A survey of phishing attacks: Their types, vectors and technical approaches

KL Chiew, KSC Yong, CL Tan - Expert Systems with Applications, 2018 - Elsevier
Phishing was a threat in the cyber world a couple of decades ago and still is today. It has
grown and evolved over the years as phishers are getting creative in planning and …

Domain name system security and privacy: A contemporary survey

A Khormali, J Park, H Alasmary, A Anwar, M Saad… - Computer Networks, 2021 - Elsevier
Abstract The Domain Name System (DNS) is one of the most important components of
today's Internet, and is the standard naming convention between human-readable domain …

Illegitimate typosquatting detection with internet protocol information

M Grill, J Kohout, M Kopp, T Pevny - US Patent 10,491,614, 2019 - Google Patents
Detecting illegitimate typosquatting with Internet Protocol (IP) information includes, at a
computing device having connectivity to a network, obtaining a list of domains and filtering …

Privacy policies over time: Curation and analysis of a million-document dataset

R Amos, G Acar, E Lucherini, M Kshirsagar… - Proceedings of the Web …, 2021 - dl.acm.org
Automated analysis of privacy policies has proved a fruitful research direction, with
developments such as automated policy summarization, question answering systems, and …

You are what you include: large-scale evaluation of remote javascript inclusions

N Nikiforakis, L Invernizzi, A Kapravelos… - Proceedings of the …, 2012 - dl.acm.org
JavaScript is used by web developers to enhance the interactivity of their sites, offload work
to the users' browsers and improve their sites' responsiveness and user-friendliness, making …

[图书][B] Virtual honeypots: from botnet tracking to intrusion detection

N Provos, T Holz - 2007 - books.google.com
Honeypots have demonstrated immense value in Internet security, but physical honeypot
deployment can be prohibitively complex, time-consuming, and expensive. Now, there'sa …

Hiding in plain sight: A longitudinal study of combosquatting abuse

P Kintis, N Miramirkhani, C Lever, Y Chen… - Proceedings of the …, 2017 - dl.acm.org
Domain squatting is a common adversarial practice where attackers register domain names
that are purposefully similar to popular domains. In this work, we study a specific type of …

Characterizing cryptocurrency exchange scams

P Xia, H Wang, B Zhang, R Ji, B Gao, L Wu, X Luo… - Computers & …, 2020 - Elsevier
As the indispensable trading platforms of the ecosystem, hundreds of cryptocurrency
exchanges are emerging to facilitate the trading of digital assets. While, it also attracts the …

The long {“Taile”} of typosquatting domain names

J Szurdi, B Kocso, G Cseh, J Spring… - 23rd USENIX Security …, 2014 - usenix.org
Typosquatting is a speculative behavior that leverages Internet naming and governance
practices to extract profit from users' misspellings and typing errors. Simple and inexpensive …

[PDF][PDF] Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse.

P Agten, W Joosen, F Piessens, N Nikiforakis - NDSS, 2015 - lirias.kuleuven.be
Typosquatting is the act of purposefully registering a domain name that is a mistype of a
popular domain name. It is a concept that has been known and studied for over 15 years, yet …