Proceedings of the 15th ACM Asia Conference on Computer and Communications Security 2020
DOI: 10.1145/3320269.3384753
|View full text |Cite
|
Sign up to set email alerts
|

Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders

Abstract: Why do "classical" attacks such as phishing, IRS scams, etc., still succeed? How do attackers increase their chances of success? How do people reason about scams and frauds they face daily? More research is needed on these questions, which is the focus of this paper. We take a well-known attack, viz. company representative fraud, and study several parameters that bear on its effectiveness with a between-subjects study. We also study the effectiveness of a coherent language generation technique in producing phi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 39 publications
0
0
0
Order By: Relevance