Fraud

  • “Practical and secure Software-Based attestation.” .
    [Bibtex]
    @inproceedings{lightsec,
    citeulike-article-id = {12477272},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/lightsecJakobssonJohansson.pdf},
    keywords = {article, fraud, malware, mobile, most-downloaded, publication, publications},
    posted-at = {2013-07-13 07:33:26},
    priority = {2},
    title = {Practical and Secure {Software-Based} Attestation},
    url = {http://www.markus-jakobsson.com/wp-content/uploads/lightsecJakobssonJohansson.pdf}
    }
  • M. Jakobsson and G. Stewart, “Mobile malware: why the traditional AV paradigm is doomed, and how to use physics to detect undesirable routines,” in Blackhat, 2013.
    [Bibtex]
    @inproceedings{blackhat13,
    abstract = {The traditional {Anti-Virus} paradigm focuses on signature-based and behavioral detection. These require substantial processing, which hurts the limited power resources of handsets. Also, carriers are reluctant and slow to deliver Firmware Over The Air ({FOTA}) patches, due to the rigorous testing they need to subject updates to, and the costs of over-the-air updates. A move to cloud-based screening fails to recognize that not all threats will be propagated over the backbone, may obfuscate themselves in transit; or fight back (as rootkits do) to evade reporting or use of techniques such as the ``Google kill switch''. Hardware vendors are evaluating security solutions with hardware support, such as {TrustZone}, but while this reduces the vulnerabilities, it still exposes an attack surface.
    We describe a new approach that detects the presence of any undesirable routines -- including corruptions of the code used to perform this detection. The security assertions we make are not based on heuristics, but rather, rely on the physical characteristics of the target device. We detail the approach, which does not rely on hardware modifications, and explain how to analyze its security.},
    author = {Jakobsson, Markus and Stewart, Guy},
    booktitle = {BlackHat},
    citeulike-article-id = {12477269},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/blackhat2013JakobssonStewart.pdf},
    keywords = {article, fraud, malware, mobile, most-downloaded, publication, publications},
    posted-at = {2013-07-13 07:26:29},
    priority = {2},
    title = {Mobile Malware: Why the Traditional {AV} Paradigm is Doomed, and How to Use Physics to Detect Undesirable Routines},
    url = {http://www.markus-jakobsson.com/wp-content/uploads/blackhat2013JakobssonStewart.pdf},
    year = {2013}
    }
  • M. Jakobsson and F. Menczer, “Web forms and untraceable DDoS attacks,” in Network security, S. Huang, D. MacCallum, and D. Z. Du, Eds., Springer, 2010.
    [Bibtex]
    @inbook{citeulike:7936872,
    author = {Jakobsson, Markus and Menczer, Filippo},
    booktitle = {Network Security},
    citeulike-article-id = {7936872},
    citeulike-linkout-0 = {http://www.hack-ware.com/sites/default/files/pdf/Web\%20Forms\%20and\%20Untraceable\%20DDoS\%20Attacks.pdf},
    editor = {Huang, Scott and MacCallum, David and Du, Ding Z.},
    keywords = {distributed-computing, fraud, publications},
    posted-at = {2010-10-01 18:30:40},
    priority = {2},
    publisher = {Springer},
    title = {Web Forms and Untraceable {DDoS} Attacks},
    url = {http://www.hack-ware.com/sites/default/files/pdf/Web\%20Forms\%20and\%20Untraceable\%20DDoS\%20Attacks.pdf},
    year = {2010}
    }
  • M. Jakobsson, A central nervous system for automatically detecting malware, 2009.
