On Automatically Detecting Malicious Impostor Emails

  • Authors:
  • Erhan J. Kartaltepe;Shouhuai Xu

  • Affiliations:
  • Department of Computer Science, University of Texas at San Antonio, {ekartalt,shxu}@cs.utsa.edu;Department of Computer Science, University of Texas at San Antonio, {ekartalt,shxu}@cs.utsa.edu

  • Venue:
  • Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we explore the problem we call “malicious impostor emails.” Compared with the fairly well-known abuses such as spam and email worms, malicious impostor emails could be much more catastrophic because their payloads may directly target at the victim users' cryptographic keys (via whatever means) and their content---except the malicious payload as an attachment---could look perfectly like a legitimate one. As a first step in dealing with malicious impostor emails, we present a partial solution that mitigates their damage without forcing the involvement of the users.