2021 IEEE Symposium on Security and Privacy (SP) 2021
DOI: 10.1109/sp40001.2021.00021
|View full text |Cite
|
Sign up to set email alerts
|

CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 43 publications
(11 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…These URLs can be used as a starting point for analyzing the full picture of attacks, or as intelligence for block lists that automatically detect spam e-mails and SMSs. Many experts share URLs after redirects, which sometimes cannot be analyzed because they are inaccessible without the proper referrer [66], and are not suitable information to prevent the spread of phishing emails and SMSs.…”
Section: Analysis Of the Detected Urls' Characteristicsmentioning
confidence: 99%
“…These URLs can be used as a starting point for analyzing the full picture of attacks, or as intelligence for block lists that automatically detect spam e-mails and SMSs. Many experts share URLs after redirects, which sometimes cannot be analyzed because they are inaccessible without the proper referrer [66], and are not suitable information to prevent the spread of phishing emails and SMSs.…”
Section: Analysis Of the Detected Urls' Characteristicsmentioning
confidence: 99%
“…However, if a site has a tracking script, it may detect the crawler and hinder its normal detection abilities, particularly for phishing sites. Zhang et al [72] revealed that Page Cloaking uses a combination of user interaction, bot behavior, and fingerprinting technology. Fingerprinting involves checking cookies, Referer, and User-agent to determine if the visitor is a person or an anti-phishing bot.…”
Section: Page Cloakingmentioning
confidence: 99%
“…For instance, Tian et al [85] evade PWD that use common blacklists, and their main proposal is to use ML as a detection engine to counter such "squatting" phishing websites. Hence, non-ML-PWD (e.g., [96]) are outside our scope.…”
Section: Related Workmentioning
confidence: 99%