    [Bibtex]
    @misc{markus-blog,
    author = {Jakobsson, Markus},
    citeulike-article-id = {7845871},
    citeulike-linkout-0 = {http://blogs.parc.com/blog/2009/09/a-central-nervous-system-for-automatically-detecting-malware/},
    keywords = {fraud, malware, mobile, publications},
    month = sep,
    posted-at = {2010-09-17 03:24:24},
    priority = {0},
    title = {A Central Nervous System for Automatically Detecting Malware},
    url = {http://blogs.parc.com/blog/2009/09/a-central-nervous-system-for-automatically-detecting-malware/},
    year = {2009}
    }
  • M. Jakobsson and A. Juels, “Server-Side detection of malware infection,” in New security paradigms workshop (nspw), Oxford, UK, 2009.
    [Bibtex]
    @inproceedings{jj09,
    address = {Oxford, UK},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {New Security Paradigms Workshop (NSPW)},
    citeulike-article-id = {7845870},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-nspw09.pdf},
    keywords = {fraud, malware, publications},
    month = sep,
    posted-at = {2010-09-17 03:24:24},
    priority = {0},
    publisher = {ACM},
    title = {{Server-Side} Detection of Malware Infection},
    url = {http://markus-jakobsson.com/papers/jakobsson-nspw09.pdf},
    year = {2009}
    }
  • M. Jakobsson and K. Johansson, “Retroactive detection of malware with applications to mobile platforms,” in Hotsec 2010, Washington, DC, 2010.
    [Bibtex]
    @inproceedings{JJ10b,
    address = {Washington, DC},
    author = {Jakobsson, Markus and Johansson, Karl-Anders},
    booktitle = {HotSec 2010},
    citeulike-article-id = {7845869},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-hotsec10.pdf},
    keywords = {fraud, malware, mobile, most-downloaded, publications},
    month = aug,
    organization = {USENIX},
    posted-at = {2010-09-17 03:24:24},
    priority = {0},
    publisher = {USENIX},
    title = {Retroactive Detection of Malware With Applications to Mobile Platforms},
    url = {http://markus-jakobsson.com/papers/jakobsson-hotsec10.pdf},
    year = {2010}
    }
  • M. Jakobsson and K. Johansson, Assured detection of malware with applications to mobile platforms, 2010.
    [Bibtex]
    @misc{JJ10,
    author = {Jakobsson, Markus and Johansson, Karl-Anders},
    booktitle = {DIMACS Technical Report 2010-03},
    citeulike-article-id = {7845868},
    citeulike-linkout-0 = {http://dimacs.rutgers.edu/TechnicalReports/abstracts/2010/2010-03.html},
    citeulike-linkout-1 = {http://markus-jakobsson.com/papers/jakobsson-dimacstr10.pdf},
    howpublished = {\\\\urlhttp://dimacs.rutgers.edu/TechnicalReports/abstracts/2010/2010-03.html},
    keywords = {fraud, malware, mobile, publications},
    pages = {97--110},
    posted-at = {2010-09-17 03:24:24},
    priority = {0},
    title = {Assured Detection of Malware With Applications to Mobile Platforms},
    url = {http://dimacs.rutgers.edu/TechnicalReports/abstracts/2010/2010-03.html},
    year = {2010}
    }
  • S. Stamm and M. Jakobsson, Social malware.
    [Bibtex]
    @misc{social-malware,
    author = {Stamm, Sid and Jakobsson, Markus},
    citeulike-article-id = {7845867},
    citeulike-linkout-0 = {http://www.indiana.edu/\~{}phishing/verybigad/},
    howpublished = {\\url{www.indiana.edu/\~{}phishing/verybigad/}},
    keywords = {fraud, malware, publications},
    posted-at = {2010-09-17 03:24:24},
    priority = {0},
    title = {Social Malware},
    url = {http://www.indiana.edu/\~{}phishing/verybigad/}
    }
  • V. Griffith and M. Jakobsson, “Messin ‘ with texas: deriving mother’s maiden names using public records,” Cryptobytes, vol. 8, iss. 1, pp. 18-27, 2007.
