AI Adoption - Drive Business Value and Organizational Impact
Free courses from frontend to fullstack and AI
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a 12-minute conference presentation from USENIX Security '24 that reveals critical vulnerabilities in email systems' delegation mechanisms. Learn how researchers from the University of Science and Technology of China, University of Kansas, and Fordham University uncovered security flaws allowing attackers to bypass DKIM and DMARC protections through spoofed Sender fields. Discover findings from their 50-participant study showing that half of users are vulnerable to deceptive delegate information, and examine the impact of novel email spoofing attacks tested across 16 service providers and 20 email clients. Understand their proposed validation scheme and security enhancement recommendations for protecting against delegation mechanism exploitation in email systems.
Syllabus
USENIX Security '24 - FakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation...
Taught by
USENIX