Infiltrating social network accounts: Attacks and defenses

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Social networks collect and make public an unprecedented amount of user location information. This raises significant user privacy concerns. In this chapter, we describe social networking infiltration attacks, where adversaries befriend random victims of their choice and acquire access to their private information. To address this problem, we propose verification mechanisms that use location information certified by geosocial networks to quantify the context shared by a user and an inviter. We develop novel visual notifications that leverage the outcome of the proposed verifications to inform users about the context they share with inviters. The impact of location information makes it however vulnerable to attacks: users can rely on existing tools to report fraudulent locations. We describe venue centric location verification solutions that are resilient to powerful adversaries.

Cite

CITATION STYLE

APA

Potharaju, R., Carbunar, B., Azimpourkivi, M., Vasudevan, V., & Iyengar, S. S. (2015). Infiltrating social network accounts: Attacks and defenses. In Secure System Design and Trustable Computing (pp. 457–485). Springer International Publishing. https://doi.org/10.1007/978-3-319-14971-4_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free