Conference Publications

Nothing Personal: Understanding the Theft, Spread, and Use of Personally Identifiable Information in the Financial Ecosystem (PDF) (BibTex)
Mehrnoosh Zaeifi, Faezeh Kalantari, Adam Oest, Zhibo Sun, Gail-Joon Ahn, Yan Shoshitaishvili, Tiffany Bao, Ruoyu Wang, Adam Doupé
Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2024

I’m Spartacus, No, I’m Spartacus: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior (PDF) (BibTex)
Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, and Adam Doupé.
Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS), 2022

Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service (PDF) (BibTex)
Zhibo Sun, Adam Oest, Penghui Zhang, Carlos Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, and Gail-Joon Ahn
Proceedings of the 30th USENIX Security Symposium (USENIX), 2021

CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing (PDF) (BibTex)
Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, and Gail-Joon Ahn
Proceedings of the 42nd IEEE Symposium on Security and Privacy (Oakland), 2021. Best Student Paper Award

Scam Pandemic: How Attackers Exploit Public Fear through Phishing (PDF) (BibTex)
Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, and Gail-Joon Ahn
Proceedings of the Symposium on Electronic Crime Research (eCrime), 2020

Understanding and Detecting Private Interactions in Underground Forums (PDF) (BibTex)
Zhibo Sun, Carlos E. Rubio-Medrano, Ziming Zhao, Tiffany Bao, Adam Doupé, and Gail-Joon Ahn
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy (CODASPY), 2019

Towards Automated Threat Intelligence Fusion (PDF) (BibTex)
Ajay Modi, Zhibo Sun, Anupam Panwar, Tejas Khairnar, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, and Paul Black
Proceedings of the IEEE Conference on Collaboration and Internet Computing (CIC),2016

Migrating GIS Big Data Computing from Hadoop to Spark: An Exemplary Study Using Twitter (PDF) (BibTex)
Zhibo Sun, Hong Zhang, Zixia Liu, Chen Xu, and Liqiang Wang
Proceedings of the IEEE International Conference on Cloud Computing (IEEE Cloud), 2016.

DART: A Geographic Information System on Hadoop (PDF) (BibTex)
Hong Zhang, Zhibo Sun, Zixia Liu, Chen Xu, and Liqiang Wang
Proceedings of the IEEE International Conference on Cloud Computing (IEEE Cloud), 2015.

Effects on Performance of Analytical Tools for Visually Demanding Tasks through Direct and Indirect Touch Interaction in an Immersive Visualization (PDF) (BibTex)
Zhibo Sun, Ashish Dhital, Nattaya Areejitkasem, Neera Pradhan, and Amy Banic
Proceedings of the IEEE International Conference on Virtual Reality and Visualization (ICVRV), 2014.

Journal Publications

A Survey on Large Language Model (LLM) Security and Privacy: The Good, the Bad, and the Ugly (PDF) (BibTex)
Yifan Yao, Jinhao Duan, Kaidi Xu, Yuanfang Cai, Zhibo Sun, Yue Zhang.
High-Confidence Computing (HCCOM), 2024

CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing (BibTex)
Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, and Adam Doupé.
IEEE Security & Privacy Magazine, 2022