{"id":"https://openalex.org/W4388867270","doi":"https://doi.org/10.1145/3576915.3623199","title":"A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier","display_name":"A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier","publication_year":2023,"publication_date":"2023-11-15","ids":{"openalex":"https://openalex.org/W4388867270","doi":"https://doi.org/10.1145/3576915.3623199"},"language":"en","primary_location":{"id":"doi:10.1145/3576915.3623199","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3576915.3623199","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010688002","display_name":"Changqing Miao","orcid":"https://orcid.org/0009-0004-7414-6464"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Changqing Miao","raw_affiliation_strings":["Renmin University of China, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0004-7414-6464","affiliations":[{"raw_affiliation_string":"Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041047743","display_name":"Jianan Feng","orcid":"https://orcid.org/0000-0002-6701-2730"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianan Feng","raw_affiliation_strings":["Renmin University of China, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-6701-2730","affiliations":[{"raw_affiliation_string":"Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101927208","display_name":"Wei You","orcid":"https://orcid.org/0000-0003-1009-6627"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei You","raw_affiliation_strings":["Renmin University of China, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-1009-6627","affiliations":[{"raw_affiliation_string":"Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017405627","display_name":"Wenchang Shi","orcid":"https://orcid.org/0000-0002-5160-1223"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenchang Shi","raw_affiliation_strings":["Renmin University of China, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-5160-1223","affiliations":[{"raw_affiliation_string":"Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037117080","display_name":"Jianjun Huang","orcid":"https://orcid.org/0000-0003-4403-0060"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianjun Huang","raw_affiliation_strings":["Renmin University of China, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-4403-0060","affiliations":[{"raw_affiliation_string":"Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100644627","display_name":"Bin Liang","orcid":"https://orcid.org/0000-0002-4818-7164"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Liang","raw_affiliation_strings":["Renmin University of China, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-4818-7164","affiliations":[{"raw_affiliation_string":"Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5010688002"],"corresponding_institution_ids":["https://openalex.org/I78988378"],"apc_list":null,"apc_paid":null,"fwci":0.3408,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67044284,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"2486","last_page":"2500"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9575209617614746},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.708794355392456},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6160914301872253},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.610014796257019},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.6072759032249451},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5488414168357849},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.405911386013031},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3410235643386841},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3214878737926483},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.31636497378349304}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9575209617614746},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.708794355392456},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6160914301872253},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.610014796257019},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.6072759032249451},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5488414168357849},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.405911386013031},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3410235643386841},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3214878737926483},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.31636497378349304},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3576915.3623199","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3576915.3623199","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4099999964237213}],"awards":[{"id":"https://openalex.org/G2615337663","display_name":null,"funder_award_id":"62272465, 62002361, 62272464 and U1836209","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1147066959","https://openalex.org/W1482565952","https://openalex.org/W2025635041","https://openalex.org/W2157825442","https://openalex.org/W2166731089","https://openalex.org/W2167407098","https://openalex.org/W2180612164","https://openalex.org/W2243397390","https://openalex.org/W2336566325","https://openalex.org/W2528572867","https://openalex.org/W2535873859","https://openalex.org/W2625935159","https://openalex.org/W2754566651","https://openalex.org/W2765424254","https://openalex.org/W2774644650","https://openalex.org/W2893894073","https://openalex.org/W2905423756","https://openalex.org/W2909737018","https://openalex.org/W2953822176","https://openalex.org/W2963098487","https://openalex.org/W2963448658","https://openalex.org/W2963516603","https://openalex.org/W2963857521","https://openalex.org/W2965757007","https://openalex.org/W2975388328","https://openalex.org/W2981597369","https://openalex.org/W3005121675","https://openalex.org/W3006235430","https://openalex.org/W3007485446","https://openalex.org/W3012459057","https://openalex.org/W3032379897","https://openalex.org/W3037276035","https://openalex.org/W3103557498","https://openalex.org/W3106934761","https://openalex.org/W3108072218","https://openalex.org/W3196036588","https://openalex.org/W4210343783","https://openalex.org/W4226199051","https://openalex.org/W4226456032","https://openalex.org/W4238216513","https://openalex.org/W4307415696","https://openalex.org/W4308531811","https://openalex.org/W6966655536"],"related_works":["https://openalex.org/W2368745349","https://openalex.org/W3167675181","https://openalex.org/W2372005904","https://openalex.org/W144012884","https://openalex.org/W2360897455","https://openalex.org/W2131575257","https://openalex.org/W2377660959","https://openalex.org/W4251169878","https://openalex.org/W2810589793","https://openalex.org/W2527886746"],"abstract_inverted_index":{"Phishing":[0,9],"is":[1,63,173],"one":[2],"of":[3,24,29,59,72,86,191],"the":[4,60,107,126,130,146,162,188],"most":[5],"popular":[6],"cyberspace":[7],"attacks.":[8,44,179,200],"detection":[10,148],"has":[11,36,47],"been":[12,37],"integrated":[13],"into":[14],"mainstream":[15],"browsers":[16],"to":[17,39,42,77,144,176,186,197],"provide":[18],"online":[19],"protection.":[20],"The":[21,57,111,150],"phishing":[22,30,50,88,108,122,131,147,171,199],"detector":[23,62,89],"Google":[25,46],"Chrome":[26,192],"reports":[27],"millions":[28],"attacks":[31],"per":[32],"week.":[33],"However,":[34],"it":[35,66,115],"proven":[38],"be":[40,68,75,117,209],"vulnerable":[41,175],"evasion":[43,92,104,178],"Currently,":[45],"upgraded":[48],"Chrome/Chromium's":[49],"detector,":[51],"introducing":[52],"a":[53,83,102],"CNN-based":[54],"image":[55,109],"classifier.":[56,110,189],"robustness":[58],"new-generation":[61,170],"unclear.":[64],"If":[65],"can":[67,116,159,183],"bypassed,":[69],"its":[70,203],"billions":[71],"users":[73,193],"will":[74],"exposed":[76,196],"sophisticated":[78,181],"attackers.":[79],"This":[80],"paper":[81],"presents":[82],"critical":[84],"evaluation":[85],"Google's":[87,169],"by":[90],"targeted":[91,177],"testing,":[93],"and":[94],"investigates":[95],"corresponding":[96],"defensive":[97],"techniques.":[98],"First,":[99],"we":[100,139],"propose":[101],"three-stage":[103],"method":[105],"against":[106],"experiments":[112],"show":[113,152],"that":[114,153,168],"completely":[118],"bypassed":[119],"with":[120],"adversarial":[121],"pages":[123,132],"generated":[124],"using":[125,155],"proposed":[127],"method.":[128],"Meanwhile,":[129],"still":[133],"preserve":[134],"their":[135],"visual":[136],"utility.":[137],"Second,":[138],"introduce":[140],"two":[141],"defense":[142,157],"techniques":[143],"enhance":[145],"model.":[149],"results":[151],"even":[154],"lightweight":[156],"methods":[158],"significantly":[160],"improve":[161,202],"model":[163],"robustness.":[164],"Our":[165],"research":[166],"reveals":[167],"classifier":[172],"very":[174],"A":[180],"phishers":[182],"know":[184],"how":[185],"fool":[187],"Billions":[190],"are":[194],"being":[195],"potential":[198],"To":[201],"robustness,":[204],"necessary":[205],"security":[206],"enhancements":[207],"should":[208],"introduced.":[210]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
