Abstract—This paper describes an innovative approach toward defending against phishing attacks by using HTTPS proxying and attribute-based checks. After a short overview of phishing, we describe the functional architecture of the PhishBouncer1 HTTPS proxy together with various deployment options. We then explain a number of anti-phishing algorithms implemented as plugins and highlight which attributes of phishing sites they consider. Next, we describe in detail how the proxy intercepts SSL traffic for HTTPS proxying. To assess the effectiveness and applicability of this prototype, we performed extensive experimental testing. We present a fully automated crawling framework that we developed for testing, along with the main experimental resul...
Web users are increasingly victims of phishing, spoofing and malware attacks. In this article, we di...
Abstract—Recent research efforts have highlighted the role of information as key target future netwo...
We built a novel scalable, low-cost, and generic platform named PhishPrint to enable the evaluation ...
Abstract—This paper describes a set of innovative attribute-based checks for defending against phish...
Online banking and e-commerce applications have good protection against attacks directed direct towa...
As we become more digitalized and we rely more heavily on the internet, the more important it is to ...
There are currently dozens of freely available tools to combat phishing and other web-based scams, m...
There are currently dozens of freely available tools to combat phishing and other web-based scams, m...
Abstract—During the last years, the Internet has grown into a mass-medium for communication and info...
Abstract. Phishing and Web spoofing have proliferated and become a major nuisance on the Internet. T...
Phishing is deceptive collection of personal information leading to embezzlement, identity theft, an...
Phishing is a form of online identity theft that aims to steal sensitive information such as online ...
This paper presents the results of a study performed over phishing threats and vulnerabilities prese...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
Phishing is a fraudulent activity that includes tricking people into disclosing personal or financia...
Web users are increasingly victims of phishing, spoofing and malware attacks. In this article, we di...
Abstract—Recent research efforts have highlighted the role of information as key target future netwo...
We built a novel scalable, low-cost, and generic platform named PhishPrint to enable the evaluation ...
Abstract—This paper describes a set of innovative attribute-based checks for defending against phish...
Online banking and e-commerce applications have good protection against attacks directed direct towa...
As we become more digitalized and we rely more heavily on the internet, the more important it is to ...
There are currently dozens of freely available tools to combat phishing and other web-based scams, m...
There are currently dozens of freely available tools to combat phishing and other web-based scams, m...
Abstract—During the last years, the Internet has grown into a mass-medium for communication and info...
Abstract. Phishing and Web spoofing have proliferated and become a major nuisance on the Internet. T...
Phishing is deceptive collection of personal information leading to embezzlement, identity theft, an...
Phishing is a form of online identity theft that aims to steal sensitive information such as online ...
This paper presents the results of a study performed over phishing threats and vulnerabilities prese...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
Phishing is a fraudulent activity that includes tricking people into disclosing personal or financia...
Web users are increasingly victims of phishing, spoofing and malware attacks. In this article, we di...
Abstract—Recent research efforts have highlighted the role of information as key target future netwo...
We built a novel scalable, low-cost, and generic platform named PhishPrint to enable the evaluation ...