{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:41:41Z","timestamp":1772905301692,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100009224","name":"Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["ARPA-h SP4701-23-C-0074"],"award-info":[{"award-number":["ARPA-h SP4701-23-C-0074"]}],"id":[{"id":"10.13039\/100009224","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N6600122C44026"],"award-info":[{"award-number":["N6600122C44026"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N66001-20-C-4020"],"award-info":[{"award-number":["N66001-20-C-4020"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3657027","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"638-653","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2863-0808","authenticated-orcid":false,"given":"Rana","family":"Pourmohamad","sequence":"first","affiliation":[{"name":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5394-9760","authenticated-orcid":false,"given":"Steven","family":"Wirsz","sequence":"additional","affiliation":[{"name":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, United States of America"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4313-3714","authenticated-orcid":false,"given":"Adam","family":"Oest","sequence":"additional","affiliation":[{"name":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, United States of America"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6424-0001","authenticated-orcid":false,"given":"Tiffany","family":"Bao","sequence":"additional","affiliation":[{"name":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, United States of America"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8832-1789","authenticated-orcid":false,"given":"Yan","family":"Shoshitaishvili","sequence":"additional","affiliation":[{"name":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, United States of America"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1524-2566","authenticated-orcid":false,"given":"Ruoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, United States of America"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2634-3901","authenticated-orcid":false,"given":"Adam","family":"Doup\u00e9","sequence":"additional","affiliation":[{"name":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, United States of America"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1872-1634","authenticated-orcid":false,"given":"Rida A.","family":"Bazzi","sequence":"additional","affiliation":[{"name":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, United States of America"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Browser Security Comparative Analysis. NSS Labs","author":"Abrams R","year":"2013","unstructured":"R Abrams, Orlando Barrera, and J Pathak. 2013. Browser Security Comparative Analysis. NSS Labs (2013)."},{"key":"e_1_3_2_1_2_1","volume-title":"22nd {USENIX} Security Symposium ({USENIX} Security 13). 257--272.","author":"Akhawe Devdatta","unstructured":"Devdatta Akhawe and Adrienne Porter Felt. 2013. Alice in warningland: A large-scale field study of browser security warning effectiveness. In 22nd {USENIX} Security Symposium ({USENIX} Security 13). 257--272."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375708.3380315"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.006"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings","volume":"11559","author":"Anderson Charles","year":"2019","unstructured":"Charles Anderson. 2019. Adversarial Sampling Attacks Against Phishing Detection. In Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15--17, 2019, Proceedings, Vol. 11559. Springer, 83."},{"key":"e_1_3_2_1_6_1","volume-title":"Phishing Activity Trends Report: Q3","author":"Anti-Phishing Working Group (APWG). 2022.","year":"2022","unstructured":"Anti-Phishing Working Group (APWG). 2022. Phishing Activity Trends Report: Q3 2022. https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q3_2022.pdf. (2022). Accessed on April 20, 2023."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567980"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373017.3373020"},{"key":"e_1_3_2_1_9_1","volume-title":"BEYOND PHISH: Toward Detecting Fraudulent e-Commerce Websites at Scale. In S and P.","year":"2023","unstructured":"Bitaab. 