Personal information

Activities

Works (15)

From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem

2024-09-30 | Conference paper
Contributors: Zhibo Sun; Faris Bugra Kokulu; Penghui Zhang; Adam Oest; Gianluca Stringhini; Tiffany Bao; Ruoyu Wang; Yan Shoshitaishvili; Adam Doupé; Gail-Joon Ahn
Source: check_circle
Crossref

Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem

2024-06-19 | Conference paper
Contributors: Mehrnoosh Zaeifi; Faezeh Kalantari; Adam Oest; Zhibo Sun; Gail-Joon Ahn; Yan Shoshitaishvili; Tiffany Bao; Ruoyu Wang; Adam Doupé
Source: check_circle
Crossref

CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing

IEEE Security and Privacy
2022 | Journal article
EID:

2-s2.0-85127500124

Part of ISSN: 15584046 15407993
Contributors: Zhang, P.; Oest, A.; Cho, H.; Sun, Z.; Johnson, R.C.; Wardman, B.; Sarker, S.; Kapravelos, A.; Bao, T.; Wang, R. et al.
Source: Self-asserted source
Zhibo Sun via Scopus - Elsevier

RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System

IEEE Access
2022 | Journal article
Contributors: Zihan Wu; Hong Zhang; Penghai Wang; Zhibo Sun
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

I'm SPARTACUS, No, I'm SPARTACUS:Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior

Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
2022-11-07 | Conference paper
Contributors: Penghui Zhang; Zhibo Sun; Sukwha Kyung; Hans Walter Behrens; Zion Leonahenahe Basque; Haehyun Cho; Adam Oest; Ruoyu Wang; Tiffany Bao; Yan Shoshitaishvili et al.
Source: Self-asserted source
Zhibo Sun
grade
Preferred source (of 2)‎

CrawlPhish: Large-scale analysis of client-side cloaking techniques in phishing

Proceedings - IEEE Symposium on Security and Privacy
2021 | Conference paper
EID:

2-s2.0-85115071617

Part of ISSN: 10816011
Contributors: Zhang, P.; Oest, A.; Cho, H.; Sun, Z.; Johnson, R.C.; Wardman, B.; Sarker, S.; Kapravelos, A.; Bao, T.; Wang, R. et al.
Source: Self-asserted source
Zhibo Sun via Scopus - Elsevier

Having your cake and eating it: An analysis of concession-abuse-as-a-service

Proceedings of the 30th USENIX Security Symposium
2021 | Conference paper
EID:

2-s2.0-85104014091

Contributors: Sun, Z.; Oest, A.; Zhang, P.; Rubio-Medrano, C.; Bao, T.; Wang, R.; Zhao, Z.; Shoshitaishvili, Y.; Doupé, A.; Ahn, G.-J.
Source: Self-asserted source
Zhibo Sun via Scopus - Elsevier

Scam pandemic: How attackers exploit public fear through phishing

arXiv
2021 | Other
EID:

2-s2.0-85170883999

Part of ISSN: 23318422
Contributors: Bitaab, M.; Cho, H.; Oest, A.; Zhang, P.; Sun, Z.; Pourmohamad, R.; Kim, D.; Bao, T.; Wang, R.; Shoshitaishvili, Y. et al.
Source: Self-asserted source
Zhibo Sun via Scopus - Elsevier

Scam Pandemic: How Attackers Exploit Public Fear through Phishing

2021-03-23 | Preprint
Source: Self-asserted source
Zhibo Sun

Scam Pandemic: How Attackers Exploit Public Fear through Phishing

eCrime Researchers Summit, eCrime
2020 | Conference paper
EID:

2-s2.0-85112011041

Part of ISSN: 21591245 21591237
Contributors: Bitaab, M.; Cho, H.; Oest, A.; Zhang, P.; Sun, Z.; Pourmohamad, R.; Kim, D.; Bao, T.; Wang, R.; Shoshitaishvili, Y. et al.
Source: Self-asserted source
Zhibo Sun via Scopus - Elsevier

Understanding and detecting private interactions in underground forums

CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy
2019 | Conference paper
EID:

2-s2.0-85063861796

Contributors: Sun, Z.; Rubio-Medrano, C.E.; Zhao, Z.; Bao, T.; Doupé, A.; Ahn, G.-J.
Source: Self-asserted source
Zhibo Sun via Scopus - Elsevier

Towards automated threat intelligence fusion

Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016
2017 | Conference paper
EID:

2-s2.0-85013213103

Contributors: Modi, A.; Sun, Z.; Panwar, A.; Khairnar, T.; Zhao, Z.; Doupé, A.; Ahn, G.-J.; Black, P.
Source: Self-asserted source
Zhibo Sun via Scopus - Elsevier

Migrating GIS big data computing from hadoop to spark: An exemplary study using twitter

IEEE International Conference on Cloud Computing, CLOUD
2016 | Conference paper
EID:

2-s2.0-85014263310

Contributors: Sun, Z.; Zhang, H.; Liu, Z.; Xu, C.; Wang, L.
Source: Self-asserted source
Zhibo Sun via Scopus - Elsevier

Dart: A Geographic Information System on Hadoop

Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015
2015 | Conference paper
EID:

2-s2.0-84960083921

Contributors: Zhang, H.; Sun, Z.; Liu, Z.; Xu, C.; Wang, L.
Source: Self-asserted source
Zhibo Sun via Scopus - Elsevier

Effects on Performance of Analytical Tools for Visually Demanding Tasks through Direct and Indirect Touch Interaction in an Immersive Visualization

Proceedings - 2014 International Conference on Virtual Reality and Visualization, ICVRV 2014
2015 | Conference paper
EID:

2-s2.0-84962147247

Contributors: Sun, Z.; Dhital, A.; Areejitkasem, N.; Pradhan, N.; Banic, A.
Source: Self-asserted source
Zhibo Sun via Scopus - Elsevier