Dates are inconsistent

Dates are inconsistent

1 results sorted by ID

Possible spell-corrected query: mpsu-can
2021/1260 (PDF) Last updated: 2021-09-21
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers
Jelle Vos, Zekeriya Erkin, Christian Doerr
Cryptographic protocols

In their pursuit to maximize their return on investment, cybercriminals will likely reuse as much as possible between their campaigns. Not only will the same phishing mail be sent to tens of thousands of targets, but reuse of the tools and infrastructure across attempts will lower their costs of doing business. This reuse, however, creates an effective angle for mitigation, as defenders can recognize domain names, attachments, tools, or systems used in a previous compromisation attempt,...

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.