메뉴 건너뛰기




Volumn , Issue , 2010, Pages 198-207

PhishTester: Automatic testing of phishing attacks

Author keywords

Application behavior model; Cross site scripting; Finite state machine; Heuristic coveage; Phishing

Indexed keywords

ANTI-PHISHING; BEHAVIOR MODEL; COVERAGE CRITERIA; CROSS SITE SCRIPTING; FALSE NEGATIVES; FALSE POSITIVE; FINITE STATE MACHINES; PERSONAL INFORMATION; PHISHING; PHISHING ATTACKS; REAL APPLICATIONS; TESTING PROCESS; WEB APPLICATION; WEB APPLICATION TESTING; WEB-BASED ATTACKS;

EID: 77954841986     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SSIRI.2010.17     Document Type: Conference Paper
Times cited : (26)

References (38)
  • 10
    • 67249152321 scopus 로고    scopus 로고
    • Automating Phishing Website Identification through Deep MD5 Matching
    • Atlanta, USA, October
    • B. Wardman and G. Warner, "Automating Phishing Website Identification through Deep MD5 Matching," eCrime Researchers Summit, Atlanta, USA, October 2008, pp. 1-7.
    • (2008) eCrime Researchers Summit , pp. 1-7
    • Wardman, B.1    Warner, G.2
  • 13
    • 70449526286 scopus 로고    scopus 로고
    • Discovering Phishing Target based on Semantic Link Network
    • Elsevier, March 2010
    • L. Wenyin, N. Fang, X. Quan, B. Qiu, and G. Liu, "Discovering Phishing Target based on Semantic Link Network," Future Generation Computer Systems, Elsevier, Volume 26, Issue 3, March 2010, pp. 381-388.
    • Future Generation Computer Systems , vol.26 , Issue.3 , pp. 381-388
    • Wenyin, L.1    Fang, N.2    Quan, X.3    Qiu, B.4    Liu, G.5
  • 15
    • 33645131523 scopus 로고    scopus 로고
    • An Antiphishing Strategy Based on Visual Similarity Assessment
    • March
    • W. Liu, G. Huang, G. Huang, and A. Fu, "An Antiphishing Strategy Based on Visual Similarity Assessment," IEEE Internet Computing, Volume 10, Issue 2, March 2006, pp. 58-65.
    • (2006) IEEE Internet Computing , vol.10 , Issue.2 , pp. 58-65
    • Liu, W.1    Huang, G.2    Huang, G.3    Fu, A.4
  • 27
    • 77954835790 scopus 로고    scopus 로고
    • Accessed from
    • Jericho HTML Parser, Accessed from http://jericho.htmlparser.net
  • 28
    • 21244490135 scopus 로고    scopus 로고
    • Security Technologies go Phishing
    • June
    • D. Geer, "Security Technologies go Phishing," Computer Archive, Volume 38, Issue 6, June 2005, pp. 18-21.
    • (2005) Computer Archive , vol.38 , Issue.6 , pp. 18-21
    • Geer, D.1
  • 32
    • 77954850970 scopus 로고    scopus 로고
    • Access form phishtank.org
    • PhishTank, Access form phishtank.org
    • PhishTank
  • 36
    • 0142184067 scopus 로고    scopus 로고
    • Applying Extended Finite State Machines in Software Testing of Interactive Systems
    • M. Fantinato and M. Jino, "Applying Extended Finite State Machines in Software Testing of Interactive Systems," Lecture Notes in Computer Science 2844, pp. 34-45, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2844 , pp. 34-45
    • Fantinato, M.1    Jino, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.