Skip to main content

Showing 1–4 of 4 results for author: Longtchi, T

Searching in archive cs. Search in all archives.
.
  1. Quantifying Psychological Sophistication of Malicious Emails

    Authors: Theodore Longtchi, Rosana MontaƱez Rodriguez, Kora Gwartney, Ekzhin Ear, David P. Azari, Christopher P. Kelley, Shouhuai Xu

    Abstract: Malicious emails including Phishing, Spam, and Scam are one significant class of cyber social engineering attacks. Despite numerous defenses to counter them, the problem remains largely open. The ineffectiveness of current defenses can be attributed to our superficial understanding of the psychological properties that make these attacks successful. This problem motivates us to investigate the psyc… ▽ More

    Submitted 22 August, 2024; originally announced August 2024.

    Comments: 22 papges, 15 figures, 4 tables

    Report number: Access-2024-45196

    Journal ref: IEEE Access 12 (2024) 187512-187535

  2. arXiv:2408.11586  [pdf, other

    cs.CR

    Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails

    Authors: Theodore Longtchi, Shouhuai Xu

    Abstract: The landscape of malicious emails and cyber social engineering attacks in general are constantly evolving. In order to design effective defenses against these attacks, we must deeply understand the Psychological Tactics, PTacs, and Psychological Techniques, PTechs, that are exploited by these attacks. In this paper we present a methodology for characterizing the evolution of PTacs and PTechs explo… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

    Comments: 20 pages, 9 figures, 2 tables

  3. arXiv:2408.11584  [pdf, other

    cs.CR

    Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails

    Authors: Theodore Longtchi, Shouhuai Xu

    Abstract: Cyber attacks, including cyber social engineering attacks, such as malicious emails, are always evolving with time. Thus, it is important to understand their evolution. In this paper we characterize the evolution of malicious emails through the lens of Psychological Factors, PFs, which are humans psychological attributes that can be exploited by malicious emails. That is, attackers who send them.… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

    Comments: 20 pages, 8 figures, 2 tables

  4. arXiv:2203.08302  [pdf, other

    cs.CR cs.HC

    Internet-based Social Engineering Attacks, Defenses and Psychology: A Survey

    Authors: Theodore Longtchi, Rosana MontaƱez Rodriguez, Laith Al-Shawaf, Adham Atyabi, Shouhuai Xu

    Abstract: Social engineering attacks are a major cyber threat because they often serve as a first step for an attacker to break into an otherwise well-defended network, steal victims' credentials, and cause financial losses. The problem has received due amount of attention with many publications proposing defenses against them. Despite this, the situation has not improved. In this paper, we aim to understan… ▽ More

    Submitted 1 August, 2022; v1 submitted 15 March, 2022; originally announced March 2022.

    Comments: * Shared first-author