    [Bibtex]
    @article{mmn-cb,
    author = {Griffith, Virgil and Jakobsson, Markus},
    citeulike-article-id = {7845866},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-acns05-texas.pdf},
    journal = {CryptoBytes},
    keywords = {fraud, publications},
    number = {1},
    pages = {18--27},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {RSA},
    title = {Messin ' with Texas: Deriving Mother's Maiden Names Using Public Records},
    url = {http://markus-jakobsson.com/papers/jakobsson-acns05-texas.pdf},
    volume = {8},
    year = {2007}
    }
  • M. Jakobsson and M. K. Reiter, “Discouraging software piracy using software aging,” in Drm ’01: revised papers from the acm ccs-8 workshop on security and privacy in digital rights management, London, UK, 2002, pp. 1-12.
    [Bibtex]
    @inproceedings{jakobsson-reiter,
    address = {London, UK},
    author = {Jakobsson, Markus and Reiter, Michael K.},
    booktitle = {DRM '01: Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management},
    citeulike-article-id = {7845865},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-drm01.pdf},
    keywords = {fraud, publications},
    pages = {1--12},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Discouraging Software Piracy Using Software Aging},
    url = {http://markus-jakobsson.com/papers/jakobsson-drm01.pdf},
    year = {2002}
    }
  • M. Jakobsson, “Modeling and preventing phishing attacks,” in Financial cryptography, Roseau, The Commonwealth Of Dominica, 2005.
    [Bibtex]
    @inproceedings{modeling-phishing,
    address = {Roseau, The Commonwealth Of Dominica},
    author = {Jakobsson, Markus},
    booktitle = {Financial Cryptography},
    citeulike-article-id = {7845864},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc05.pdf},
    keywords = {fraud, phishing, publications},
    month = feb,
    organization = {IFCA},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer Verlag},
    title = {Modeling and Preventing Phishing Attacks},
    url = {http://markus-jakobsson.com/papers/jakobsson-fc05.pdf},
    year = {2005}
    }
  • V. Griffith and M. Jakobsson, “Messin ‘ with texas: deriving mother’s maiden names using public records,” in Applied cryptography and network security, New York, NY, 2005.
    [Bibtex]
    @inproceedings{mmn,
    address = {New York, NY},
    author = {Griffith, Virgil and Jakobsson, Markus},
    booktitle = {Applied Cryptography and Network Security},
    citeulike-article-id = {7845863},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-acns05-texas.pdf},
    keywords = {fraud, most-downloaded, privacy, publications},
    month = jun,
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    title = {Messin ' with Texas: Deriving Mother's Maiden Names Using Public Records},
    url = {http://markus-jakobsson.com/papers/jakobsson-acns05-texas.pdf},
    year = {2005}
    }
  • M. Jakobsson and S. Stamm, “Invasive browser sniffing and countermeasures,” in Www ’06: proceedings of the 15th international conference on world wide web, New York, NY, USA, 2006, pp. 523-532.
    [Bibtex]
    @inproceedings{invasive-sniffing,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Stamm, Sid},
    booktitle = {WWW '06: Proceedings of the 15th international conference on World Wide Web},
    citeulike-article-id = {7845862},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-www06-sniff.pdf},
    keywords = {fraud, privacy, publications},
    location = {Edinburgh, Scotland},
    pages = {523--532},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {ACM},
    title = {Invasive browser sniffing and countermeasures},
    url = {http://markus-jakobsson.com/papers/jakobsson-www06-sniff.pdf},
    year = {2006}
    }
  • J. Y. Choi, P. Golle, and M. Jakobsson, “Tamper-Evident digital signature protecting certification authorities against malware,” in Dasc ’06: proceedings of the 2nd ieee international symposium on dependable, autonomic and secure computing, Washington, DC, USA, 2006, pp. 37-44.
