Folgen
Penghui Zhang
Penghui Zhang
Ph.D., Meta
Bestätigte E-Mail-Adresse bei asu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
1702020
{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists
A Oest, Y Safaei, P Zhang, B Wardman, K Tyers, Y Shoshitaishvili, ...
29th USENIX Security Symposium (USENIX Security 20), 379-396, 2020
1122020
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
Proceedings of the IEEE Symposium on Security and Privacy, 2021
1082021
Prime+ count: Novel cross-world covert channels on arm trustzone
H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
572018
Scam pandemic: How attackers exploit public fear through phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020
502020
Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service}
Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ...
30th USENIX Security Symposium (USENIX Security 21), 4169-4186, 2021
202021
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
152022
Neutralizing Evasion Techniques of Malicious Websites
A Oest, P Zhang, R Johnson
US Patent App. 17/079,190, 2022
22022
iCore continuous and proactive extrospection on multi-core IoT devices
P Zhang, H Cho, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 851-860, 2019
12019
Secore: Continuous extrospection with high visibility on multi-core ARM platforms
P Zhang, B Ngabonziza, H Cho, Z Zhao, A Doupé, GJ Ahn
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
12018
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem
Z Sun, FB Kokulu, P Zhang, A Oest, G Stringhini, T Bao, R Wang, ...
Proceedings of the 27th International Symposium on Research in Attacks …, 2024
2024
Systems and methods for detecting phishing websites
R Johnson, P Zhang, A Oest, B Wardman
US Patent 11,233,820, 2022
2022
Detection and Prevention of Sophisticated Cyberattacks
P Zhang
Arizona State University, 2022
2022
Prime+ Count
H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2018
Temperature Balancing among Servers with Workload Distribution
P Zhang
The Ohio State University, 2016
2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–15