The state of phishing attacks

Looking past the systems people use, they target the people using the systems.

[1]  Martin R. Gibbs,et al.  Mediating intimacy: designing technologies to support strong-tie relationships , 2005, CHI.

[2]  Avivah Litan Phishing Attack Victims Likely Targets for Identity Theft , 2005 .

[3]  Lorrie Faith Cranor,et al.  Decision strategies and susceptibility to phishing , 2006, SOUPS '06.

[4]  Min Wu,et al.  Do security toolbars actually prevent phishing attacks? , 2006, CHI.

[5]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[6]  Markus Jakobsson,et al.  Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft , 2006 .

[7]  Stefan Görling,et al.  An overview of the Sender Policy Framework (SPF) as an anti-phishing mechanism , 2007, Internet Res..

[8]  Stuart E. Schechter,et al.  The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[9]  Stuart E. Schechter,et al.  The Emperor's New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies † , 2007 .

[10]  Lorrie Faith Cranor,et al.  Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.

[11]  Norman M. Sadeh,et al.  Learning to detect phishing emails , 2007, WWW '07.

[12]  Stefan Gorling,et al.  An overview of the Sender Policy Framework (SPF) as an anti‐phishing mechanism , 2007 .

[13]  Niels Provos,et al.  A framework for detection and measurement of phishing attacks , 2007, WORM '07.

[14]  Lorrie Faith Cranor,et al.  Getting users to pay attention to anti-phishing education: evaluation of retention and transfer , 2007, eCrime '07.

[15]  Desney S. Tan,et al.  An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks , 2007, Financial Cryptography.

[16]  Lorrie Faith Cranor,et al.  Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.

[17]  Suku Nair,et al.  A comparison of machine learning techniques for phishing detection , 2007, eCrime '07.

[18]  Tyler Moore,et al.  Examining the impact of website take-down on phishing , 2007, eCrime '07.

[19]  Lorrie Faith Cranor,et al.  You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.

[20]  Cormac Herley,et al.  Phishing as a Tragedy of the Commons , 2008 .

[21]  Cormac Herley,et al.  A profitless endeavor: phishing as tragedy of the commons , 2009, NSPW '08.

[22]  Christopher Krügel,et al.  There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits , 2008, WOOT.

[23]  Lorrie Faith Cranor,et al.  Improving phishing countermeasures: An analysis of expert interviews , 2009, 2009 eCrime Researchers Summit.

[24]  Lorrie Faith Cranor,et al.  An Empirical Analysis of Phishing Blacklists , 2009, CEAS 2009.

[25]  Cormac Herley,et al.  Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy , 2009, WEIS.

[26]  Jason I. Hong,et al.  A hybrid phish detection approach by identity discovery and keywords retrieval , 2009, WWW '09.

[27]  Carolyn Penstein Rosé,et al.  A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection , 2010, ESORICS.

[28]  Ponnurangam Kumaraguru,et al.  Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.

[29]  Lorrie Faith Cranor,et al.  Teaching Johnny not to fall for phish , 2010, TOIT.

[30]  Frank Stajano,et al.  Understanding scam victims , 2011, Commun. ACM.