    [Bibtex]
    @inproceedings{choi-tamper-evident,
    address = {Washington, DC, USA},
    author = {Choi, Jong Y. and Golle, Philippe and Jakobsson, Markus},
    booktitle = {DASC '06: Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing},
    citeulike-article-id = {7845861},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-dasc06.pdf},
    keywords = {fraud, malware, publications},
    pages = {37--44},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE Computer Society},
    title = {{Tamper-Evident} Digital Signature Protecting Certification Authorities Against Malware},
    url = {http://markus-jakobsson.com/papers/jakobsson-dasc06.pdf},
    year = {2006}
    }
  • M. Jakobsson, “The human factor in phishing,” in Privacy and security of consumer information ’07, 2007.
    [Bibtex]
    @inproceedings{thehuman-factor,
    author = {Jakobsson, Markus},
    booktitle = {Privacy and Security of Consumer Information '07},
    citeulike-article-id = {7845860},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-psci07.pdf},
    keywords = {fraud, phishing, publications},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    title = {The Human Factor in Phishing},
    url = {http://markus-jakobsson.com/papers/jakobsson-psci07.pdf},
    year = {2007}
    }
  • V. Anandpara, A. Dingman, M. Jakobsson, D. Liu, and H. Roinestad, “Phishing IQ tests measure fear, not ability,” in Fc’07/usec’07: proceedings of the 11th international conference on financial cryptography and 1st international conference on usable security, Berlin, Heidelberg, 2007, pp. 362-366.
    [Bibtex]
    @inproceedings{measure-fear,
    address = {Berlin, Heidelberg},
    author = {Anandpara, Vivek and Dingman, Andrew and Jakobsson, Markus and Liu, Debin and Roinestad, Heather},
    booktitle = {FC'07/USEC'07: Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security},
    citeulike-article-id = {7845859},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usec07-fear.pdf},
    keywords = {fraud, phishing, publications, user-experiments},
    location = {Scarborough, Trinidad and Tobago},
    pages = {362--366},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Phishing {IQ} tests measure fear, not ability},
    url = {http://markus-jakobsson.com/papers/jakobsson-usec07-fear.pdf},
    year = {2007}
    }
  • M. Jakobsson, A. Tsow, A. Shah, E. Blevis, and Y. Lim, “What instills trust? a qualitative study of phishing,” in Fc’07/usec’07: proceedings of the 11th international conference on financial cryptography and 1st international conference on usable security, Berlin, Heidelberg, 2007, pp. 356-361.
    [Bibtex]
    @inproceedings{instills-trust,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Tsow, Alex and Shah, Ankur and Blevis, Eli and Lim, Youn-Kyung},
    booktitle = {FC'07/USEC'07: Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security},
    citeulike-article-id = {7845858},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usec07-trust.pdf},
    keywords = {fraud, phishing, publications, user-experiments},
    location = {Scarborough, Trinidad and Tobago},
    pages = {356--361},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {What instills trust? a qualitative study of phishing},
    url = {http://markus-jakobsson.com/papers/jakobsson-usec07-trust.pdf},
    year = {2007}
    }
  • S. Stamm, Z. Ramzan, and M. Jakobsson, “Drive-by pharming,” in Icics’07: proceedings of the 9th international conference on information and communications security, Berlin, Heidelberg, 2007, pp. 495-506.
    [Bibtex]
    @inproceedings{drive-by-pharming,
    address = {Berlin, Heidelberg},
    author = {Stamm, Sid and Ramzan, Zulfikar and Jakobsson, Markus},
    booktitle = {ICICS'07: Proceedings of the 9th international conference on Information and communications security},
    citeulike-article-id = {7845857},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-icics07.pdf},
    keywords = {fraud, malware, publications},
    location = {Zhengzhou, China},
    pages = {495--506},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Drive-by pharming},
    url = {http://markus-jakobsson.com/papers/jakobsson-icics07.pdf},
    year = {2007}
    }
  • R. Chow, P. Golle, M. Jakobsson, and X. Wang, “Clickable CAPTCHAs,” in Adfraud ’07 workshop, Stanford, CA, 2007.