2023. BEYOND PHISH: Toward Detecting Fraudulent e-Commerce Websites at Scale. In S and P."},{"key":"e_1_3_2_1_10_1","volume-title":"2020 APWG Symposium on Electronic Crime Research (eCrime).","author":"Bitaab Marzieh","year":"2020","unstructured":"Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doup\u00e9, and Gail-Joon Ahn. 2020. Scam Pandemic: How Attackers Exploit Public Fear through Phishing. In 2020 APWG Symposium on Electronic Crime Research (eCrime)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2019.1552745"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3398071"},{"key":"e_1_3_2_1_13_1","volume-title":"Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. computers & security 73","author":"Chen Sen","year":"2018","unstructured":"Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, and Bo Li. 2018. Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. computers & security 73 (2018), 326--344."},{"key":"e_1_3_2_1_14_1","volume-title":"2018 USENIX Workshop on Advances in Security Education (ASE 18)","author":"Chothia Tom","year":"2018","unstructured":"Tom Chothia, Stefan-Ioan Paiu, and Michael Oultram. 2018. Phishing attacks: Learning by doing. In 2018 USENIX Workshop on Advances in Security Education (ASE 18)."},{"key":"e_1_3_2_1_15_1","unstructured":"Cisco Talos Intelligence Group. 2023. PhishTank: Phishing URL data-set operated by Cisco Talos Intelligence Group. https:\/\/phishtank.com. (2023). Accessed on April 20 2023."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546730"},{"key":"e_1_3_2_1_18_1","volume-title":"Phishing for user security awareness. computers & security 26, 1","author":"Dodge Ronald C","year":"2007","unstructured":"Ronald C Dodge Jr, Curtis Carver, and Aaron J Ferguson. 2007. Phishing for user security awareness. computers & security 26, 1 (2007), 73--80."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1065--1074","author":"Egelman Serge","year":"2008","unstructured":"Serge Egelman, Lorrie Faith Cranor, and Jason Hong. 2008. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1065--1074."},{"key":"e_1_3_2_1_20_1","unstructured":"Google. 2020. Google Chrome Privacy Whitepaper. https:\/\/www.google.com\/chrome\/privacy\/whitepaper.html. (2020)."},{"key":"e_1_3_2_1_21_1","volume-title":"accessed","year":"2023","unstructured":"Google. accessed May 4, 2023. Google Safe Browsing Transparency Report. https:\/\/safebrowsing.google.com\/. (accessed May 4, 2023)."},{"key":"e_1_3_2_1_22_1","volume-title":"accessed","year":"2023","unstructured":"Google. accessed May 4, 2023. Safe Browsing APIs (v4). https:\/\/developers.google.com\/safe-browsing\/v4\/. (accessed May 4, 2023)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0334-z"},{"key":"e_1_3_2_1_24_1","volume-title":"Phisheye: Live Monitoring of Sandboxed Phishing Kits.","author":"Han Xiao","year":"2016","unstructured":"Xiao Han, Nizar Kheir, and Davide Balzarotti. 2016. Phisheye: Live Monitoring of Sandboxed Phishing Kits. (2016), 1402--1413 pages."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 2013 conference on Internet measurement conference. 63--76","author":"Hao Shuang","year":"2013","unstructured":"Shuang Hao, Matthew Thomas, Vern Paxson, Nick Feamster, Christian Kreibich, Chris Grier, and Scott Hollenbeck. 2013. Understanding the domain registration behavior of spammers. In Proceedings of the 2013 conference on Internet measurement conference. 63--76."},{"key":"e_1_3_2_1_26_1","volume-title":"28th USENIX security symposium (USENIX security 19). 1273--1290.","author":"Ho Grant","unstructured":"Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M Voelker, and David Wagner. 2019. Detecting and characterizing lateral phishing at scale. In 28th USENIX security symposium (USENIX security 19). 1273--1290."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813086"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063197"},{"key":"e_1_3_2_1_29_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Hu Hang","year":"2021","unstructured":"Hang Hu, Steve TK Jan, Yang Wang, and Gang Wang. 2021. Assessing Browserlevel Defense against {IDN-based} Phishing. In 30th USENIX Security Symposium (USENIX Security 21). 3739--3756."