Adam Oest
Adam Oest
Verified email at - Homepage
Cited by
Cited by
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis
A Oest, Y Safei, A Doupé, GJ Ahn, B Wardman, G Warner
2018 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2018
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale
A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ...
Proceedings of the 29th USENIX Security Symposium, 2020
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists
A Oest, Y Safaei, A Doupé, GJ Ahn, B Wardman, K Tyers
40th IEEE Symposium on Security and Privacy (SP) 2019, 764-781, 2019
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists
A Oest, Y Safaei, P Zhang, B Wardman, K Tyers, Y Shoshitaishvili, ...
Proceedings of the 29th USENIX Security Symposium, 2020
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
42nd IEEE Symposium on Security & Privacy (SP) 2021., 2021
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases
ST Dinh, H Cho, K Martin, A Oest, K Zeng, A Kapravelos, GJ Ahn, T Bao, ...
Network and Distributed Systems Symposium (NDSS) 2021, 2021
Scam pandemic: How attackers exploit public fear through phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020
Phishing detection leveraging machine learning and deep learning: A review
DM Divakaran, A Oest
IEEE Security & Privacy 20 (5), 86-95, 2022
Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service}
Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ...
30th USENIX Security Symposium (USENIX Security 21), 4169-4186, 2021
Advances in IOT security: Vulnerabilities, enabled Criminal Services, attacks and countermeasures
YR Siwakoti, M Bhurtel, DB Rawat, A Oest, RC Johnson
IEEE Internet of Things Journal, 2023
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
ViK: practical mitigation of temporal memory safety violations through object ID inspection
H Cho, J Park, A Oest, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ...
Proceedings of the 27th ACM International Conference on Architectural …, 2022
Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale
M Bitaab, H Cho, A Oest, Z Lyu, W Wang, J Abraham, R Wang, T Bao, ...
2023 IEEE Symposium on Security and Privacy (SP), 2566-2583, 2023
Analysis of Payment Service Provider SDKs in Android
SY Mahmud, KV English, S Thorn, W Enck, A Oest, M Saad
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
Leveraging scalable data analysis to proactively bolster the anti-phishing ecosystem
A Oest
Arizona State University, 2020
Programming board-game strategies in the introductory CS sequence
I Bezakova, J Heliotis, S Strout, A Oest, P Solt
Proceedings of the 43rd ACM technical symposium on Computer Science …, 2012
Can I Own Your NFTs? Understanding the New Attack Surface to NFTs
Y Gao, M Saad, A Oest, J Zhang, B Han, S Chen
IEEE Communications Magazine, 2023
Neutralizing Evasion Techniques of Malicious Websites
A Oest, P Zhang, R Johnson
US Patent App. 17/079,190, 2022
Feedback-driven clustering for automated linking of web pages
A Oest, M Rege
8th International Conference for Internet Technology and Secured …, 2013
Cross-entity refund fraud mitigation
A Oest, R Johnson, M Saad
US Patent App. 17/934,337, 2024
The system can't perform the operation now. Try again later.
Articles 1–20