Yi Han, Shujiang Wu, Mengmeng Li, Zixi Wang, and Pengfei Sun (F5)

Online fraud has emerged as a formidable challenge in the digital age, presenting a serious threat to individuals and organizations worldwide. Characterized by its ever-evolving nature, this type of fraud capitalizes on the rapid development of Internet technologies and the increasing digitization of financial transactions. In this paper, we address the critical need to understand and combat online fraud by conducting an unprecedented analysis based on extensive real-world transaction data.

Our study involves a multi-angle, multi-platform examination of fraudsters' approaches, behaviors and intentions. The findings of our study are significant, offering detailed insights into the characteristics, patterns and methods of online fraudulent activities and providing a clear picture of the current landscape of digital deception. To the best of our knowledge, we are the first to conduct such large-scale measurements using industrial-level real-world online transaction data.

View More Papers

Faults in Our Bus: Novel Bus Fault Attack to...

Nimish Mishra (Department of Computer Science and Engineering, IIT Kharagpur), Anirban Chakraborty (Department of Computer Science and Engineering, IIT Kharagpur), Debdeep Mukhopadhyay (Department of Computer Science and Engineering, IIT Kharagpur)

Read More

LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors

Chengkun Wei (Zhejiang University), Wenlong Meng (Zhejiang University), Zhikun Zhang (CISPA Helmholtz Center for Information Security and Stanford University), Min Chen (CISPA Helmholtz Center for Information Security), Minghu Zhao (Zhejiang University), Wenjing Fang (Ant Group), Lei Wang (Ant Group), Zihui Zhang (Zhejiang University), Wenzhi Chen (Zhejiang University)

Read More

Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization

Quan Zhang (Tsinghua University), Yiwen Xu (Tsinghua University), Zijing Yin (Tsinghua University), Chijin Zhou (Tsinghua University), Yu Jiang (Tsinghua University)

Read More

Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware

Ryan Pickren (Georgia Institute of Technology), Tohid Shekari (Georgia Institute of Technology), Saman Zonouz (Georgia Institute of Technology), Raheem Beyah (Georgia Institute of Technology)

Read More