Social snapshots: digital forensics for online social networks
Proceedings of the 27th Annual Computer Security Applications Conference
Enhancing and identifying cloning attacks in online social networks
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Game theoretic attack analysis in online social network (OSN) services
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Appinspect: large-scale evaluation of social networking apps
Proceedings of the first ACM conference on Online social networks
Social engineering attacks on the knowledge worker
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |
Friend-in-the-middle attacks on social networking sites can be used to harvest social data in an automated fashion. Attackers can then exploit this data for large-scale attacks using context-aware spam and social phishing. The authors prove the feasibility of such an attack and simulate the impact on Facebook. Alarmingly, all major social networking sites are vulnerable to this attack because they fail to appropriately secure the network layer.