CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhang, Penghui | - |
dc.contributor.author | Oest, Adam | - |
dc.contributor.author | Cho, Haehyun | - |
dc.contributor.author | Sun, Zhibo | - |
dc.contributor.author | Johnson, R. C. | - |
dc.contributor.author | Wardman, Brad | - |
dc.contributor.author | Sarker, Shaown | - |
dc.contributor.author | Kapravelos, Alexandros | - |
dc.contributor.author | Bao, Tiffany | - |
dc.contributor.author | Wang, Ruoyu | - |
dc.contributor.author | Shoshitaishvili, Yan | - |
dc.contributor.author | Doupe, Adam | - |
dc.contributor.author | Ahn, Gail-Joon | - |
dc.date.accessioned | 2022-07-28T01:40:07Z | - |
dc.date.available | 2022-07-28T01:40:07Z | - |
dc.date.created | 2022-03-11 | - |
dc.date.issued | 2022-03 | - |
dc.identifier.issn | 1540-7993 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/42420 | - |
dc.description.abstract | Phishing websites with advanced evasion techniques are a critical threat to Internet users because they delay detection by current antiphishing systems. We present CrawlPhish, a framework for automatically detecting and categorizing the client-side (e.g., JavaScript) evasion used by phishing websites. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.relation.isPartOf | IEEE SECURITY & PRIVACY | - |
dc.title | CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/MSEC.2021.3129992 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | IEEE SECURITY & PRIVACY, v.20, no.2, pp.10 - 21 | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000732241200001 | - |
dc.identifier.scopusid | 2-s2.0-85127500124 | - |
dc.citation.endPage | 21 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 10 | - |
dc.citation.title | IEEE SECURITY & PRIVACY | - |
dc.citation.volume | 20 | - |
dc.contributor.affiliatedAuthor | Cho, Haehyun | - |
dc.type.docType | Article; Early Access | - |
dc.description.isOpenAccess | N | - |
dc.subject.keywordAuthor | Phishing | - |
dc.subject.keywordAuthor | Codes | - |
dc.subject.keywordAuthor | Browsers | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Crawlers | - |
dc.subject.keywordAuthor | Visualization | - |
dc.subject.keywordAuthor | Internet | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.