New, sophisticated phishing campaigns victimize targets in few hours from attack delivery. Some methods, such as visual similarity-based techniques, can spot these zero-hour attacks, at the cost of additional user intervention. However, more research is needed to investigate the trade-off between automatic detection and user intervention. To enable this line of research, we present a phishing detection tool that can be used to instrument scientific research in this direction. The tool can be used for experimentation on assisting user decision-making, evaluating user trust in detection, and keeping track of users’ previous “bad” decisions.
|Title of host publication||Foundations and Practice of Security - 15th International Symposium, FPS 2022, Revised Selected Papers|
|Editors||Guy-Vincent Jourdan, Laurent Mounier, Carlisle Adams, Florence Sèdes, Joaquin Garcia-Alfaro|
|Number of pages||10|
|Publication status||Published - 2023|
|Event||15th International Symposium on Foundations and Practice of Security, FPS 2022 - Ottawa, Canada|
Duration: 12 Dec 2022 → 14 Dec 2022
|Name||Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)|
|Conference||15th International Symposium on Foundations and Practice of Security, FPS 2022|
|Period||12/12/22 → 14/12/22|
Bibliographical noteFunding Information:
Acknowledgment. The authors thank Ardela Isuf and Sam Cantineau for the implementation of the tool. This work is supported by the ITEA3 programme through the DEFRAUDIfy project funded by Rijksdienst voor Ondernemend Nederland (grant no. ITEA191010).
© 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.