Abstract: Phishing attacks have frequently used homographs since they were first described a decade ago. Though a wide variety of tools and techniques have been used to mitigate the effectiveness of ...