    [Bibtex]
    @inproceedings{clickable-capcha-stanford,
    address = {Stanford, CA},
    author = {Chow, Richard and Golle, Philippe and Jakobsson, Markus and Wang, Xiaofeng},
    booktitle = {AdFraud '07 Workshop},
    citeulike-article-id = {7845856},
    keywords = {fraud, publications},
    month = sep,
    organization = {Stanford University},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    title = {Clickable {CAPTCHAs}},
    year = {2007}
    }
  • M. Jakobsson, Z. Ramzan, and S. Stamm, “JavaScript breaks free,” in Web 2.0 security and privacy, Oakland, CA, 2007.
    [Bibtex]
    @inproceedings{Jakobsson_web2.0,
    address = {Oakland, CA},
    author = {Jakobsson, Markus and Ramzan, Zulfikar and Stamm, Sid},
    booktitle = {Web 2.0 Security and Privacy},
    citeulike-article-id = {7845855},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-web20sp07.pdf},
    keywords = {fraud, malware, publications},
    month = may,
    organization = {IEEE},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE},
    title = {{JavaScript} Breaks Free},
    url = {http://markus-jakobsson.com/papers/jakobsson-web20sp07.pdf},
    year = {2007}
    }
  • C. Soghoian, O. Friedrichs, and M. Jakobsson, “The threat of political phishing,” in International symposium on human aspects of information security & assurance (haisa 2008), Port Elizabeth, South Africa, 2008.
    [Bibtex]
    @inproceedings{political-phishing,
    address = {Port Elizabeth, South Africa},
    author = {Soghoian, Christopher and Friedrichs, Oliver and Jakobsson, Markus},
    booktitle = {International Symposium on Human Aspects of Information Security \& Assurance (HAISA 2008)},
    citeulike-article-id = {7845854},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-haisa08.pdf},
    keywords = {fraud, phishing, publications},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    title = {The Threat of Political Phishing},
    url = {http://markus-jakobsson.com/papers/jakobsson-haisa08.pdf},
    year = {2008}
    }
  • M. Gandhi, M. Jakobsson, and J. Ratkiewicz, “Badvertisements: stealthy click-fraud with unwitting accessories,” Journal of digital forensics practice, vol. 1, iss. 2, 2006.
    [Bibtex]
    @article{badvertisements,
    author = {Gandhi, Mona and Jakobsson, Markus and Ratkiewicz, Jacob},
    citeulike-article-id = {7845853},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-jdfp06.pdf},
    journal = {Journal of Digital Forensics Practice},
    keywords = {fraud, malware, most-downloaded, publications},
    number = {2},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Taylor \& Francis},
    title = {Badvertisements: Stealthy click-fraud with unwitting accessories},
    url = {http://markus-jakobsson.com/papers/jakobsson-jdfp06.pdf},
    volume = {1},
    year = {2006}
    }
  • A. Tsow, M. Jakobsson, L. Yang, and S. Wetzel, “Warkitting: the drive-by subversion of wireless home routers,” Journal of digital forensics practice, vol. 1, iss. 3, pp. 179-192, 2006.
    [Bibtex]
    @article{warkitting,
    author = {Tsow, Alex and Jakobsson, Markus and Yang, Liu and Wetzel, Susanne},
    citeulike-article-id = {7845852},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-jdfp06-warkit.pdf},
    journal = {Journal of Digital Forensics Practice},
    keywords = {fraud, malware, publications},
    number = {3},
    pages = {179--192},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Taylor \& Francis},
    title = {Warkitting: the Drive-by Subversion of Wireless Home Routers},
    url = {http://markus-jakobsson.com/papers/jakobsson-jdfp06-warkit.pdf},
    volume = {1},
    year = {2006}
    }
  • T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, “Social phishing,” Commun. acm, vol. 50, iss. 10, pp. 94-100, 2007.
