Abstract
Over the recent decades, numerous evaluations of automated methods for detecting phishing attacks have been reporting stellar detection performances based on empirical evidence. These performances often neglect the adaptive behavior of an adversary seeking to evade detection, yielding uncertainty about their adversarial robustness. This work explores the adversarial robustness of highly influential and recent detection solutions, by assessing their common detection strategies. Following discussions of potential evasion techniques of these strategies, we present examples of techniques that enable evasion through imperceptible perturbations. In order to enable and improve future evaluations for adversarial robustness, a set of design guidelines is proposed.
Original language | English |
---|---|
Title of host publication | 13th USENIX Workshop on Cyber Security Experimentation and Test |
Number of pages | 10 |
Publisher | USENIX - The Advanced Computing Systems Association |
Publication date | Aug 2020 |
ISBN (Print) | 9781713815211 |
Publication status | Published - Aug 2020 |
Event | 13th USENIX Workshop on Cyber Security Experimentation and Test - Online Duration: 10 Aug 2020 → 10 Aug 2020 https://www.usenix.org/conference/cset20 |
Conference
Conference | 13th USENIX Workshop on Cyber Security Experimentation and Test |
---|---|
Location | Online |
Period | 10/08/2020 → 10/08/2020 |
Internet address |