We built a novel scalable, low-cost, and generic platform named PhishPrint to enable the evaluation of Web Security Crawlers (WSCs) against previously unknown cloaking weaknesses. PhishPrint completely avoids the use of any simulated phishing sites and blocklisting measurements. We used PhishPrint to evaluate an unprecedented number of WSCs (23) including highly ubiquitous services such as Google Safe Browsing and Microsoft Outlook e-mail scanners. Our 70-day study found several unknown cloaking weaknesses with which we constructed 5 effective cloaking attack vectors (including 4 novel ones). In particular, it was shown that the entire WSC ecosystem is extremely vulnerable to a novel browser fingerprinting-based cloaking attack. We confirme...
Phishing has been easy and effective way for trickery and deception on the Internet. While solutions...
Phishing is a form of online identity theft that aims to steal sensitive information such as online ...
Phishing is a model problem for illustrating usability concerns of privacy and security because both...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
There are currently dozens of freely available tools to combat phishing and other web-based scams, m...
AbstractPhishing is a website forgery with an intention to track and steal the sensitive information...
There are currently dozens of freely available tools to combat phishing and other web-based scams, m...
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article dis...
The large-scale deployment of modern phishing attacks relies on the automatic exploitation of vulner...
Abstract—This paper describes an innovative approach toward defending against phishing attacks by us...
Nowadays, the majority of everyday computing devices, irrespective of their size and operating syste...
Password-based authentication is widely used online, despite its numerous shortcomings, enabling att...
Abstract. Phishing is an electronic online identity theft in which the attackers use a combination o...
Phishing is a form of online identity theft that deceives unaware users into disclosing their con de...
International audienceData available on the Web, such as financial data or public reviews, provides ...
Phishing has been easy and effective way for trickery and deception on the Internet. While solutions...
Phishing is a form of online identity theft that aims to steal sensitive information such as online ...
Phishing is a model problem for illustrating usability concerns of privacy and security because both...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
There are currently dozens of freely available tools to combat phishing and other web-based scams, m...
AbstractPhishing is a website forgery with an intention to track and steal the sensitive information...
There are currently dozens of freely available tools to combat phishing and other web-based scams, m...
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article dis...
The large-scale deployment of modern phishing attacks relies on the automatic exploitation of vulner...
Abstract—This paper describes an innovative approach toward defending against phishing attacks by us...
Nowadays, the majority of everyday computing devices, irrespective of their size and operating syste...
Password-based authentication is widely used online, despite its numerous shortcomings, enabling att...
Abstract. Phishing is an electronic online identity theft in which the attackers use a combination o...
Phishing is a form of online identity theft that deceives unaware users into disclosing their con de...
International audienceData available on the Web, such as financial data or public reviews, provides ...
Phishing has been easy and effective way for trickery and deception on the Internet. While solutions...
Phishing is a form of online identity theft that aims to steal sensitive information such as online ...
Phishing is a model problem for illustrating usability concerns of privacy and security because both...