    [Bibtex]
    @article{social-phishing,
    address = {New York, NY, USA},
    author = {Jagatic, Tom N. and Johnson, Nathaniel A. and Jakobsson, Markus and Menczer, Filippo},
    citeulike-article-id = {7845851},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-commacm07.pdf},
    journal = {Commun. ACM},
    keywords = {facebook, fraud, most-downloaded, phishing, publications, user-experiments},
    number = {10},
    pages = {94--100},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {ACM},
    title = {Social phishing},
    url = {http://markus-jakobsson.com/papers/jakobsson-commacm07.pdf},
    volume = {50},
    year = {2007}
    }
  • P. Finn and M. Jakobsson, “Designing and conducting phishing experiments,” in In ieee technology and society magazine, special issue on usability and security, 2007.
    [Bibtex]
    @inproceedings{Finn07designingand,
    author = {Finn, Peter and Jakobsson, Markus},
    booktitle = {In IEEE Technology and Society Magazine, Special Issue on Usability and Security},
    citeulike-article-id = {7845850},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeets07.pdf},
    keywords = {fraud, most-downloaded, phishing, publications, user-experiments},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE},
    title = {Designing and Conducting Phishing Experiments},
    url = {http://markus-jakobsson.com/papers/jakobsson-ieeets07.pdf},
    year = {2007}
    }
  • M. Jakobsson and S. Stamm, “Web camouflage: protecting your clients from Browser-Sniffing attacks,” Ieee security and privacy, vol. 5, iss. 6, pp. 16-24, 2007.
    [Bibtex]
    @article{web-camoulfage,
    address = {Piscataway, NJ, USA},
    author = {Jakobsson, Markus and Stamm, Sid},
    citeulike-article-id = {7845849},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeesp07.pdf},
    journal = {IEEE Security and Privacy},
    keywords = {fraud, phishing, privacy, publications},
    number = {6},
    pages = {16--24},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE Educational Activities Department},
    title = {Web Camouflage: Protecting Your Clients from {Browser-Sniffing} Attacks},
    url = {http://markus-jakobsson.com/papers/jakobsson-ieeesp07.pdf},
    volume = {5},
    year = {2007}
    }
  • M. Jakobsson, N. Johnson, and P. Finn, “Why and how to perform fraud experiments,” Ieee security and privacy, vol. 6, iss. 2, pp. 66-68, 2008.
    [Bibtex]
    @article{fraud-exp,
    address = {Piscataway, NJ, USA},
    author = {Jakobsson, Markus and Johnson, Nathaniel and Finn, Peter},
    citeulike-article-id = {7845848},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeesp08.pdf},
    journal = {IEEE Security and Privacy},
    keywords = {fraud, phishing, publications, user-experiments},
    number = {2},
    pages = {66--68},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE Educational Activities Department},
    title = {Why and How to Perform Fraud Experiments},
    url = {http://markus-jakobsson.com/papers/jakobsson-ieeesp08.pdf},
    volume = {6},
    year = {2008}
    }
  • S. Srikwan and M. Jakobsson, “Using cartoons to teach internet security,” Cryptologia, vol. 32, iss. 2, pp. 137-154, 2008.
    [Bibtex]
    @article{sec-cartoon,
    address = {Bristol, PA, USA},
    author = {Srikwan, Sukamol and Jakobsson, Markus},
    citeulike-article-id = {7845827},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-cryptologia08.pdf},
    journal = {Cryptologia},
    keywords = {education, fraud, malware, phishing, publications},
    number = {2},
    pages = {137--154},
    posted-at = {2010-09-17 03:21:32},
    priority = {0},
    publisher = {Taylor \& Francis, Inc.},
    title = {Using Cartoons to Teach Internet Security},
    url = {http://markus-jakobsson.com/papers/jakobsson-cryptologia08.pdf},
    volume = {32},
    year = {2008}
    }
  • M. Jakobsson, “Social engineering 2.0: what’s next,” Mcafee security journal, 2008.
