Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ... 29th {USENIX} Security Symposium ({USENIX} Security 20), 2020 | 139 | 2020 |
{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists A Oest, Y Safaei, P Zhang, B Wardman, K Tyers, Y Shoshitaishvili, ... 29th USENIX Security Symposium (USENIX Security 20), 379-396, 2020 | 96 | 2020 |
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ... Proceedings of the IEEE Symposium on Security and Privacy, 2021 | 88 | 2021 |
Prime+ count: Novel cross-world covert channels on arm trustzone H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 57 | 2018 |
Scam pandemic: How attackers exploit public fear through phishing M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ... 2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020 | 43 | 2020 |
Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service} Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ... 30th USENIX Security Symposium (USENIX Security 21), 4169-4186, 2021 | 17 | 2021 |
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ... Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 8 | 2022 |
Neutralizing Evasion Techniques of Malicious Websites A Oest, P Zhang, R Johnson US Patent App. 17/079,190, 2022 | 1 | 2022 |
iCore continuous and proactive extrospection on multi-core IoT devices P Zhang, H Cho, Z Zhao, A Doupé, GJ Ahn Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 851-860, 2019 | 1 | 2019 |
Secore: Continuous extrospection with high visibility on multi-core ARM platforms P Zhang, B Ngabonziza, H Cho, Z Zhao, A Doupé, GJ Ahn Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 1 | 2018 |
Systems and methods for detecting phishing websites R Johnson, P Zhang, A Oest, B Wardman US Patent 11,233,820, 2022 | | 2022 |
Detection and Prevention of Sophisticated Cyberattacks P Zhang Arizona State University, 2022 | | 2022 |
Prime+ Count H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn Proceedings of the 34th Annual Computer Security Applications Conference, 2018 | | 2018 |
Temperature Balancing among Servers with Workload Distribution P Zhang The Ohio State University, 2016 | | 2016 |