Historical review of OCR research and development
Document image analysis
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Communications of the ACM
Exploiting redundancy in natural language to penetrate Bayesian spam filters
WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
I seek you: searching and matching individuals in social networks
Proceedings of the eleventh international workshop on Web information and data management
Let Only the Right One IN: Privacy Management Scheme for Social Network
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Privacy wizards for social networking sites
Proceedings of the 19th international conference on World wide web
Secret interest groups (SIGs) in social networks with an implementation on Facebook
Proceedings of the 2010 ACM Symposium on Applied Computing
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
Proceedings of the 2010 ACM Symposium on Applied Computing
Distributed Automatic Configuration of Complex IPsec-Infrastructures
Journal of Network and Systems Management
An analysis of social network-based Sybil defenses
Proceedings of the ACM SIGCOMM 2010 conference
Why spammers should thank Google?
Proceedings of the 3rd Workshop on Social Network Systems
Honeybot, your man in the middle for automated social engineering
LEET'10 Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
Decaptcha: breaking 75% of eBay audio CAPTCHAs
WOOT'09 Proceedings of the 3rd USENIX conference on Offensive technologies
Exploiting social networking sites for spam
Proceedings of the 17th ACM conference on Computer and communications security
Cheap and automated socio-technical attacks based on social networking sites
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
Using social networks to harvest email addresses
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Measuring the mixing time of social graphs
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Abusing social networks for automated user profiling
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
A risk management process for consumers: the next step in information security
Proceedings of the 2010 workshop on New security paradigms
Detecting spammers on social networks
Proceedings of the 26th Annual Computer Security Applications Conference
Understanding the behavior of malicious applications in social networks
IEEE Network: The Magazine of Global Internetworking
Social networking and the risk to companies and institutions
Information Security Tech. Report
Towards active detection of identity clone attacks on online social networks
Proceedings of the first ACM conference on Data and application security and privacy
A survey on automatic configuration of virtual private networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A recommendation system for spots in location-based online social networks
Proceedings of the 4th Workshop on Social Network Systems
Reverse social engineering attacks in online social networks
DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
How unique and traceable are usernames?
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Sybil defenses via social networks: a tutorial and survey
ACM SIGACT News
Spam detection on twitter using traditional classifiers
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Trend analysis and recommendation of users' privacy settings on social networking services
SocInfo'11 Proceedings of the Third international conference on Social informatics
LotusNet: Tunable privacy for distributed online social network services
Computer Communications
Sherlock holmes' evil twin: on the impact of global inference for online privacy
Proceedings of the 2011 workshop on New security paradigms workshop
The socialbot network: when bots socialize for fame and money
Proceedings of the 27th Annual Computer Security Applications Conference
Social snapshots: digital forensics for online social networks
Proceedings of the 27th Annual Computer Security Applications Conference
Authenticating strangers in Online Social Networks
International Journal of Security and Networks
Proceedings of the Fifth Workshop on Social Network Systems
Online social network platforms: toward a model-backed security evaluation
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
C4PS: colors for privacy settings
Proceedings of the 21st international conference companion on World Wide Web
Aiding the detection of fake accounts in large scale social online services
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
PoX: Protecting users from malicious Facebook applications
Computer Communications
Poultry markets: on the underground economy of twitter followers
Proceedings of the 2012 ACM workshop on Workshop on online social networks
Poultry markets: on the underground economy of twitter followers
ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12
SybilControl: practical sybil defense with computational puzzles
Proceedings of the seventh ACM workshop on Scalable trusted computing
Magentix2: A privacy-enhancing Agent Platform
Engineering Applications of Artificial Intelligence
All your face are belong to us: breaking Facebook's social authentication
Proceedings of the 28th Annual Computer Security Applications Conference
Do online social network friends still threaten my privacy?
Proceedings of the third ACM conference on Data and application security and privacy
Street-Level trust semantics for attribute authentication
SP'12 Proceedings of the 20th international conference on Security Protocols
C4PS - helping facebookers manage their privacy settings
SocInfo'12 Proceedings of the 4th international conference on Social Informatics
Enhancing and identifying cloning attacks in online social networks
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design and analysis of a social botnet
Computer Networks: The International Journal of Computer and Telecommunications Networking
FakeBook: Detecting Fake Profiles in On-Line Social Networks
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Connecting users across social media sites: a behavioral-modeling approach
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy and security issues in social networks: an evaluation of Facebook
Proceedings of the 2013 International Conference on Information Systems and Design of Communication
Follow the green: growth and dynamics in twitter follower markets
Proceedings of the 2013 conference on Internet measurement conference
Honeywords: making password-cracking detectable
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
An integrated framework for enhancing privacy in online social networks
Proceedings of the 6th ACM India Computing Convention
Social engineering attacks on the knowledge worker
Proceedings of the 6th International Conference on Security of Information and Networks
Social spammer detection in microblogging
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Leveraging Social Feedback to Verify Online Identity Claims
ACM Transactions on the Web (TWEB)
A defence scheme against Identity Theft Attack based on multiple social networks
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week. Many social networking sites have millions of registered users who use these sites to share photographs, contact long-lost friends, establish new business contacts and to keep in touch. In this paper, we investigate how easy it would be for a potential attacker to launch automated crawling and identity theft attacks against a number of popular social networking sites in order to gain access to a large volume of personal user information. The first attack we present is the automated identity theft of existing user profiles and sending of friend requests to the contacts of the cloned victim. The hope, from the attacker's point of view, is that the contacted users simply trust and accept the friend request. By establishing a friendship relationship with the contacts of a victim, the attacker is able to access the sensitive personal information provided by them. In the second, more advanced attack we present, we show that it is effective and feasible to launch an automated, cross-site profile cloning attack. In this attack, we are able to automatically create a forged profile in a network where the victim is not registered yet and contact the victim's friends who are registered on both networks. Our experimental results with real users show that the automated attacks we present are effective and feasible in practice.