Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ... Proceedings of the 29th USENIX Security Symposium, 2020 | 150 | 2020 |
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis A Oest, Y Safei, A Doupé, GJ Ahn, B Wardman, G Warner 2018 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2018 | 145 | 2018 |
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists A Oest, Y Safaei, A Doupé, GJ Ahn, B Wardman, K Tyers 40th IEEE Symposium on Security and Privacy (SP) 2019, 764-781, 2019 | 120 | 2019 |
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists A Oest, Y Safaei, P Zhang, B Wardman, K Tyers, Y Shoshitaishvili, ... Proceedings of the 29th USENIX Security Symposium, 2020 | 103 | 2020 |
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ... 42nd IEEE Symposium on Security & Privacy (SP) 2021., 2021 | 94 | 2021 |
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases ST Dinh, H Cho, K Martin, A Oest, K Zeng, A Kapravelos, GJ Ahn, T Bao, ... Network and Distributed Systems Symposium (NDSS) 2021, 2021 | 49 | 2021 |
Scam pandemic: How attackers exploit public fear through phishing M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ... 2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020 | 44 | 2020 |
Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures YR Siwakoti, M Bhurtel, DB Rawat, A Oest, RC Johnson IEEE Internet of Things Journal 10 (13), 11224-11239, 2023 | 26 | 2023 |
Phishing detection leveraging machine learning and deep learning: A review DM Divakaran, A Oest IEEE Security & Privacy 20 (5), 86-95, 2022 | 26 | 2022 |
Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service} Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ... 30th USENIX Security Symposium (USENIX Security 21), 4169-4186, 2021 | 19 | 2021 |
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ... Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 11 | 2022 |
ViK: practical mitigation of temporal memory safety violations through object ID inspection H Cho, J Park, A Oest, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ... Proceedings of the 27th ACM International Conference on Architectural …, 2022 | 11 | 2022 |
Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale M Bitaab, H Cho, A Oest, Z Lyu, W Wang, J Abraham, R Wang, T Bao, ... 2023 IEEE Symposium on Security and Privacy (SP), 2566-2583, 2023 | 6 | 2023 |
Analysis of Payment Service Provider SDKs in Android SY Mahmud, KV English, S Thorn, W Enck, A Oest, M Saad Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 5 | 2022 |
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams B Acharya, M Saad, AE Cinà, L Schönherr, HD Nguyen, A Oest, ... arXiv preprint arXiv:2401.09824, 2024 | 4 | 2024 |
Evaluating the Security Posture of Real-World FIDO2 Deployments D Kuchhal, M Saad, A Oest, F Li Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 4 | 2023 |
On sms phishing tactics and infrastructure A Nahapetyan, S Prasad, K Childs, A Oest, Y Ladwig, A Kapravelos, ... 2024 IEEE Symposium on Security and Privacy (SP), 169-169, 2024 | 3 | 2024 |
Can I Own Your NFTs? Understanding the New Attack Surface to NFTs Y Gao, M Saad, A Oest, J Zhang, B Han, S Chen IEEE Communications Magazine 61 (9), 64-70, 2023 | 2 | 2023 |
Leveraging scalable data analysis to proactively bolster the anti-phishing ecosystem A Oest Arizona State University, 2020 | 2 | 2020 |
Programming board-game strategies in the introductory CS sequence I Bezakova, J Heliotis, S Strout, A Oest, P Solt Proceedings of the 43rd ACM technical symposium on Computer Science …, 2012 | 2 | 2012 |