A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Unsolved problems in ml safety

D Hendrycks, N Carlini, J Schulman… - arXiv preprint arXiv …, 2021 - arxiv.org
Machine learning (ML) systems are rapidly increasing in size, are acquiring new
capabilities, and are increasingly deployed in high-stakes settings. As with other powerful …

Cognition in social engineering empirical research: a systematic literature review

P Burda, L Allodi, N Zannone - ACM Transactions on Computer-Human …, 2024 - dl.acm.org
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …

[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale

A Oest, P Zhang, B Wardman, E Nunes… - 29th {USENIX} Security …, 2020 - usenix.org
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …

{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists

A Oest, Y Safaei, P Zhang, B Wardman… - 29th USENIX Security …, 2020 - usenix.org
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense
against large-scale phishing attacks. However, sophistication in phishing websites—such as …

Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing

P Zhang, A Oest, H Cho, Z Sun… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Phishing is a critical threat to Internet users. Although an extensive ecosystem serves to
protect users, phishing websites are growing in sophistication, and they can slip past the …

Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks

T Xu, K Singh, P Rajivan - Applied Ergonomics, 2023 - Elsevier
Many cyberattacks begin with a malicious email message, known as spear phishing,
targeted at unsuspecting victims. Although security technologies have improved significantly …

F-fade: Frequency factorization for anomaly detection in edge streams

YY Chang, P Li, R Sosic, MH Afifi… - Proceedings of the 14th …, 2021 - dl.acm.org
Edge streams are commonly used to capture interactions in dynamic networks, such as
email, social, or computer networks. The problem of detecting anomalies or rare events in …

Scam pandemic: How attackers exploit public fear through phishing

M Bitaab, H Cho, A Oest, P Zhang, Z Sun… - … on Electronic Crime …, 2020 - ieeexplore.ieee.org
As the COVID-19 pandemic started triggering widespread lockdowns across the globe,
cybercriminals did not hesitate to take advantage of users' increased usage of the Internet …

The need for new antiphishing measures against spear-phishing attacks

L Allodi, T Chotza, E Panina… - IEEE Security & …, 2019 - ieeexplore.ieee.org
In this study, we provide extensive analysis of the (unique) characteristics of phishing and
spear-phishing attacks, argue that spear-phishing attacks cannot be well captured by current …