2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) 2020
DOI: 10.1109/compsac48688.2020.0-125
|View full text |Cite
|
Sign up to set email alerts
|

Abuse of the Cloud as an Attack Platform

Abstract: We present an exploratory study of responses from 75 security professionals and ethical hackers in order to understand how they abuse cloud platforms for attack purposes. The participants were recruited at the Black Hat and DEF CON conferences. We presented the participants' with various attack scenarios and asked them to explain the steps they would have carried out for launching the attack in each scenario. Participants' responses were studied to understand attackers' mental models, which would improve our u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 3 publications
(3 reference statements)
0
1
0
Order By: Relevance
“…Hosting Phishing Websites on the Cloud: Attackers are now able to host a phishing website on the cloud platform to steal credentials of legitimate users on the Internet [6], [7], [13], [14]. Attackers had developed a phishing website that asked users to enter their Microsoft 365 credentials 5,6 . The website was designed and hosted on a popular website creation and hosting service called http://www.wix.com.…”
Section: Attack Types Launched On Cloudmentioning
confidence: 99%

Launching Stealth Attacks using Cloud

Chatterjee,
Datta,
Abri
et al. 2020
Preprint
Self Cite
“…Hosting Phishing Websites on the Cloud: Attackers are now able to host a phishing website on the cloud platform to steal credentials of legitimate users on the Internet [6], [7], [13], [14]. Attackers had developed a phishing website that asked users to enter their Microsoft 365 credentials 5,6 . The website was designed and hosted on a popular website creation and hosting service called http://www.wix.com.…”
Section: Attack Types Launched On Cloudmentioning
confidence: 99%

Launching Stealth Attacks using Cloud

Chatterjee,
Datta,
Abri
et al. 2020
Preprint
Self Cite