    [Bibtex]
    @article{social-engineering2,
    author = {Jakobsson, Markus},
    citeulike-article-id = {7845777},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-mcafee08.pdf},
    journal = {McAfee Security Journal},
    keywords = {authentication, fraud, publications},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    title = {Social Engineering 2.0: What's Next},
    url = {http://markus-jakobsson.com/papers/jakobsson-mcafee08.pdf},
    year = {2008}
    }
  • E. Gabber, M. Jakobsson, Y. Matias, and A. J. Mayer, “Curbing junk E-Mail via secure classification,” in Fc ’98: proceedings of the second international conference on financial cryptography, London, UK, 1998, pp. 198-213.
    [Bibtex]
    @inproceedings{curb-junk-email,
    address = {London, UK},
    author = {Gabber, Eran and Jakobsson, Markus and Matias, Yossi and Mayer, Alain J.},
    booktitle = {FC '98: Proceedings of the Second International Conference on Financial Cryptography},
    citeulike-article-id = {7845771},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc98.pdf},
    keywords = {authentication, fraud, publications},
    pages = {198--213},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Curbing Junk {E-Mail} via Secure Classification},
    url = {http://markus-jakobsson.com/papers/jakobsson-fc98.pdf},
    year = {1998}
    }
  • M. Jakobsson and J. Ratkiewicz, “Designing ethical phishing experiments: a study of (ROT13) rOnl query features,” in Www ’06: proceedings of the 15th international conference on world wide web, New York, NY, USA, 2006, pp. 513-522.
    [Bibtex]
    @inproceedings{ethical-phishing-www06,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Ratkiewicz, Jacob},
    booktitle = {WWW '06: Proceedings of the 15th international conference on World Wide Web},
    citeulike-article-id = {7845763},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    keywords = {authentication, fraud, most-downloaded, phishing, publications, user-experiments},
    location = {Edinburgh, Scotland},
    pages = {513--522},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Designing ethical phishing experiments: a study of ({ROT13}) {rOnl} query features},
    url = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    year = {2006}
    }
  • A. Juels, M. Jakobsson, and T. N. Jagatic, “Cache cookies for browser authentication (extended abstract),” in Sp ’06: proceedings of the 2006 ieee symposium on security and privacy, Washington, DC, USA, 2006, pp. 301-305.
    [Bibtex]
    @inproceedings{cache-cookie-sp06,
    address = {Washington, DC, USA},
    author = {Juels, Ari and Jakobsson, Markus and Jagatic, Tom N.},
    booktitle = {SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy},
    citeulike-article-id = {7845762},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-oakland06.pdf},
    keywords = {authentication, fraud, publications},
    pages = {301--305},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {IEEE Computer Society},
    title = {Cache Cookies for Browser Authentication (Extended Abstract)},
    url = {http://markus-jakobsson.com/papers/jakobsson-oakland06.pdf},
    year = {2006}
    }
  • A. Juels, S. Stamm, and M. Jakobsson, “Combatting click fraud via premium clicks,” in Ss’07: proceedings of 16th usenix security symposium on usenix security symposium, Berkeley, CA, USA, 2007, pp. 1-10.
    [Bibtex]
    @inproceedings{premium-clicks,
    address = {Berkeley, CA, USA},
    author = {Juels, Ari and Stamm, Sid and Jakobsson, Markus},
    booktitle = {SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium},
    citeulike-article-id = {7845761},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usenix07.pdf},
    keywords = {authentication, fraud, publications},
    location = {Boston, MA},
    pages = {1--10},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {USENIX Association},
    title = {Combatting click fraud via premium clicks},
    url = {http://markus-jakobsson.com/papers/jakobsson-usenix07.pdf},
    year = {2007}
    }
  • M. Jakobsson and S. Myers, “Delayed password disclosure,” in Dim ’07: proceedings of the 2007 acm workshop on digital identity management, New York, NY, USA, 2007, pp. 17-26.
