[1] |
AL-MUSIB N S , AL-SERHANI F M , HUMAYUN M ,et al. Business email compromise (BEC) attacks[J]. Materials Today:Proceedings, 2021.
|
[2] |
WONG M , SCHLITT W . Request for comments 7208,sender policy framework (SPF) for authorizing use of domains in email,version 1[S]. RFC Editor, 2006.
|
[3] |
CROCKER D , HANSEN T , KUCHERAWY M . Request for comments 6376,Domainkeys identified mail (dkim) signatures[S]. RFC Editor, 2011.
|
[4] |
KUCHERAWY M , ZWICKY E . Request for comments 7489,domain-based message authentication,reporting,and conformance (DMARC)[S]. RFC Editor, 2015.
|
[5] |
HU H , PENG P , WANG G . Towards understanding the adoption of anti-spoofing protocols in email systems[C]// IEEE Secure Development Conference (SecDev). 2018: 94-101.
|
[6] |
HU H , WANG G . End-to-end measurements of email spoofing attacks[C]// 27th USENIX Security Symposium (USENIX Security 18). 2018: 1095-1112.
|
[7] |
尚菁菁, 朱宇佳, 刘庆云 . 电子邮件安全扩展协议应用分析[J]. 网络与信息安全学报, 2020,6(6): 69-79.
|
|
SHANG J J , ZHU Y J , LIU Q Y . Analysis of security extension protocol in e-mail system[J]. Chinese Journal of Network and Information Security, 2020,6(6): 69-79.
|
[8] |
CHEN J , PAXSON V , JIANG J . Composition kills:a case study of email sender authentication[C]// 29th USENIX Security Symposium (USENIX Security 20). 2020: 2183-2199.
|
[9] |
SHEN K , WANG C , GUO M ,et al. Weak links in authentication chains:a large-scale analysis of email sender spoofing attacks[C]// 30th USENIX Security Symposium (USENIX Security 21). 2021: 3201-3217.
|
[10] |
DECCIO C , YADAV T , BENNETT N ,et al. Measuring email sender validation in the wild[C]// Proceedings of the 17th International Conference on Emerging Networking Experiments and Technologies. 2021: 230-242.
|
[11] |
KLENSIN J . Request for comments 5321,simple mail transfer protocol[S]. RFC Editor, 2008.
|
[12] |
RESNICK P . Request for comments 5322,Internet message format[S]. RFC Editor, 2008.
|