17. Experimental Evaluation of Attacks and Countermeasures

  1. Markus Jakobsson1 and
  2. Steven Myers2

Published Online: 18 MAY 2006

DOI: 10.1002/9780470086100.ch17

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft

How to Cite

Jakobsson, M. and Myers, S. (eds) (2006) Experimental Evaluation of Attacks and Countermeasures, in Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, John Wiley & Sons, Inc., Hoboken, NJ, USA. doi: 10.1002/9780470086100.ch17

Editor Information

  1. 1

    Indiana University Bloomington, Indiana

  2. 2

    Indiana University Bloomington, Indiana

Publication History

  1. Published Online: 18 MAY 2006
  2. Published Print: 29 NOV 2006

ISBN Information

Print ISBN: 9780471782452

Online ISBN: 9780470086100

SEARCH

Keywords:

  • experimental attacks;
  • experimental counterattacks;
  • user-to-user phishing;
  • eBay phishing;
  • signed applets

Summary

This chapter contains sections titled:

  • Behavioral Studies

  • Case Study: Attacking Ebay Users with Queries

  • Case Study: Signed Applets

  • Case Study: Ethically Studing Man in the Middle

  • Legal Considerations in Phishing Research

  • Case Study: Designing and Conducting Phishing Experiments

  • References