Private blocklist lookups with checklist

D Kogan, H Corrigan-Gibbs - 30th USENIX security symposium (USENIX …, 2021 - usenix.org
This paper presents Checklist, a system for private blocklist lookups. In Checklist, a client
can determine whether a particular string appears on a server-held blocklist of strings …

Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites

W Li, S Manickam, SUA Laghari, YW Chong - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals
to unlawfully acquire sensitive user information, including passwords, account details, credit …

Sok: Content moderation for end-to-end encryption

S Scheffler, J Mayer - arXiv preprint arXiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …

Web browser privacy: What do browsers say when they phone home?

DJ Leith - IEEE Access, 2021 - ieeexplore.ieee.org
We measure the data sent to their back-end servers by five browsers: Google Chrome,
Mozilla Firefox, Apple Safari, Brave Browser and Microsoft Edge, during normal web …

: Enhancing User Privacy and Coverage of Safe Browsing Services

Y Du, H Duan, L Xu, H Cui, C Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
To keep web users away from unsafe websites, modern web browsers enable the
embedded feature of safe browsing (SB) by default. In this work, through theoretical analysis …

Enhancing cryptocurrency blocklisting: A secure, trustless, and effective realization

Y Du, A Zhou, C Wang - 2022 IEEE 42nd International …, 2022 - ieeexplore.ieee.org
The flourishing development of blockchain and cryptocurrency has made it a hotbed for
cyber-criminals to implement virtually untraceable scams. Consequently, the blockchain …

OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control

Y Shen, B Yu, S Lai, X Yuan, SF Sun, JK Liu… - … on Information Security, 2022 - Springer
Users have personal or business need to share most private and confidential documents;
however, often at the expense of privacy and security. A sought after feature in the trending …

Natural Language but Omitted? On the Ineffectiveness of Large Language Models' privacy policy from End-users' Perspective

S Zhang, H Xing, X Yi, H Li - arXiv preprint arXiv:2406.18100, 2024 - arxiv.org
LLMs driven products were increasingly prevalent in our daily lives, With a natural language
based interaction style, people may potentially leak their personal private information. Thus …

Making contract users safer: Towards building a Safe Browsing platform on Ethereum

C Tan, R Yu, S Xiong, Z Zhou, S Liu, S Wu - ISA transactions, 2023 - Elsevier
There are many papers and tools regarding the detection of unsafe contracts, but few ways
for detection results to practically benefit contract users and owners. This paper presents a …

利用分散式正規表式比對保護URL 檢查之隱私

賴侃軒 - 2023 - tdr.lib.ntu.edu.tw
近年來, URL 檢查由於安全瀏覽服務的廣泛使用, 因此其隱私問題變得愈發重要. 有鑑於此,
我們提出了一個保護隱私的URL 檢查系統, 其特色為將使用者的URL 分割成若干份秘密以保護 …