},{"key":"e_1_3_2_1_30_1","volume-title":"Black-box attacks against RNN based malware detection algorithms. arXiv preprint arXiv:1705.08131","author":"Hu Weiwei","year":"2017","unstructured":"Weiwei Hu and Ying Tan. 2017. Black-box attacks against RNN based malware detection algorithms. arXiv preprint arXiv:1705.08131 (2017)."},{"key":"e_1_3_2_1_31_1","volume-title":"2009 Fifth International Conference on Information Assurance and Security","volume":"1","author":"Huang Huajun","year":"2009","unstructured":"Huajun Huang, Shaohong Zhong, and Junshan Tan. 2009. Browser-side countermeasures for deceptive phishing attack. In 2009 Fifth International Conference on Information Assurance and Security, Vol. 1. IEEE, 352--355."},{"key":"e_1_3_2_1_32_1","unstructured":"Federal Bureau Of Investigation. 2018. Business E-mail Compromise The 12 Billion Dollar Scam. (2018)."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. 1234--1236","author":"Kashapov Amir","year":"2022","unstructured":"Amir Kashapov, Tingmin Wu, Sharif Abuadbba, and Carsten Rudolph. 2022. Email summarization to assist users in phishing identification. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. 1234--1236."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560615"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560615"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484765"},{"key":"e_1_3_2_1_37_1","volume-title":"2022 IEEE Symposium on Security and Privacy (SP). IEEE, 842--859","author":"Lain Daniele","year":"2022","unstructured":"Daniele Lain, Kari Kostiainen, and Srdjan \u010capkun. 2022. Phishing in organizations: Findings from a large-scale and long-term study. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 842--859."},{"key":"e_1_3_2_1_38_1","volume-title":"2014 IEEE symposium on security and privacy. IEEE, 197--211","author":"Pavel","unstructured":"Pavel Laskov et al. 2014. Practical evasion of a learning-based classifier: A case study. In 2014 IEEE symposium on security and privacy. IEEE, 197--211."},{"key":"e_1_3_2_1_39_1","volume-title":"Dinil Mon Divakaran, and Mun Choon Chan","author":"Lee Jehyun","year":"2020","unstructured":"Jehyun Lee, Pingxiao Ye, Ruofan Liu, Dinil Mon Divakaran, and Mun Choon Chan. 2020. Building robust phishing detection system: an empirical analysis. NDSS MADWeb (2020)."},{"key":"e_1_3_2_1_40_1","volume-title":"Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers. arXiv preprint arXiv:2004.06954","author":"Lei Yusi","year":"2020","unstructured":"Yusi Lei, Sen Chen, Lingling Fan, Fu Song, and Yang Liu. 2020. Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers. arXiv preprint arXiv:2004.06954 (2020)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883060"},{"key":"e_1_3_2_1_42_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Lin Yun","year":"2021","unstructured":"Yun Lin, Ruofan Liu, Dinil Mon Divakaran, Jun Yang Ng, Qing Zhou Chan, Yiwen Lu, Yuxuan Si, Fan Zhang, and Jin Song Dong. 2021. Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages. In 30th USENIX Security Symposium (USENIX Security 21). 3793--3810."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/3359012.3359021"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2703808"},{"key":"e_1_3_2_1_45_1","volume-title":"Better password protections in Chrome. https:\/\/blog.google\/products\/chrome\/better-password-protections. (Dec","author":"Mardini AbdelKarim","year":"2019","unstructured":"AbdelKarim Mardini. 2019. Better password protections in Chrome. https:\/\/blog.google\/products\/chrome\/better-password-protections. (Dec 2019)."},{"key":"e_1_3_2_1_46_1","volume-title":"2013 5th International Conference on Information and Communication Technologies. IEEE, 1--5.","author":"Mazher Noman","year":"2013","unstructured":"Noman Mazher, Imran Ashraf, and Ayesha Altaf. 2013. Which web browser work best for detecting phishing. In 2013 5th International Conference on Information and Communication Technologies. IEEE, 1--5."},{"key":"e_1_3_2_1_47_1","volume-title":"IFIP International Conference on Digital Forensics. Springer, 155--168","author":"McCalley Heather","year":"2011","unstructured":"Heather McCalley, Brad Wardman, and Gary Warner. 