Visual phishing detectors rely on website logos as the invariant identity indicator to detect phishing websites that mimic a target brand’s website. Despite their promising performance, the robustness of these detectors is not yet well understood. In this paper, we challenge the invariant assumption of these detectors and propose new attack tactics, LogoMorph, with the ultimate purpose of enhancing these systems. LogoMorph is rooted in a key insight: users can neglect large visual perturbations on the logo as long as the perturbation preserves the original logo’s semantics. We devise a range of attack methods to create semantic-preserving adversarial logos, yielding phishing webpages that bypass state-of-the-art detectors. For text-based logos, we find that using alternative fonts can help to achieve the attack goal. For image-based logos, we find that an adversarial diffusion model can effectively capture the style of the logo while generating new variants with large visual differences. Practically, we evaluate LogoMorph with white-box and black-box experiments and test the resulting adversarial webpages against various visual phishing detectors end-to-end. User studies (n = 150) confirm the effectiveness of our adversarial phishing webpages on end users (with a detection rate of 0.59, barely better than a coin toss). We also propose and evaluate countermeasures, and share our code.

It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors / Hao, Qingying; Diwan, Nirav; Yuan, Ying; Apruzzese, Giovanni; Conti, Mauro; Wang, Gang. - (2024). (Intervento presentato al convegno the Proceedings of the 33rd USENIX Security Symposium. tenutosi a Philadelphia, PA, USA).

It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors

Ying Yuan;Mauro Conti;
2024

Abstract

Visual phishing detectors rely on website logos as the invariant identity indicator to detect phishing websites that mimic a target brand’s website. Despite their promising performance, the robustness of these detectors is not yet well understood. In this paper, we challenge the invariant assumption of these detectors and propose new attack tactics, LogoMorph, with the ultimate purpose of enhancing these systems. LogoMorph is rooted in a key insight: users can neglect large visual perturbations on the logo as long as the perturbation preserves the original logo’s semantics. We devise a range of attack methods to create semantic-preserving adversarial logos, yielding phishing webpages that bypass state-of-the-art detectors. For text-based logos, we find that using alternative fonts can help to achieve the attack goal. For image-based logos, we find that an adversarial diffusion model can effectively capture the style of the logo while generating new variants with large visual differences. Practically, we evaluate LogoMorph with white-box and black-box experiments and test the resulting adversarial webpages against various visual phishing detectors end-to-end. User studies (n = 150) confirm the effectiveness of our adversarial phishing webpages on end users (with a detection rate of 0.59, barely better than a coin toss). We also propose and evaluate countermeasures, and share our code.
2024
the Proceedings of the 33rd USENIX Security Symposium.
Phishing
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors / Hao, Qingying; Diwan, Nirav; Yuan, Ying; Apruzzese, Giovanni; Conti, Mauro; Wang, Gang. - (2024). (Intervento presentato al convegno the Proceedings of the 33rd USENIX Security Symposium. tenutosi a Philadelphia, PA, USA).
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1750893
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact