Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains
Abstract
Supplemental Material
- Download
- 1195.08 MB
- Download
- 192.33 MB
References
Index Terms
- Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains
Recommendations
Influencing web-browsing behavior with intriguing and informative hyperlink wording
Textual hyperlinks are important mainstays of the navigation systems of websites. The study presented here examines how the wording of hyperlinks in a navigation menu and embedded within the body text of a web page can influence users' browsing behavior,...
Be the Phisher -- Understanding Users' Perception of Malicious Domains
ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications SecurityAttackers use various domain squatting techniques to convince users that their services are legitimate. Previous work has shown that methods liketyposquatting, where single characters are removed or duplicated, can successfully deceive users.
In this ...
Secure Short URL Generation Method that Recognizes Risk of Target URL
All the information and data on the Internet are connected based on URL. Although many people use URL to share and convey the information, it is difficult to transmit the information when URL is long and special characters are mixed. Short URL service ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/a1d6b4c4-341a-4977-bf06-43baf4bcab66/3589334.cover.jpg)
- General Chairs:
- Tat-Seng Chua,
- Chong-Wah Ngo,
- Proceedings Chair:
- Roy Ka-Wei Lee,
- Program Chairs:
- Ravi Kumar,
- Hady W. Lauw
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- CSCRC
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 893Total Downloads
- Downloads (Last 12 months)893
- Downloads (Last 6 weeks)598
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in