Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems 2020
DOI: 10.1145/3313831.3376298
|View full text |Cite
|
Sign up to set email alerts
|

Measuring Identity Confusion with Uniform Resource Locators

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 26 publications
3
14
0
Order By: Relevance
“…An attacker could use such animated URL transitions to obscure the redirections. Finally, Chrome is currently experimenting with hiding the full URL in the address bar and only showing the domain [4] as a way to combat phishing attacks [68]. If Chrome or other browsers permanently adopt this feature where only the main domain is shown by default, our attack will be completely invisible to users as it leverages redirections within the same domain.…”
Section: Discussionmentioning
confidence: 99%
“…An attacker could use such animated URL transitions to obscure the redirections. Finally, Chrome is currently experimenting with hiding the full URL in the address bar and only showing the domain [4] as a way to combat phishing attacks [68]. If Chrome or other browsers permanently adopt this feature where only the main domain is shown by default, our attack will be completely invisible to users as it leverages redirections within the same domain.…”
Section: Discussionmentioning
confidence: 99%
“…For example, Albakry et al [2] found that users cannot differentiate between a company name in the subdomain vs. the domain of a URL. Similarly, Reynolds et al [69] found that users struggle to correctly parse URLs, but have high self-confidence in their ability to interpret URLs. A dangerous combination that helps attackers.…”
Section: Mouse Over the Link And Look At The Urlmentioning
confidence: 98%
“…Even skilled security experts have difficulties with this kind of deception [17,24]. For example, in socalled homograph attacks English characters are substituted with identical looking UTF8-encoded characters from different alphabets such as páypal.com and paypal.com [22,25,69]. Another example of a look alike attack is misspelling (typosquatting).…”
Section: Mouse Over the Link And Look At The Urlmentioning
confidence: 99%
See 2 more Smart Citations