Abstract
Sometimes a "friendly" email message tempts recipients to reveal more online than they otherwise would, playing right into the sender's hand.
Supplemental Material
Available for Download
Requires Asian Language Support in Adobe Reader And Japanese Language Support in your Browser
- Adamic, L.A. and Adar, E. Friends and neighbors on the Web. Social Networks 25, 3 (July 2003), 211--230.Google ScholarCross Ref
- Chou, N. Ledesma, R., Teraguchi, Y., Boneh, D., and Mitchell, J.C. Client-side defense against Web-based identity theft. In Proceedings of the 11th Annual Network and Distributed System Security Symposium. (Feb. 2004).Google Scholar
- Dhamija, R. and Tygar, J.D. The battle against phishing: Dynamic security skins. In Proceedings of the ACM Symposium on Usable Security and Privacy. (2005), 77--88. Google ScholarDigital Library
- Emigh, A. Online identity theft: Phishing technology, chokepoints and countermeasures. ITTC Report on Online Identity Theft Technology and Countermeaures (Oct. 2005); www.anti-phishing.org/Phishing-dhs-report.pdf.Google Scholar
- Ferguson, A.J. Fostering e-mail security awareness: The West Point carronade. Educause Quarterly 28, 1 (2005).Google Scholar
- Finn, P. and Jakobsson, M. Designing and conducting phishing experiments. IEEE Technology and Society Magazine, Special Issue on Usability and Security (2005).Google Scholar
- Garfinkel, S. and Miller, R. Johnny 2: A user test of key continuity management with s/mime and outlook express. Presented at the Symposium on Usable Privacy and Security (July 6--8, 2005, Pittsburgh, PA). Google ScholarDigital Library
- Griffith, V. and Jakobsson, M. Messin' with Texas: Deriving mother's maiden names using public records. RSA CryptoBytes 8, 1 (2006).Google Scholar
- Gartner Group. Gartner study finds significant increase in e-mail phishing attacks (Apr. 2004); www.gartner.com/5_about/press_releases/asset_71087_11.jsp, April 2004.Google Scholar
- Jakobsson, M. Modeling and preventing phishing attacks. In Phishing Panel at Financial Cryptography. Feb. 2005. Google ScholarDigital Library
- Jakobsson, M. and Myers, S. Phishing and Counter-Measures. John Wiley and Sons, 2006. Google ScholarDigital Library
- Jakobsson, M. and Stamm, S. Invasive browser sniffing and countermeasures. In WWW `06: Proceedings of the 15th International Conference on World Wide Web. ACM Press, NY, 2006, 523--532. Google ScholarDigital Library
Index Terms
- Social phishing
Recommendations
How Experts Detect Phishing Scam Emails
CSCWPhishing scam emails are emails that pretend to be something they are not in order to get the recipient of the email to undertake some action they normally would not. While technical protections against phishing reduce the number of phishing emails ...
A Sender-Centric Approach to Detecting Phishing Emails
CYBERSECURITY '12: Proceedings of the 2012 International Conference on Cyber SecurityEmail-based online phishing is a critical security threat on the Internet. Although phishers have great flexibility in manipulating both the content and structure of phishing emails, phishers have much less flexibility in completely concealing the ...
Comments