The homograph attack

  title={The homograph attack},
  author={Evgeniy Gabrilovich and A. Gontmakher},
  journal={Commun. ACM},
  • Evgeniy Gabrilovich, A. Gontmakher
  • Published 2002
  • Computer Science
  • Commun. ACM
  • Computing veterans remember an old habit of crossing zeros (O) in program listings to avoid confusing them with the letter O, in order to make sure the operator would type the program correctly into the computer. This habit, once necessary, has long been rendered obsolete by the increased availability of editing tools. However, the underlying problem of character resemblance is still there. Today it seems we may have to acquire a similar habit, this time to address an issue much more… CONTINUE READING
    103 Citations

    Topics from this paper

    Chance and Deception : Attacks That Rely On User Actions
    • Highly Influenced
    Computer and Intrusion Forensics
    • 98
    • Highly Influenced
    Enhanced Classification Method for Homograph Attack Detection
    • Highly Influenced
    ShamFinder: An Automated Framework for Detecting IDN Homographs
    • 11
    • Highly Influenced
    • PDF
    Safeguard against unicode attacks: generation and applications of UC-simlist
    • 4
    • Highly Influenced
    • PDF
    A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements
    Assessing the Privacy Benefits of Domain Name Encryption
    • 5
    • PDF
    Boosting Homograph Attack Classification Using Ensemble Learning and N-gram Model