2011. Analysis of backdoored phishing kits. In IFIP International Conference on Digital Forensics. Springer, 155--168."},{"key":"e_1_3_2_1_48_1","first-page":"4","article-title":"Behind Phishing: An Examination of Phisher Modi Operandi","volume":"8","author":"McGrath D Kevin","year":"2008","unstructured":"D Kevin McGrath and Minaxi Gupta. 2008. Behind Phishing: An Examination of Phisher Modi Operandi. LEET 8 (2008), 4.","journal-title":"LEET"},{"key":"e_1_3_2_1_49_1","volume-title":"accessed","year":"2023","unstructured":"Microsoft. accessed May 4, 2023. Microsoft Defender SmartScreen Overview. https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-smartscreen\/microsoft-defender-smartscreen-overview. (accessed May 4, 2023)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3350546.3352565"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00049"},{"key":"e_1_3_2_1_52_1","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20). 379--396.","author":"Oest Adam","unstructured":"Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, and Adam Doup\u00e9. 2020. PhishTime: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 379--396."},{"key":"e_1_3_2_1_53_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Oest Adam","year":"2020","unstructured":"Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, and Adam Doup\u00e9. 2020. {PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists. In 29th USENIX Security Symposium (USENIX Security 20). 379--396."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2018.8376206"},{"key":"e_1_3_2_1_55_1","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20).","author":"Oest Adam","unstructured":"Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doup\u00e9, and Gail-Joon Ahn. 2020. Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. In 29th {USENIX} Security Symposium ({USENIX} Security 20)."},{"key":"e_1_3_2_1_56_1","volume-title":"Ren\u00e9 Rydhof Hansen, and Jens Myrup Pedersen","author":"Panum Thomas Kobber","year":"2020","unstructured":"Thomas Kobber Panum, Kaspar Hageman, Ren\u00e9 Rydhof Hansen, and Jens Myrup Pedersen. 2020. Towards Adversarial Phishing Detection. In 13th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 20)."},{"key":"e_1_3_2_1_57_1","volume-title":"Nair and Varun Khaneja","author":"Patrick Nepper Vasilii Sukhanov","year":"2019","unstructured":"Vasilii Sukhanov Patrick Nepper, Kiran C. Nair and Varun Khaneja. 2019. Better password protections in Chrome - How it works. https:\/\/security.googleblog.com\/2019\/12\/better-password-protections-in-chrome.html. (Dec 2019)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329818"},{"key":"e_1_3_2_1_59_1","volume-title":"Symposium on Usable Security and Privacy (USEC)","author":"Pilavakis Nikolas","year":"2023","unstructured":"Nikolas Pilavakis, Adam Jenkins, Nadin K\u00f6kciyan, and Kami Vaniea. 2023. \"I didn't click\": What users say when reporting phishing. In Symposium on Usable Security and Privacy (USEC) 2023. The Internet Society, 1--13."},{"key":"e_1_3_2_1_60_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS","author":"Reinheimer Benjamin","year":"2020","unstructured":"Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, Reyhan Duezguen, Bettina Lofthouse, Tatiana Von Landesberger, and Melanie Volkamer. 2020. An investigation of phishing awareness and education over time: When and how to best remind users. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 259--284."},{"key":"e_1_3_2_1_61_1","volume-title":"Address Allocation for Private Internets. RFC 1918","author":"Rekhter Yakov","year":"1996","unstructured":"Yakov Rekhter, Robert Moskowitz, Daniel Karrenberg, Geert Jan de Groot, and Eliot Lear. 1996. Address Allocation for Private Internets. RFC 1918. RFC Editor. 1--9 pages. https:\/\/datatracker.ietf.org\/doc\/html\/rfc1918"},{"key":"e_1_3_2_1_62_1","volume-title":"An Evasion Attack against ML-based Phishing URL Detectors. arXiv preprint arXiv:2005.08454","author":"Sabir Bushra","year":"2020","unstructured":"Bushra Sabir, M Ali Babar, and Raj Gaire. 2020. An Evasion Attack against ML-based Phishing URL Detectors. arXiv preprint arXiv:2005.08454 (2020)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"e_1_3_2_1_64_1","unstructured":"Steve Sheng Brad Wardman Gary Warner Lorrie Cranor Jason Hong and Chengshan Zhang. 