    [Bibtex]
    @inproceedings{delayed-pwd-dim07,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Myers, Steven},
    booktitle = {DIM '07: Proceedings of the 2007 ACM workshop on Digital identity management},
    citeulike-article-id = {7845760},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-dim07.pdf},
    keywords = {authentication, fraud, publications},
    location = {Fairfax, Virginia, USA},
    pages = {17--26},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Delayed password disclosure},
    url = {http://markus-jakobsson.com/papers/jakobsson-dim07.pdf},
    year = {2007}
    }
  • M. Jakobsson and S. Myers, “Delayed password disclosure,” Int. j. appl. cryptol., vol. 1, iss. 1, pp. 47-59, 2008.
    [Bibtex]
    @article{delayed-pwd,
    address = {Inderscience Publishers, Geneva, SWITZERLAND},
    author = {Jakobsson, Markus and Myers, Steven},
    citeulike-article-id = {7845757},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ijac08.pdf},
    journal = {Int. J. Appl. Cryptol.},
    keywords = {authentication, fraud, phishing, publications},
    number = {1},
    pages = {47--59},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Inderscience Publishers},
    title = {Delayed password disclosure},
    url = {http://markus-jakobsson.com/papers/jakobsson-ijac08.pdf},
    volume = {1},
    year = {2008}
    }
  • M. Jakobsson and A. Tsow, “Identify theft,” in Computer and information security handbook, J. R. Vacca, Ed., Burlington, MA: Morgan Kaufmann, 2008, p. 519.
    [Bibtex]
    @incollection{cis-handbook,
    address = {Burlington, MA},
    author = {Jakobsson, Markus and Tsow, Alex},
    booktitle = {Computer And Information Security Handbook},
    chapter = {31},
    citeulike-article-id = {7845754},
    editor = {Vacca, John R.},
    keywords = {authentication, fraud, phishing, publications, user-experiments},
    pages = {519},
    posted-at = {2010-09-17 03:05:09},
    priority = {0},
    publisher = {Morgan Kaufmann},
    title = {Identify Theft},
    year = {2008}
    }
  • M. Jakobsson, C. Soghoian, and S. Stamm, “Phishing,” in Handbook of financial cryptography, B. Rosenberg, Ed., CRC Press, 2008.
    [Bibtex]
    @incollection{handbook-fc,
    author = {Jakobsson, Markus and Soghoian, Christopher and Stamm, Sid},
    booktitle = {Handbook of Financial Cryptography},
    citeulike-article-id = {7845752},
    editor = {Rosenberg, Burton},
    keywords = {authentication, fraud, phishing, publications},
    posted-at = {2010-09-17 03:01:30},
    priority = {0},
    publisher = {CRC Press},
    title = {Phishing},
    year = {2008}
    }
  • M. Jakobsson and S. Myers, Phishing and countermeasures: understanding the increasing problem of electronic identity theft, Wesley, 2006.
    [Bibtex]
    @book{phishing-book,
    author = {Jakobsson, Markus and Myers, Steven},
    citeulike-article-id = {7845751},
    keywords = {authentication, fraud, phishing, publications, user-experiments},
    posted-at = {2010-09-17 03:01:30},
    priority = {0},
    publisher = {Wesley},
    title = {Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft},
    year = {2006}
    }
  • M. Jakobsson and Z. Ramzan, Crimeware: understanding new attacks and defenses, Symantec Press / Addison Wesley, 2008.
    [Bibtex]
    @book{crimeware,
    author = {Jakobsson, Markus and Ramzan, Zulfikar},
    citeulike-article-id = {7845749},
    isbn = {978-0321501950},
    keywords = {authentication, fraud, malware, publications},
    posted-at = {2010-09-17 03:00:42},
    priority = {0},
    publisher = {Symantec Press / Addison Wesley},
    title = {Crimeware: Understanding New Attacks and Defenses},
    year = {2008}
    }

Comments are closed.