2017 12th Asia Joint Conference on Information Security (AsiaJCIS) 2017
DOI: 10.1109/asiajcis.2017.19
|View full text |Cite
|
Sign up to set email alerts
|

UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…In our previous work [34], we developed a prototype of an Android application (UnPhishMe) that simulates a user login procedure by using dummy login credentials to thwart phishing attacks. We used the automation framework (Selendroid [27]) which has the ability to manipulate the User Interface (UI) of Android native and web apps.…”
Section: B Recommended System Strategy For Phishing Detection On Smartphonesmentioning
confidence: 99%
“…In our previous work [34], we developed a prototype of an Android application (UnPhishMe) that simulates a user login procedure by using dummy login credentials to thwart phishing attacks. We used the automation framework (Selendroid [27]) which has the ability to manipulate the User Interface (UI) of Android native and web apps.…”
Section: B Recommended System Strategy For Phishing Detection On Smartphonesmentioning
confidence: 99%
“…These factors increase the chances and risks of Wi-Fi hotspot spoofing [11]. Furthermore, since mobile devices have small computing resources, they do not offer the same level of built-in security mechanisms as desktop computers [12], [23].…”
Section: Introductionmentioning
confidence: 99%
“…The detection could be done by determining the legitimacy of AP using details collected from their broadcasts (probe responses). On the other hand, we adopt the method proposed by [23] to detect fake APs with a captive portal by deceiving the portal with fake login credentials, which minimises the risk of users exposing their true credentials to attackers. We do this by simulating a fake captive portal on Android devices.…”
Section: Introductionmentioning
confidence: 99%
“…Despite the fact that cyberattacks relying on users' naivety such as phishing are persistent [8], the cybersecurity knowledge among many users globally is still low especially in developing countries [10], [16], [17]. Previous studies have only focused on users of similar or certain demographics: permanently residing in developed countries, certain age, certain socio-economic status etc., Refs.…”
Section: Introductionmentioning
confidence: 99%