2009. An empirical analysis of phishing blacklists. (2009)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241074.3241075"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.01.002"},{"key":"e_1_3_2_1_67_1","unstructured":"StatCounter Global Stats. 2020. Desktop vs Mobile vs Tablet Market Share Worldwide. https:\/\/gs.statcounter.com\/platform-market-share\/desktop-mobile-tablet\/worldwide. (2020)."},{"key":"e_1_3_2_1_68_1","volume-title":"Crying Wolf: An Empirical Study of SSL Warning Effectiveness.. In USENIX security symposium. Montreal, Canada, 399--416.","author":"Sunshine Joshua","year":"2009","unstructured":"Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor. 2009. Crying Wolf: An Empirical Study of SSL Warning Effectiveness.. In USENIX security symposium. Montreal, Canada, 399--416."},{"key":"e_1_3_2_1_69_1","volume-title":"22nd {USENIX} Security Symposium ({USENIX} Security 13). 195--210.","author":"Thomas Kurt","unstructured":"Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, and Vern Paxson. 2013. Trafficking fraudulent accounts: The role of the underground market in Twitter spam and abuse. In 22nd {USENIX} Security Symposium ({USENIX} Security 13). 195--210."},{"key":"e_1_3_2_1_70_1","volume-title":"International Conference on E-Business and Telecommunications. Springer, 278--293","author":"Tsalis Nikolaos","year":"2014","unstructured":"Nikolaos Tsalis, Nikos Virvilis, Alexios Mylonas, T Apostolopoulos, and Dimitris Gritzalis. 2014. Browser blacklists: the Utopia of phishing protection. In International Conference on E-Business and Telecommunications. Springer, 278--293."},{"key":"e_1_3_2_1_71_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Tuncay G\u00fcliz Seray","year":"2020","unstructured":"G\u00fcliz Seray Tuncay, Jingyu Qian, and Carl A Gunter. 2020. See no evil: phishing for permissions with false transparency. In 29th USENIX Security Symposium (USENIX Security 20). 415--432."},{"key":"e_1_3_2_1_72_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Der Heijden Amber Van","year":"2019","unstructured":"Amber Van Der Heijden and Luca Allodi. 2019. Cognitive triaging of phishing attacks. In 28th USENIX Security Symposium (USENIX Security 19). 1309--1326."},{"key":"e_1_3_2_1_73_1","volume-title":"2014 11th International Conference on Security and Cryptography (SECRYPT). IEEE, 1--9.","author":"Virvilis Nikos","year":"2014","unstructured":"Nikos Virvilis, Nikolaos Tsalis, Alexios Mylonas, and Dimitris Gritzalis. 2014. Mobile devices: A phisher's paradise. In 2014 11th International Conference on Security and Cryptography (SECRYPT). IEEE, 1--9."},{"key":"e_1_3_2_1_74_1","unstructured":"Colin Whittaker Brian Ryner and Marria Nazif. 2010. Large-scale automatic classification of phishing pages. (2010)."},{"key":"e_1_3_2_1_75_1","volume-title":"2008 Annual Computer Security Applications Conference (ACSAC). IEEE, 345--354","author":"Yue Chuan","year":"2008","unstructured":"Chuan Yue and Haining Wang. 2008. Anti-phishing in offense and defense. In 2008 Annual Computer Security Applications Conference (ACSAC). IEEE, 345--354."},{"key":"e_1_3_2_1_76_1","volume-title":"Proceedings of the 42nd IEEE Symposium on Security and Privacy (Oakland).","author":"Zhang Penghui","year":"2021","unstructured":"Penghui Zhang, Adam Oest, Haehyun Cho, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kpravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doup\u00e9, and Gail-Joon Ahn. 2021. CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing. In Proceedings of the 42nd IEEE Symposium on Security and Privacy (Oakland)."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559334"}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","location":"Singapore Singapore","acronym":"ASIA CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3657027","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:07Z","timestamp":1750290247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3657027"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":77,"alternative-id":["10.1145\/3634737.3657027","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3657027","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}