Preliminary Results from a U.S. Demographic Analysis of SMiSh
Susceptibility
- URL: http://arxiv.org/abs/2309.06322v1
- Date: Tue, 12 Sep 2023 15:32:36 GMT
- Title: Preliminary Results from a U.S. Demographic Analysis of SMiSh
Susceptibility
- Authors: Cori Faklaris, Heather Richter Lipford, Sarah Tabassum
- Abstract summary: The text method is called SMiShing, (aka SMShing, or smishing)
A fraudster sends a phishing link via Short Message Service (SMS) text to a phone.
No data exists on who is most vulnerable to SMiShing.
- Score: 1.8416014644193066
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: As adoption of mobile phones has skyrocketed, so have scams involving them.
The text method is called SMiShing, (aka SMShing, or smishing) in which a
fraudster sends a phishing link via Short Message Service (SMS) text to a
phone. However, no data exists on who is most vulnerable to SMiShing. Prior
work in phishing (its e-mail cousin) indicates that this is likely to vary by
demographic and contextual factors. In our study, we collect this data from
N=1007 U.S. adult mobile phone users. Younger people and college students
emerge in this sample as the most vulnerable. Participants struggled to
correctly identify legitimate messages and were easily misled when they knew
they had an account with the faked message entity. Counterintuitively,
participants with higher levels of security training and awareness were less
correct in rating possible SMiSH. We recommend next steps for researchers,
regulators and telecom providers.
Related papers
- SMS Spam Detection and Classification to Combat Abuse in Telephone Networks Using Natural Language Processing [0.0]
This research addresses the pervasive issue of SMS spam, which poses threats to users' privacy and security.
The study introduces a novel approach utilizing Natural Language Processing (NLP) and machine learning models, particularly BERT (Bidirectional Representations from Transformers) for spam detection and classification.
Evaluation results revealed that the Na"ive Bayes + BERT model achieves the highest accuracy at 97.31% with the fastest execution time of 0.3 seconds on the test dataset.
arXiv Detail & Related papers (2024-06-04T13:44:36Z) - ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis [2.849988619791745]
The number of SMS spam has expanded significantly in recent years.
The unstructured format of SMS data creates significant challenges for SMS spam detection.
We employ optimized and fine-tuned transformer-based Large Language Models (LLMs) to solve the problem of spam message detection.
arXiv Detail & Related papers (2024-05-12T11:42:05Z) - SpamDam: Towards Privacy-Preserving and Adversary-Resistant SMS Spam Detection [2.0355793807035094]
SpamDam is a SMS spam detection framework designed to overcome key challenges in detecting and understanding SMS spam.
We have compiled over 76K SMS spam messages from Twitter and Weibo between 2018 and 2023, forming the largest dataset of its kind.
We have rigorously tested the adversarial robustness of SMS spam detection models, introducing the novel reverse backdoor attack.
arXiv Detail & Related papers (2024-04-15T06:07:10Z) - A Quantitative Study of SMS Phishing Detection [0.0]
We conducted an online survey on smishing detection with 187 participants.
We presented them with 16 SMS screenshots and evaluated how different factors affect their decision making process in smishing detection.
We found that participants had more difficulty identifying real messages from fake ones, with an accuracy of 67.1% with fake messages and 43.6% with real messages.
arXiv Detail & Related papers (2023-11-12T17:56:42Z) - Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats [0.0]
We developed a test bed for measuring the effectiveness of popular anti-smishing tools against fresh smishing attacks.
Most anti-phishing apps and bulk messaging services didn't filter smishing messages beyond the carrier blocking.
While carriers did not block any benign messages, they were only able to reach a 25-35% blocking rate for smishing messages.
arXiv Detail & Related papers (2023-09-14T06:08:22Z) - Deep convolutional forest: a dynamic deep ensemble approach for spam
detection in text [219.15486286590016]
This paper introduces a dynamic deep ensemble model for spam detection that adjusts its complexity and extracts features automatically.
As a result, the model achieved high precision, recall, f1-score and accuracy of 98.38%.
arXiv Detail & Related papers (2021-10-10T17:19:37Z) - Learning Language and Multimodal Privacy-Preserving Markers of Mood from
Mobile Data [74.60507696087966]
Mental health conditions remain underdiagnosed even in countries with common access to advanced medical care.
One promising data source to help monitor human behavior is daily smartphone usage.
We study behavioral markers of daily mood using a recent dataset of mobile behaviors from adolescent populations at high risk of suicidal behaviors.
arXiv Detail & Related papers (2021-06-24T17:46:03Z) - Identity Signals in Emoji Do not Influence Perception of Factual Truth
on Twitter [90.14874935843544]
Prior work has shown that Twitter users use skin-toned emoji as an act of self-representation to express their racial/ethnic identity.
We test whether this signal of identity can influence readers' perceptions about the content of a post containing that signal.
We find that neither emoji nor profile photo has an effect on how readers rate these facts.
arXiv Detail & Related papers (2021-05-07T10:56:19Z) - TextHide: Tackling Data Privacy in Language Understanding Tasks [54.11691303032022]
TextHide mitigates privacy risks without slowing down training or reducing accuracy.
It requires all participants to add a simple encryption step to prevent an eavesdropping attacker from recovering private text data.
We evaluate TextHide on the GLUE benchmark, and our experiments show that TextHide can effectively defend attacks on shared gradients or representations.
arXiv Detail & Related papers (2020-10-12T22:22:15Z) - Mind the GAP: Security & Privacy Risks of Contact Tracing Apps [75.7995398006171]
Google and Apple have jointly provided an API for exposure notification in order to implement decentralized contract tracing apps using Bluetooth Low Energy.
We demonstrate that in real-world scenarios the GAP design is vulnerable to (i) profiling and possibly de-anonymizing persons, and (ii) relay-based wormhole attacks that basically can generate fake contacts.
arXiv Detail & Related papers (2020-06-10T16:05:05Z) - Decentralized Privacy-Preserving Proximity Tracing [50.27258414960402]
DP3T provides a technological foundation to help slow the spread of SARS-CoV-2.
System aims to minimise privacy and security risks for individuals and communities.
arXiv Detail & Related papers (2020-05-25T12:32:02Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.