Skip to main content

Showing 1–3 of 3 results for author: Oest, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.09824  [pdf, other

    cs.CR

    Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams

    Authors: Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, Thorsten Holz

    Abstract: The mainstream adoption of cryptocurrencies has led to a surge in wallet-related issues reported by ordinary users on social media platforms. In parallel, there is an increase in an emerging fraud trend called cryptocurrency-based technical support scam, in which fraudsters offer fake wallet recovery services and target users experiencing wallet-related issues. In this paper, we perform a compre… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  2. arXiv:2205.07411  [pdf, other

    cs.CR

    Phishing Detection Leveraging Machine Learning and Deep Learning: A Review

    Authors: Dinil Mon Divakaran, Adam Oest

    Abstract: Phishing attacks trick victims into disclosing sensitive information. To counter rapidly evolving attacks, we must explore machine learning and deep learning models leveraging large-scale data. We discuss models built on different kinds of data, along with their advantages and disadvantages, and present multiple deployment options to detect phishing attacks.

    Submitted 15 May, 2022; originally announced May 2022.

    Comments: Paper accepted for publication at IEEE Security & Privacy

  3. arXiv:2103.12843  [pdf, other

    cs.CR

    Scam Pandemic: How Attackers Exploit Public Fear through Phishing

    Authors: Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn

    Abstract: As the COVID-19 pandemic started triggering widespread lockdowns across the globe, cybercriminals did not hesitate to take advantage of users' increased usage of the Internet and their reliance on it. In this paper, we carry out a comprehensive measurement study of online social engineering attacks in the early months of the pandemic. By collecting, synthesizing, and analyzing DNS records, TLS cer… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: 10 pages, Accepted to eCrime 2020