8 research outputs found

    Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats

    Full text link
    Smishing, also known as SMS phishing, is a type of fraudulent communication in which an attacker disguises SMS communications to deceive a target into providing their sensitive data. Smishing attacks use a variety of tactics; however, they have a similar goal of stealing money or personally identifying information (PII) from a victim. In response to these attacks, a wide variety of anti-smishing tools have been developed to block or filter these communications. Despite this, the number of phishing attacks continue to rise. In this paper, we developed a test bed for measuring the effectiveness of popular anti-smishing tools against fresh smishing attacks. To collect fresh smishing data, we introduce Smishtank.com, a collaborative online resource for reporting and collecting smishing data sets. The SMS messages were validated by a security expert and an in-depth qualitative analysis was performed on the collected messages to provide further insights. To compare tool effectiveness, we experimented with 20 smishing and benign messages across 3 key segments of the SMS messaging delivery ecosystem. Our results revealed significant room for improvement in all 3 areas against our smishing set. Most anti-phishing apps and bulk messaging services didn't filter smishing messages beyond the carrier blocking. The 2 apps that blocked the most smish also blocked 85-100\% of benign messages. Finally, while carriers did not block any benign messages, they were only able to reach a 25-35\% blocking rate for smishing messages. Our work provides insights into the performance of anti-smishing tools and the roles they play in the message blocking process. This paper would enable the research community and industry to be better informed on the current state of anti-smishing technology on the SMS platform

    Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners

    Full text link
    The California Consumer Privacy Act (CCPA) secures the right to Opt-Out for consumers in California. However, websites may implement complex consent mechanisms that potentially do not capture the user's true choices. We investigated the user choices in Cookie Consent Banner of US residents, the plurality of whom were from California, through an online experiment of 257 participants and compared the results with how they perceived to these Cookie Consent Banner. Our results show a contradiction between how often participants self-report their Opt-Out rates and their actual Opt-Out rate when interacting with a complex, CCPA-compliant website. This discrepancy expands the context with which modern websites may implement the CCPA without providing users sufficient information or instruction on how to successfully Opt-Out. We further elaborate on how US residents respond to and perceive the GDPR-like Opt-In model. Our results indicate that even though very few consumers actually exercised their right to Opt-Out, the majority of US consumers desire more transparent privacy policies that the current implementation of CCPA on websites lacks

    Users really do respond to smishing

    Full text link
    Text phish messages, referred to as Smishing is a type of social engineering attack where fake text messages are created, and used to lure users into responding to those messages. These messages aim to obtain user credentials, install malware on the phones, or launch smishing attacks. They ask users to reply to their message, click on a URL that redirects them to a phishing website, or call the provided number. Thousands of mobile users are affected by smishing attacks daily. Drawing inspiration by the works of Tu et al. (USENIX Security, 2019) on Robocalls and Tischer et al. (IEEE Symposium on Security and Privacy, 2016) on USB drives, this paper investigates why smishing works. Accordingly, we designed smishing experiments and sent phishing SMSes to 265 users to measure the efficacy of smishing attacks. We sent eight fake text messages to participants and recorded their CLICK, REPLY, and CALL responses along with their feedback in a post-test survey. Our results reveal that 16.92% of our participants had potentially fallen for our smishing attack. To test repeat phishing, we subjected a set of randomly selected participants to a second round of smishing attacks with a different message than the one they received in the first round. As a result, we observed that 12.82% potentially fell for the attack again. Using logistic regression, we observed that a combination of user REPLY and CLICK actions increased the odds that a user would respond to our smishing message when compared to CLICK. Additionally, we found a similar statistically significant increase when comparing Facebook and Walmart entity scenario to our IRS baseline.Comment: CODASPY'2

