phishhook
cacr logo

apwg logo

i3p


Phishing Publications

JavaScript Breaks Free
Markus Jakobsson, Zulfikar Ramzan and Sid Stamm. In W2SP '07, in conjunction with the 2007 Symposium on Security and Privacy (Oakland07).
[ pdf ]
What Instills Trust? A Qualitative Study of Phishing
Alex Tsow, Ankur Shah, Eli Blevis, Youn-kyung Lim. Extended Abstract, USEC '07
[ pdf ]
Phishing IQ Tests Measure Fear, Not Ability
Vivek Anandpara, Andrew Dingman, Markus Jakobsson, Debin Liu, Heather Roinestad. Extended Abstract, USEC '07
[ pdf ]
The Human Factor in Phishing
M. Jakobsson. To appear in Privacy & Security of Consumer Information '07
[ pdf ]
Designing and Conducting Phishing Experiments
P. Finn and M. Jakobsson. To appear in IEEE Technology and Society Magazine, Special Issue on Usability and Security
[ preprint ]
Warkitting: the Drive-by Subversion of Wireless Home Routers
Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wetzel. Anti-Phishing and Online Fraud, Part II Journal of Digital Forensic Practice, Volume 1, Special Issue 3, November 2006
[ preprint ]
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft.
M. Jakobsson and S. A. Myers (editors). ISBN 0-471-78245-9, Hardcover, 739 pages, November 2006.
[ website ]
Separating Wheat from the Chaff: A Deployable Approach to Counter Spam,
Youngsang Shin, Minaxi Gupta, Rob Henderson, Aaron Emigh. Proceedings of the second USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI '06), San Jose, California, USA, July 7, 2006
[ pdf ]
IDentity Theft, What the Numbers Tell Us and What You Can Do About It
F. Cate. In Indiana Alumni Magazine, May/June 2006.
[ preprint ]
Phishing With Consumer Electronics -- Malicious Home Routers.
A. Tsow. In Models of Trust for the Web, a workshop at the 15th International World Wide Web Conference (WWW2006), May 22-26, Edinburgh, Scotland.
[ pdf ]
Social Phishing
T. Jagatic, N. Johnson, M. Jakobsson and F. Menczer. Communications of the ACM.
[ ACM ]
@inproceedings{1135854,
  author = {Markus Jakobsson and Sid Stamm},
  title = {Invasive browser sniffing and countermeasures},
  booktitle = {WWW '06: Proceedings of the 15th international conference on World Wide Web},
  year = {2006},
  isbn = {1-59593-323-9},
  pages = {523--532},
  location = {Edinburgh, Scotland},
  doi = {http://doi.acm.org/10.1145/1135777.1135854},
  publisher = {ACM Press},
  address = {New York, NY, USA},
}

Hide BibTeX
Invasive Browser Sniffing and Countermeasures
M. Jakobsson and S. Stamm. In Proceedings of the 15th annual World Wide Web Conference (WWW2006).
[ pdf ] [ slides ] [ BibTeX ]
bibtex entry here

Hide BibTeX
Designing Ethical Phishing Experiments: A study of (ROT13) rOnl auction query features.
M. Jakobsson and J. Ratkiewicz. In Proceedings of the 15th annual World Wide Web Conference (WWW2006).
[ pdf ] [ BibTeX ]
@inproceedings{1130380,
 author = {Ari Juels and Markus Jakobsson and Tom N. Jagatic},
 title = {Cache Cookies for Browser Authentication (Extended Abstract)},
 booktitle = {SP '06: Proceedings of the 2006 IEEE Symposium on Security
and Privacy (S\&P;'06)},
 year = {2006},
 isbn = {0-7695-2574-1},
 pages = {301--305},
 doi = {http://dx.doi.org/10.1109/SP.2006.8},
 publisher = {IEEE Computer Society},
 address = {Washington, DC, USA},
}

Hide BibTeX
Cache Cookies for Browser Authentication
M. Jakobsson, A. Juels, T. Jagatic. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06) - Volume 00 (May 21 - 24, 2006). SP. IEEE Computer Society, Washington, DC, 301-305.
[ pdf ] [ BibTeX ]
@inproceedings{griffith:messin
	TITLE	= {Messin' with Texas, Deriving Mother's Maiden Names using
           Public Records},
	AUTHOR = {V. Griffith and M. Jakobsson},
	EDITOR = {J. Ioannidis, A. Keromytis, M. Yung},
	PAGE =  {91},
	BOOKTITLE = {Applied Cryptography and Network Security: Third
               International Conference,
	Lecture Notes in Computer Science},
	VOLUME = {3531},
	PUBLISHER = {Springer Berlin / Heidelberg},
	MONTH = {June}, YEAR = {2005}
}

Hide BibTeX
Messin' with Texas, Deriving Mother's Maiden Names using Public Records
V. Griffith and M. Jakobsson. In Proceedings of ACNS '05, 2005.
[ pdf ] [ RSA cryptobytes article ] [ BibTeX ]
Modeling and Preventing Phishing Attacks.
M. Jakobsson. Phishing Panel in Financial Cryptography '05 (FC'05). 2005.
[ abstract ] [ pdf ]
Related (non-phishing) Publications >>