2019 IEEE Symposium on Security and Privacy (SP) 2019
DOI: 10.1109/sp.2019.00049
|View full text |Cite
|
Sign up to set email alerts
|

PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists

Abstract: Phishing attacks have reached record volumes in recent years. Simultaneously, modern phishing websites are growing in sophistication by employing diverse cloaking techniques to avoid detection by security infrastructure. In this paper, we present PhishFarm: a scalable framework for methodically testing the resilience of anti-phishing entities and browser blacklists to attackers' evasion efforts. We use PhishFarm to deploy 2,380 live phishing sites (on new, unique, and previously-unseen .com domains) each using… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
49
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 77 publications
(63 citation statements)
references
References 32 publications
1
49
0
Order By: Relevance
“…As detailed in Table 1, our dataset contains 531,970,560 phishing emails. We caution this is an underestimate of all email-based phishing, due to the possibility of evasion and detection latency [44], as well as non-URL phishing.…”
Section: Detecting Attack Targetsmentioning
confidence: 95%
“…As detailed in Table 1, our dataset contains 531,970,560 phishing emails. We caution this is an underestimate of all email-based phishing, due to the possibility of evasion and detection latency [44], as well as non-URL phishing.…”
Section: Detecting Attack Targetsmentioning
confidence: 95%
“…Phishing based attacks are typically an online variant of offline fraud, using misdirection and passing off, e.g. see [23].…”
Section: Related Workmentioning
confidence: 99%
“…They sell phishing kits in underground marketplaces and accept custom requests for kit creation [3,29]. Phishing kits include server-side and client-side evasion techniques using server directives (.htaccess files), server-side scripts, and JavaScript to interfere with detection by the security community [28,29]. The evasion is carried out based on a client IP address, referrer, and user agent.…”
Section: Phishing Kit and Evasionmentioning
confidence: 99%