Sciweavers

Share
ACSAC
2006
IEEE
9 years 6 months ago
Anomaly Based Web Phishing Page Detection
Many anti-phishing schemes have recently been proposed in literature. Despite all those efforts, the threat of phishing attacks is not mitigated. One of the main reasons is that p...
Ying Pan, Xuhua Ding
FC
2007
Springer
105views Cryptology» more  FC 2007»
9 years 6 months ago
Phishing IQ Tests Measure Fear, Not Ability
We argue that phishing IQ tests fail to measure susceptibility to phishing attacks. We conducted a study where 40 subjects were asked to answer a selection of questions from exist...
Vivek Anandpara, Andrew Dingman, Markus Jakobsson,...
FC
2007
Springer
111views Cryptology» more  FC 2007»
9 years 6 months ago
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks
Abstract. In this usability study of phishing attacks and browser antiphishing defenses, 27 users each classified 12 web sites as fraudulent or legitimate. By dividing these users...
Collin Jackson, Daniel R. Simon, Desney S. Tan, Ad...
CCS
2007
ACM
9 years 6 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
ACSAC
2008
IEEE
9 years 6 months ago
Anti-Phishing in Offense and Defense
Many anti-phishing mechanisms currently focus on helping users verify whether a web site is genuine. However, usability studies have demonstrated that prevention-based approaches ...
Chuan Yue, Haining Wang
FC
2009
Springer
106views Cryptology» more  FC 2009»
9 years 6 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
AIMS
2009
Springer
9 years 6 months ago
Scalable Detection and Isolation of Phishing
Abstract. This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and...
Giovane C. M. Moura, Aiko Pras
NCA
2009
IEEE
9 years 6 months ago
Attribute-Based Prevention of Phishing Attacks
Abstract—This paper describes a set of innovative attributebased checks for defending against phishing attacks1 . We explain a number of anti-phishing algorithms implemented as p...
Michael Atighetchi, Partha Pratim Pal
books