The homograph attack
@article{Gabrilovich2002TheHA, title={The homograph attack}, author={E. Gabrilovich and A. Gontmakher}, journal={Commun. ACM}, year={2002}, volume={45}, pages={128} }
Computing veterans remember an old habit of crossing zeros (O) in program listings to avoid confusing them with the letter O, in order to make sure the operator would type the program correctly into the computer. This habit, once necessary, has long been rendered obsolete by the increased availability of editing tools. However, the underlying problem of character resemblance is still there. Today it seems we may have to acquire a similar habit, this time to address an issue much more… Expand
Topics from this paper
104 Citations
Enhanced Classification Method for Homograph Attack Detection
- Computer Science
- 2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW)
- 2020
- Highly Influenced
ShamFinder: An Automated Framework for Detecting IDN Homographs
- Computer Science
- Internet Measurement Conference
- 2019
- 11
- Highly Influenced
- PDF
Safeguard against unicode attacks: generation and applications of UC-simlist
- Computer Science
- WWW '06
- 2006
- 5
- Highly Influenced
- PDF
A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements
- Computer Science
- 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
- 2020
Accurate and fast URL phishing detector: A convolutional neural network approach
- Computer Science
- Comput. Networks
- 2020
- 3