This thesis looks at recent and historical examples of mis/disinformation and discovers that there are many psychological factors contributing to why people get fooled by deceptive media throughout history, and in modern times, deception is amplified by social media, a platform designed to prioritize profits and user engagement over content moderation. The thesis then proposes a process flow for an app to teach any kind of person how to evaluate news sources.
This thesis looks at recent and historical examples of mis/disinformation and discovers that there are many psychological factors contributing to why people get fooled by deceptive media throughout history, and in modern times, deception is amplified by social media, a platform designed to prioritize profits and user engagement over content moderation. The thesis then proposes a process flow for an app to teach any kind of person how to evaluate news sources.
In this dissertation, I analyze the state of the anti-phishing ecosystem and show that phishers use evasion techniques, including cloaking, to bypass anti-phishing mitigations in hopes of maximizing the return-on-investment of their attacks. I develop three novel, scalable data-collection and analysis frameworks to pinpoint the ecosystem vulnerabilities that sophisticated phishing websites exploit. The frameworks, which operate on real-world data and are designed for continuous deployment by anti-phishing organizations, empirically measure the robustness of industry-standard anti-phishing blacklists (PhishFarm and PhishTime) and proactively detect and map phishing attacks prior to launch (Golden Hour). Using these frameworks, I conduct a longitudinal study of blacklist performance and the first large-scale end-to-end analysis of phishing attacks (from spamming through monetization). As a result, I thoroughly characterize modern phishing websites and identify desirable characteristics for enhanced anti-phishing systems, such as more reliable methods for the ecosystem to collectively detect phishing websites and meaningfully share the corresponding intelligence. In addition, findings from these studies led to actionable security recommendations that were implemented by key organizations within the ecosystem to help improve the security of Internet users worldwide.