towards measuring and mitigating social engineering ... · towards measuring and mitigating social...
TRANSCRIPT
![Page 1: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/1.jpg)
Towards Measuring and Mitigating Social Engineering Software Download Attacks
Terry Nelms1,2, Roberto Perdici3,1, Manos Antonakakis1, Mustaque Ahamd1,4
1Georgia Ins-tute of Technology 2Damballa, Inc.
3University of Georgia 4New York University Abu Dhabi
[email protected], [email protected], [email protected], [email protected]
![Page 2: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/2.jpg)
How Modern Malware Infections Occur
2
Social Engineering Download
Drive-‐by Download
![Page 3: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/3.jpg)
Study of Web-Based Social Engineering Downloads
Data collection on a large academic network for two months.
Real-time deep packet inspection of network traffic.
Maintain a data buffer of all recent HTTP transactions.
On executable download record all web traffic from client.
3
![Page 4: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/4.jpg)
Study of Web-Based Social Engineering Downloads
4
Web Path
Social Engineering Download
• Collected a total of 35,638 downloads • 2,004 real world successful SE downloads • Full web path reconstruc-on • Extensive manual analysis
![Page 5: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/5.jpg)
Outline
Categorizing SE Download Tactics
Measuring SE Download Properties
Detecting SE Download Attacks
5
![Page 6: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/6.jpg)
Outline
Categorizing SE Download Tactics
Measuring SE Download Properties
Detecting SE Download Attacks
6
![Page 7: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/7.jpg)
SE Download Categorization
Ad Web PostSearch
User Attention
Persuasion
ImpersonateRepackageDecoy Invent Entice Comply
Deception
Alarm
![Page 8: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/8.jpg)
SE Download Categorization
Ad Web PostSearch
User Attention
Persuasion
ImpersonateRepackageDecoy Invent Entice Comply
Deception
Alarm
![Page 9: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/9.jpg)
SE Download Categorization
Ad Web PostSearch
User Attention
Persuasion
ImpersonateRepackageDecoy Invent Entice Comply
Deception
Alarm
![Page 10: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/10.jpg)
Advertisement
![Page 11: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/11.jpg)
SE Download Categorization
Ad Web PostSearch
User Attention
Persuasion
ImpersonateRepackageDecoy Invent Entice Comply
Deception
Alarm
![Page 12: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/12.jpg)
Search
![Page 13: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/13.jpg)
Search
www.open-‐download.com
www.mozilla.org
![Page 14: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/14.jpg)
SE Download Categorization
Ad Web PostSearch
User Attention
Persuasion
ImpersonateRepackageDecoy Invent Entice Comply
Deception
Alarm
![Page 15: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/15.jpg)
Web Post
![Page 16: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/16.jpg)
SE Download Categorization
Ad Web PostSearch
User Attention
Persuasion
ImpersonateRepackageDecoy Invent Entice Comply
Deception
Alarm
![Page 17: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/17.jpg)
SE Download Categorization
Ad Web PostSearch
User Attention
Persuasion
ImpersonateRepackageDecoy Invent Entice Comply
Deception
Alarm
![Page 18: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/18.jpg)
Decoy
![Page 19: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/19.jpg)
SE Download Categorization
Ad Web PostSearch
User Attention
Persuasion
ImpersonateRepackageDecoy Invent Entice Comply
Deception
Alarm
![Page 20: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/20.jpg)
Repackage
![Page 21: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/21.jpg)
SE Download Categorization
Ad Web PostSearch
User Attention
Persuasion
ImpersonateRepackageDecoy Invent Entice Comply
Deception
Alarm
![Page 22: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/22.jpg)
Impersonate
![Page 23: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/23.jpg)
SE Download Categorization
Ad Web PostSearch
User Attention
Persuasion
ImpersonateRepackageDecoy Invent Entice Comply
Deception
Alarm
![Page 24: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/24.jpg)
Invent
![Page 25: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/25.jpg)
SE Download Categorization
Ad Web PostSearch
User Attention
Persuasion
ImpersonateRepackageDecoy Invent Entice Comply
Deception
Alarm
![Page 26: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/26.jpg)
Alarm
![Page 27: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/27.jpg)
SE Download Categorization
Ad Web PostSearch
User Attention
Persuasion
ImpersonateRepackageDecoy Invent Entice Comply
Deception
Alarm
![Page 28: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/28.jpg)
Entice
![Page 29: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/29.jpg)
SE Download Categorization
Ad Web PostSearch
User Attention
Persuasion
ImpersonateRepackageDecoy Invent Entice Comply
Deception
Alarm
![Page 30: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/30.jpg)
Comply
![Page 31: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/31.jpg)
Outline
Categorizing SE Download Tactics
Measuring SE Download Properties
Detecting SE Download Attacks
31
![Page 32: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/32.jpg)
Popularity of SE Tactics for Tricking the User
32
Trick Total Percentage
Repackage+Entice 972 48.5%
Invent+Impersonate+Alarm 434 21.7%
Invent+Impersonate+Comply 384 19.2%
Repackage+Decoy 155 7.7%
Impersonate+Decoy 46 2.3%
Impersonate+Entice+Decoy 12 0.6%
Invent+Comply 4 0.2%
Impersonate+Alarm 1 0.1%
![Page 33: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/33.jpg)
Popularity of SE Tactics for Tricking the User
33
Trick Total Percentage
Repackage+Entice 972 48.5%
Invent+Impersonate+Alarm 434 21.7%
Invent+Impersonate+Comply 384 19.2%
Repackage+Decoy 155 7.7%
Impersonate+Decoy 46 2.3%
Impersonate+Entice+Decoy 12 0.6%
Invent+Comply 4 0.2%
Impersonate+Alarm 1 0.1%
Top 3 Responsible for over 89%.
