
OAuth 2.0 is a widely used authorization protocol for cloud based web services and is used
by many big firms such as Google, Facebook, Microsoft for granting limited access to the …

[PDF][PDF] The droid is in the details: Environment-aware evasion of android sandboxes

B Kondracki, BA Azad, N Miramirkhani… - Proceedings of the 29th …, 2022 - par.nsf.gov
For over a decade, phishing toolkits have been helping attackers automate and streamline
their phishing campaigns. Man-in-the-Middle (MITM) phishing toolkits are the latest …

UWB-Auth: A UWB-based Two Factor Authentication Platform

Y Cao, A Dhekne, M Ammar - Proceedings of the 17th ACM Conference …, 2024 - dl.acm.org
This paper presents an ultra-wideband (UWB) based two-factor authentication (2FA)
platform, called UWB-Auth, designed as carriable or wearable devices. UWB-Auth …

How effective is multifactor authentication at deterring cyberattacks?

LA Meyer, S Romero, G Bertoli, T Burt… - arXiv preprint arXiv …, 2023 - arxiv.org
This study investigates the effectiveness of multifactor authentication (MFA) in protecting
commercial accounts from unauthorized access, with an additional focus on accounts with …

Analyzing 2FA phishing attacks and their prevention techniques

O Ellahi, M Umer, A Raza… - … Conference on Smart …, 2022 - ieeexplore.ieee.org
Two factor authentication (2FA) provides a strong user authentication which increases the
security of a vast range of web sites and their services. With its popularity, the 2FA still …