Skip to main content

Showing 1–5 of 5 results for author: Voelker, G M

  1. arXiv:2405.09757  [pdf, other

    cs.CR

    Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates

    Authors: Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn

    Abstract: Scams -- fraudulent schemes designed to swindle money from victims -- have existed for as long as recorded history. However, the Internet's combination of low communication cost, global reach, and functional anonymity has allowed scam volumes to reach new heights. Designing effective interventions requires first understanding the context: how scammers reach potential victims, the earnings they mak… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: Under review

  2. arXiv:2302.07287  [pdf, other

    cs.CR

    Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy

    Authors: Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage

    Abstract: The critical role played by email has led to a range of extension protocols (e.g., SPF, DKIM, DMARC) designed to protect against the spoofing of email sender domains. These protocols are complex as is, but are further complicated by automated email forwarding -- used by individual users to manage multiple accounts and by mailing lists to redistribute messages. In this paper, we explore how such em… ▽ More

    Submitted 19 April, 2023; v1 submitted 14 February, 2023; originally announced February 2023.

    Comments: The paper appeared at the 8th IEEE European Symposium on Security and Privacy

    Journal ref: The 8th IEEE European Symposium on Security and Privacy, 2023

  3. arXiv:2105.13442  [pdf, other

    cs.CR

    Hopper: Modeling and Detecting Lateral Movement (Extended Report)

    Authors: Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner

    Abstract: In successful enterprise attacks, adversaries often need to gain access to additional machines beyond their initial point of compromise, a set of internal movements known as lateral movement. We present Hopper, a system for detecting lateral movement based on commonly available enterprise logs. Hopper constructs a graph of login activity among internal machines and then identifies suspicious seque… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

    Comments: Usenix Security Symposium 2021

  4. arXiv:1910.00790  [pdf, other

    cs.CR cs.SI

    Detecting and Characterizing Lateral Phishing at Scale

    Authors: Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner

    Abstract: We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to send phishing emails to other users, benefitting from both the implicit trust and the information in the hijacked user's account. We develop a cl… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

    Comments: Extended report of conference paper presented at the 26th USENIX Security Symposium (USENIX Security 19). USENIX Association, 2019

  5. arXiv:1409.3518  [pdf, other

    stat.ML cs.IR cs.LG

    Topic Modeling of Hierarchical Corpora

    Authors: Do-kyum Kim, Geoffrey M. Voelker, Lawrence K. Saul

    Abstract: We study the problem of topic modeling in corpora whose documents are organized in a multi-level hierarchy. We explore a parametric approach to this problem, assuming that the number of topics is known or can be estimated by cross-validation. The models we consider can be viewed as special (finite-dimensional) instances of hierarchical Dirichlet processes (HDPs). For these models we show that ther… ▽ More

    Submitted 13 April, 2015; v1 submitted 11 September, 2014; originally announced September 2014.