2017 IEEE Symposium on Security and Privacy (SP) 2017
DOI: 10.1109/sp.2017.11
|View full text |Cite
|
Sign up to set email alerts
|

How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 42 publications
(15 citation statements)
references
References 23 publications
0
15
0
Order By: Relevance
“…Many SE attacks use web pages that have copyright infringement, such as illegal downloads and free video streaming, to draw the attention of incautious users [8], [18]. To induce a user to access such web pages, attackers use search-engine-optimization techniques [19]- [21] and post messages on social media, which include links to the landing pages [22]- [24]. Examples of such social-media postings are an instruction video for illegally installing software and a message introducing a free game download site.…”
Section: Landing-page-collection Modulementioning
confidence: 99%
“…Many SE attacks use web pages that have copyright infringement, such as illegal downloads and free video streaming, to draw the attention of incautious users [8], [18]. To induce a user to access such web pages, attackers use search-engine-optimization techniques [19]- [21] and post messages on social media, which include links to the landing pages [22]- [24]. Examples of such social-media postings are an instruction video for illegally installing software and a message introducing a free game download site.…”
Section: Landing-page-collection Modulementioning
confidence: 99%
“…In such a situation, a company can publish the repository on GitHub and place a link to their homepage on GitHub. By exploiting GitHub's web ranking, their links are also promoted, similar to "blackhat SEO" illustrated in [10,46]. Here we give an example of GitHub "blackhat SEO" utilized, in which we inspect the strategy for this company to promote their business via GitHub.…”
Section: Promotion By Small Businessesmentioning
confidence: 99%
“…Many SE attacks use web pages that have copyright infringement, such as illegal downloads and free video streaming, to draw the attention of incautious users [13,27]. To induce a user to access to such web pages, attackers use search-engine-optimization techniques [15,21,37] and post messages on social media, which include links to the landing pages [14,19,26]. Examples of such social-media postings are an instruction video for illegally installing software and a message introducing a free game download site.…”
Section: Landing-page-collection Modulementioning
confidence: 99%