![Page 34: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/34.jpg)
Repackage + Entice (48.5%)
![Page 35: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/35.jpg)
Invent + Impersonate + Alarm (21.7)
![Page 36: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/36.jpg)
Invent + Impersonate + Comply (19.2%)
![Page 37: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/37.jpg)
Invent + Impersonate Subclass (Tactics Popularity)
37
Alarm Comply
Fake Flash 68% 20%
Fake Java 30% 0%
Fake AV 1% 0%
Fake Browser 1% 0%
Fake Player 0% 80%
![Page 38: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/38.jpg)
38
User’s Attention Total Percentage
Ad 1,616 80.6%
Search+Ad 146 7.3%
Search 127 6.3%
Web Post 115 5.7%
Popularity of SE Tactics for Gaining the User’s Attention
![Page 39: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/39.jpg)
Popularity of SE Tactics for Gaining the User’s Attention
39
User’s Attention Total Percentage
Ad 1,616 80.6%
Search+Ad 146 7.3%
Search 127 6.3%
Web Post 115 5.7%
Almost 88% used adver-sements.
![Page 40: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/40.jpg)
Benign Ad Based Downloads
40
Category Percentage
Games 32%
Utilities 30%
Music 15%
Business 11%
Video 8%
Graphics 2%
Social 2%
7% of all benign downloads are ad-based.
40% chance that an ad-based download is benign.
Trion Worlds is the most popular followed by Spotify.
![Page 41: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/41.jpg)
Top 5 Ad Entry Point Domains
Comply Alarm Entice
26% onclickads.net 16% adcash.com 20% doubleclick.net
10% adcash.com 7% onclickads.net 16% google.com
10% popads.net 7% msn.com 12% googleadservices.com
7% putlocker.is 6% yesadsrv.com 11% msn.com
3% allmyvideos.net 4% yu0123456.com 8% coupons.com
41
![Page 42: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/42.jpg)
Top 5 Ad Entry Point Domains
Comply Alarm Entice
26% onclickads.net 16% adcash.com 20% doubleclick.net
10% adcash.com 7% onclickads.net 16% google.com
10% popads.net 7% msn.com 12% googleadservices.com
7% putlocker.is 6% yesadsrv.com 11% msn.com
3% allmyvideos.net 4% yu0123456.com 8% coupons.com
42
![Page 43: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/43.jpg)
Outline
Categorizing SE Download Tactics
Measuring SE Download Properties
Detecting SE Download Attacks
43
![Page 44: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/44.jpg)
AV Detection (Day 0 and Day 30)
44 0% 10% 20% 30% 40% 50% 60% 70% 80%
Repackage+En-ce
Invent+Impersonate+Alarm
Invent+Impersonate+Comply
Day 0 Day 30
![Page 45: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/45.jpg)
Classifying Social Engineering Downloads
Ad Chain Features Ad-Driven Minimum Ad Domain Age Maximum Ad Domain Popularity
Download URL Features Download Domain Age Download Domain Alexa Rank
45
![Page 46: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/46.jpg)
Classifying Social Engineering Downloads
46
Predicted Class Ad-Based SE Benign
Ad-Based SE 91.2% 8.8%Benign 0.5% 99.5%
True Posi-ve Rate False Posi-ve Rate
![Page 47: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/47.jpg)
Conclusion
47
Ad Web PostSearch
User Attention
Persuasion
ImpersonateRepackageDecoy Invent Entice Comply
Deception
Alarm
![Page 48: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/48.jpg)
Conclusion
48
User’s Attention Total Percentage
Ad 1,616 80.6%
Search+Ad 146 7.3%
Search 127 6.3%
Web Post 115 5.7%
Trick Total Percentage
Repackage+Entice 972 48.5%
Invent+Impersonate+Alarm 434 21.7%
Invent+Impersonate+Comply 384 19.2%
Repackage+Decoy 155 7.7%
Impersonate+Decoy 46 2.3%
Impersonate+Entice+Decoy 12 0.6%
Invent+Comply 4 0.2%
Impersonate+Alarm 1 0.1%
Comply Alarm Entice
26% onclickads.net 16% adcash.com 20% doubleclick.net
10% adcash.com 7% onclickads.net 16% google.com
10% popads.net 7% msn.com 12% googleadservices.com
7% putlocker.is 6% yesadsrv.com 11% msn.com
3% allmyvideos.net 4% yu0123456.com 8% coupons.com
![Page 49: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/49.jpg)
Conclusion
49
![Page 50: Towards Measuring and Mitigating Social Engineering ... · Towards Measuring and Mitigating Social Engineering Software Download Attacks Terry Nelms 1,2, Roberto Perdici3,1, Manos](https://reader031.vdocuments.us/reader031/viewer/2022031006/5b8b484c09d3f22f498b4f2f/html5/thumbnails/50.jpg)
Questions?
Towards Measuring and Mitigating Social Engineering Software Download Attacks
Terry Nelms1,2, Roberto Perdici3,1, Manos Antonakakis1, Mustaque Ahamd1,4
1Georgia Ins-tute of Technology 2Damballa, Inc.
3University of Georgia 4New York University Abu Dhabi
[email protected], [email protected], [email protected], [email protected] 50