Proceedings of the New Security Paradigms Workshop 2019
DOI: 10.1145/3368860.3368863
|View full text |Cite
|
Sign up to set email alerts
|

Manipulation of perceived politeness in a web-based email discourse through a malicious browser extension

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 49 publications
0
5
0
Order By: Relevance
“…Bullee et al (2017) find that participants from countries with a higher Power Distance Index (PDI), which means that individuals are more likely to comply with hierarchy, are more vulnerable to phishing than those individuals from countries with a lower PDI. Sharevski et al (2019) show how to leverage cultural factors to tailor message appeal.…”
Section: Culturementioning
confidence: 99%
“…Bullee et al (2017) find that participants from countries with a higher Power Distance Index (PDI), which means that individuals are more likely to comply with hierarchy, are more vulnerable to phishing than those individuals from countries with a lower PDI. Sharevski et al (2019) show how to leverage cultural factors to tailor message appeal.…”
Section: Culturementioning
confidence: 99%
“…The first is research on adversarial machine learning, which is a study of how adversaries can gain an advantage over a deployed machine learning model by figuring out how the model works and changing the model's decision boundary, or its inputs until it mis-classifies the input [35]. The second body of research is on ambient tactical deception or ATD [69], which is a linguistics manipulation attack targeting the textual content of a web page, social media post, or an email with the goal to deceive a target user.…”
Section: Trollhunter-evader: Evading Automated Trolling Detection 41 ...mentioning
confidence: 99%
“…The malware is packaged as a browser extension, an email client "add-in" (e.g. Outlook), or an entirely new application [69]. Developing extensions, add-ins and apps is free and a benign software can pass all the security checks before publishing [53].…”
Section: Adversarial Machine Learningmentioning
confidence: 99%
See 2 more Smart Citations