    Blind Channel Equalization with Amplitude Banded Godard and Sato Algorithms

    No full text
    Abstract—The least-mean-squares (LMS) algorithm which updates the filter coefficients by a stochastic gradient descent approach is the most popular adaptive filtering one. In this paper we propose a novel amplitude banded (AB) technique with LMS on Godard (ABGodard) and Sato (ABSato) algorithms for the equalization of communication channels. The non-linear properties of the AB technique with LMS algorithm are inherited into the ABGodard and ABSato algorithms, resulting in an improvement of equalization performance. These properties are validated from a signal separation aspect based on decision boundary. Mean square error (MSE) and bit error rate (BER) are investigated on several communication channel models. Observations on simulations show that the ABGodard and ABSato algorithms provide better performance than the standard Godard and Sato algorithms, respectively, and that the ABSato algorithm is superior to the ABGodard algorithm. As the division number used for the AB technique is increased, the MSE and BER performances of the ABSato algorithm are improved. A parallel structure of the Sato and ABSato algorithms provides a further improvement of the MSE and BER performances

    Heavy metals removal from water by efficient adsorbents

    Get PDF
    Natural occurrence and anthropogenic practices contribute to the release of pollutants, specifically heavy metals, in water over the years. Therefore, this leads to a demand of proper water treatment to minimize the harmful effects of the toxic heavy metals in water, so that a supply of clean water can be distributed into the environment or household. This review highlights several water treatment methods that can be used in removing heavy metal from water. Among various treatment methods, the adsorption process is considered as one of the highly effective treatments of heavy metals and the functionalization of adsorbents can fully enhance the adsorption process. Therefore, four classes of adsorbent sources are highlighted: polymeric, natural mineral, industrial by-product, and carbon nanomaterial adsorbent. The major purpose of this review is to gather up-to-date information on research and development on various adsorbents in the treatment of heavy metal from water by emphasizing the adsorption capability, effect of pH, isotherm and kinetic model, removal efficiency and the contact of time of every adsorbent

    Synthesis of polymeric chelating ligands from sago starch for metal removal from electroplating wastewater

    No full text
    30-37Polymeric chelating ligands containing hydroxamic acid and amidoxime ligands have been synthesized from poly(methyl acrylate-co-acrylonitrile) grafted sago starch. Batch adsorption has been performed to identify the binding property of metal ions. <span style="mso-ansi-language: EN-US;mso-bidi-language:BN" lang="EN-US">Maximum sorption capacity of copper is found to be 2.80 mmol g-1, however other transition metals has good sorption capacity with this ligands. The rate of exchange of some metals is found to be fast, i.e. t½ 6 min (average). Three types of wastewater containing chromium, zinc, nickel, copper, and iron have been used in this study. The metal recovery is found to be high, and more than 99% of the metals could be removed from the metal plating wastewater. Polymeric chelating ligands could be used to remove the metals from wastewater. </span

    Production of biogas from poultry litter mixed with the co-substrate cow dung

    No full text
    Poultry litter (a mixture of rice hulls, sawdust and chicken excreta of broilers) mixed with the co-substrate cow dung and poultry droppings was evaluated under anaerobic conditions for the production of biogas (methane). Four laboratory scale reactors, R1, R2, R3 and R4, were set up with different proportions of waste poultry litter, cow dung and poultry droppings and had a 6% total solid concentration. Digestion was carried out for 50 days at room temperature, 32 ± 3 °C. Volatile solid degradation and specific gas production in the four reactors was 46%, 51.99%, 51.96%, 43% and 0.263, 0.469, 0.419, 0.221 l/g, respectively, based on the volatile solid (VS) feed. The methane yields were 71%, 72.5%, 72.6% and 70%, respectively. The COD reductions were 46.1%, 50.76%, 48.23% and 45.12%, respectively. A kinetic analysis showed that the anaerobic digestion of poultry litter with a co-substrate followed first order kinetics. Among the experimental reactors, R2 (25% cow dung, 75% poultry litter) gave the optimum results: a VS reduction of 51.99%, a specific gas yield of 0.469 l/g and a methane yield of 72.5%
    corecore