Revealing the Hidden Effects of Phishing Emails: An Analysis of Eye and Mouse Movements in Email Sorting Tasks

05/26/2023
by   Yasmeen Abdrabou, et al.
0

Users are the last line of defense as phishing emails pass filter mechanisms. At the same time, phishing emails are designed so that they are challenging to identify by users. To this end, attackers employ techniques, such as eliciting stress, targeting helpfulness, or exercising authority, due to which users often miss being manipulated out of malicious intent. This work builds on the assumption that manipulation techniques, even if going unnoticed by users, still lead to changes in their behavior. In this work, we present the outcomes of an online study in which we collected gaze and mouse movement data during an email sorting task. Our findings show that phishing emails lead to significant differences across behavioral features but depend on the nature of the email. We discuss how our findings can be leveraged to build security mechanisms protecting users and companies from phishing.

READ FULL TEXT
research
01/22/2022

MIDAS: Deep learning human action intention prediction from natural eye movement patterns

Eye movements have long been studied as a window into the attentional me...
research
04/19/2018

Assessing Language Proficiency from Eye Movements in Reading

We present a novel approach for determining learners' second language pr...
research
06/24/2020

Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack

Cyber attacks such as phishing, IRS scams, etc., still are successful in...
research
07/26/2020

Detecting Relevance during Decision-Making from Eye Movements for UI Adaptation

This paper proposes an approach to detect information relevance during d...
research
04/21/2021

Eye Know You: Metric Learning for End-to-end Biometric Authentication Using Eye Movements from a Longitudinal Dataset

While numerous studies have explored eye movement biometrics since the m...
research
06/27/2019

Studying the Impact of Mood on Identifying Smartphone Users

This paper explores the identification of smartphone users when certain ...

Please sign up or login with your details

Forgot password? Click here to reset