Follow
Penghui Zhang
Penghui Zhang
Ph.D., Meta
Verified email at asu.edu - Homepage
Title
Cited by
Cited by
Year
Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
1252020
{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists
A Oest, Y Safaei, P Zhang, B Wardman, K Tyers, Y Shoshitaishvili, ...
29th USENIX Security Symposium (USENIX Security 20), 379-396, 2020
822020
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
Proceedings of the IEEE Symposium on Security and Privacy, 2021
752021
Prime+ count: Novel cross-world covert channels on arm trustzone
H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
522018
Scam pandemic: How attackers exploit public fear through phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020
412020
Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service}
Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ...
30th USENIX Security Symposium (USENIX Security 21), 4169-4186, 2021
162021
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
72022
Neutralizing Evasion Techniques of Malicious Websites
A Oest, P Zhang, R Johnson
US Patent App. 17/079,190, 2022
12022
iCore continuous and proactive extrospection on multi-core IoT devices
P Zhang, H Cho, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 851-860, 2019
12019
Systems and methods for detecting phishing websites
R Johnson, P Zhang, A Oest, B Wardman
US Patent 11,233,820, 2022
2022
Detection and Prevention of Sophisticated Cyberattacks
P Zhang
Arizona State University, 2022
2022
Prime+ Count
H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2018
Secore: Continuous extrospection with high visibility on multi-core ARM platforms
P Zhang, B Ngabonziza, H Cho, Z Zhao, A Doupé, GJ Ahn
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
2018
Temperature Balancing among Servers with Workload Distribution
P Zhang
The Ohio State University, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–14