What Happens After You Leak Your Password - Understanding Credential Sharing on Phishing Sites

    AsiaCCS, pp. 181-192, 2019.

    Cited by: 4|Bibtex|Views6|Links
    EI

    Abstract:

    Phishing has been a big concern due to its active roles in recent data breaches and state-sponsored attacks. While existing works have extensively analyzed phishing websites and their operations, there is still a limited understanding of the information sharing flows throughout the end-to-end phishing process. In this paper, we perform an...More

    Code:

    Data:

    Your rating :
    0

     

    Tags
    Comments