Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security 2017
DOI: 10.1145/3052973.3053037
|View full text |Cite
|
Sign up to set email alerts
|

Scaling and Effectiveness of Email Masquerade Attacks

Abstract: We focus on email-based attacks, a rich field with wellpublicized consequences. We show how current Natural Language Generation (NLG) technology allows an attacker to generate masquerade attacks on scale, and study their effectiveness with a within-subjects study. We also gather insights on what parts of an email do users focus on and how users identify attacks in this realm, by planting signals and also by asking them for their reasoning. We find that: (i) 17% of participants could not identify any of the sig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 29 publications
(32 citation statements)
references
References 42 publications
0
32
0
Order By: Relevance
“…NLG is a challenging research area in which the goal is to generate coherent, human-like text. The Dada engine [11] has been previously used to construct short masquerade emails [5] as well as academic papers on postmodernism [10]. It is a text generation tool based on the recursive transition network (RTN).…”
Section: Natural Language Generation and Dadamentioning
confidence: 99%
See 3 more Smart Citations
“…NLG is a challenging research area in which the goal is to generate coherent, human-like text. The Dada engine [11] has been previously used to construct short masquerade emails [5] as well as academic papers on postmodernism [10]. It is a text generation tool based on the recursive transition network (RTN).…”
Section: Natural Language Generation and Dadamentioning
confidence: 99%
“…Some of the offers had this sentence "we found your resume on Monster.com," so some participants mentioned why the offer should be sent through LinkedIn while they found the resume on Monster. 5 (3) Some mentioned that the profile picture is unprofessional or has low quality.…”
Section: Practical Issuesmentioning
confidence: 99%
See 2 more Smart Citations
“…Whilst there has been research using eye trackers to understand engagement with phishing website there is less research applying this technology to phishing emails (Baki et al, 2017), which are one vector through which targets may be directed to a phishing website in the first instance. There are recommendations made to the public by various organizations around what is likely to denote something as being a phishing email, such as the National Cyber Security Centre advice to look for misspellings, the use of urgency and the use of threatening language (National Cyber Security Centre, 2020), which reflects the typical features of phishing emails identified in the literature (Pfeffel et al, 2019).…”
Section: Introductionmentioning
confidence: 99%