The art of cybercrime community research

J Hughes, S Pastrana, A Hutchings, S Afroz… - ACM Computing …, 2024 - dl.acm.org
In the last decade, cybercrime has risen considerably. One key factor is the proliferation of
online cybercrime communities, where actors trade products and services, and also learn …

The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums

E Tseng, R Bellini, N McDonald, M Danos… - 29th USENIX security …, 2020 - usenix.org
Abusers increasingly use spyware apps, account compromise, and social engineering to
surveil their intimate partners, causing substantial harms that can culminate in violence. This …

Proactively identifying emerging hacker threats from the dark web: A diachronic graph embedding framework (d-gef)

S Samtani, H Zhu, H Chen - ACM Transactions on Privacy and Security …, 2020 - dl.acm.org
Cybersecurity experts have appraised the total global cost of malicious hacking activities to
be $450 billion annually. Cyber Threat Intelligence (CTI) has emerged as a viable approach …

Self-supervised euphemism detection and identification for content moderation

W Zhu, H Gong, R Bansal, Z Weinberg… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Fringe groups and organizations have a long history of using euphemisms—ordinary-
sounding words with a secret meaning—to conceal what they are discussing. Nowadays …

Reading thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces

K Yuan, H Lu, X Liao, XF Wang - 27th USENIX Security Symposium …, 2018 - usenix.org
Underground communication is invaluable for understanding cybercrimes. However, it is
often obfuscated by the extensive use of dark jargons, innocently-looking terms like …

Euphemistic phrase detection by masked language model

W Zhu, S Bhat - arXiv preprint arXiv:2109.04666, 2021 - arxiv.org
It is a well-known approach for fringe groups and organizations to use euphemisms--
ordinary-sounding and innocent-looking words with a secret meaning--to conceal what they …

Automatically identifying the function and intent of posts in underground forums

A Caines, S Pastrana, A Hutchings, PJ Buttery - Crime Science, 2018 - Springer
The automatic classification of posts from hacking-related online forums is of potential value
for the understanding of user behaviour in social networks relating to cybercrime. We …

Mapping the underground: Supervised discovery of cybercrime supply chains

R Bhalerao, M Aliapoulios, I Shumailov… - … on Electronic Crime …, 2019 - ieeexplore.ieee.org
Understanding the sequences of processes needed to perform a cybercrime is crucial for
effective interventions. However, generating these supply chains currently requires time …

Casino royale: a deep exploration of illegal online gambling

H Yang, K Du, Y Zhang, S Hao, Z Li, M Liu… - Proceedings of the 35th …, 2019 - dl.acm.org
The popularity of online gambling could bring negative social impact, and many countries
ban or restrict online gambling. Taking China for example, online gambling violates Chinese …

Measuring ewhoring

S Pastrana, A Hutchings, D Thomas… - Proceedings of the …, 2019 - dl.acm.org
eWhoring is the term used by offenders to refer to a type of online fraud in which cybersexual
encounters are simulated for financial gain. Perpetrators use social engineering techniques …