Phishing knowledge based user modelling in software design

Linfeng Li, Timo Nummenmaa, Eleni Berki, Marko Helenius

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Abstract

    Due to the limitations of anti-phishing software and limitations in
    creating such software, we propose the usage of metamodelling frameworks and software tools for implementing software systems where phishing prevention is already designed as a part of the system itself. An expressive computational, verifiable and validatable metamodel is created that captures user behaviour.

    Next it is shown through examples that the metamodel follows and describes
    reported phishing scams accurately. The model is then used to create specification in an executable formal specification tool. The formal specification, which can be executed to observe user behaviour, can be used as a building block in the specification of a larger software system, resulting in an inherently phishing-resilient software system design in the form of a formal specification.
    Original languageEnglish
    Title of host publicationProceedings of the 14th Symposium on Programming Languages and Software Tools
    EditorsJyrki Nummenmaa, Outi Sievi-Korte, Erkki Mäkinen
    Pages221-235
    Number of pages15
    Publication statusPublished - 2015
    Publication typeA4 Article in conference proceedings
    EventSYMPOSIUM ON PROGRAMMING LANGUAGES AND SOFTWARE TOOLS -
    Duration: 1 Jan 2015 → …

    Publication series

    NameCEUR Workshop Proceedings
    Volume1525
    ISSN (Print)1613-0073

    Conference

    ConferenceSYMPOSIUM ON PROGRAMMING LANGUAGES AND SOFTWARE TOOLS
    Period1/01/15 → …

    Keywords

    • Formal Methods
    • Metamodelling
    • Phishing
    • Software Design

    Publication forum classification

    • Publication forum level 1

    Fingerprint

    Dive into the research topics of 'Phishing knowledge based user modelling in software design'. Together they form a unique fingerprint.

    Cite this