The homograph attack
@article{Gabrilovich2002TheHA, title={The homograph attack}, author={Evgeniy Gabrilovich and A. Gontmakher}, journal={Commun. ACM}, year={2002}, volume={45}, pages={128} }
Computing veterans remember an old habit of crossing zeros (O) in program listings to avoid confusing them with the letter O, in order to make sure the operator would type the program correctly into the computer. This habit, once necessary, has long been rendered obsolete by the increased availability of editing tools. However, the underlying problem of character resemblance is still there. Today it seems we may have to acquire a similar habit, this time to address an issue much more… CONTINUE READING
Topics from this paper
103 Citations
Enhanced Classification Method for Homograph Attack Detection
- 2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW)
- 2020
- Highly Influenced
ShamFinder: An Automated Framework for Detecting IDN Homographs
- Computer Science
- Internet Measurement Conference
- 2019
- 11
- Highly Influenced
- PDF
Safeguard against unicode attacks: generation and applications of UC-simlist
- Computer Science
- WWW '06
- 2006
- 4
- Highly Influenced
- PDF
A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements
- Computer Science
- 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
- 2020
Accurate and fast URL phishing detector: A convolutional neural network approach
- Computer Science
- Comput. Networks
- 2020
- 3
Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II
- Computer Science
- ACNS
- 2020
Boosting Homograph Attack Classification Using Ensemble Learning and N-gram Model
- Computer Science
- 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
- 2020