Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks

作者: Danesh Irani , Steve Webb , Kang Li , Calton Pu

DOI: 10.1109/MIC.2011.25

关键词:

摘要: … define the set of attributes for a password-recovery attack as … for the set of attributes required to execute the attack. To do this, … to provide certain services, such as password recovery, can …

参考文章(9)
Amanda Lenhart, Adults and social network websites Pew Internet & American Life Project. ,(2009)
M. Just, Designing and evaluating challenge-question systems ieee symposium on security and privacy. ,vol. 2, pp. 32- 39 ,(2004) , 10.1109/MSP.2004.80
V.S. Verykios, G.V. Moustakides, M.G. Elfeky, A Bayesian decision model for cost optimal record matching The VLDB Journal The International Journal on Very Large Data Bases. ,vol. 12, pp. 28- 40 ,(2003) , 10.1007/S00778-002-0072-Y
Ariel Rabkin, Personal knowledge questions for fallback authentication Proceedings of the 4th symposium on Usable privacy and security - SOUPS '08. pp. 13- 23 ,(2008) , 10.1145/1408664.1408667
Stuart Schechter, A.J. Bernheim Brush, Serge Egelman, It's No Secret. Measuring the Security and Reliability of Authentication via Secret Questions ieee symposium on security and privacy. pp. 375- 390 ,(2009) , 10.1109/SP.2009.11
Danesh Irani, Steve Webb, Kang Li, Calton Pu, Large Online Social Footprints--An Emerging Threat computational science and engineering. ,vol. 3, pp. 271- 276 ,(2009) , 10.1109/CSE.2009.459
Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel, Abusing social networks for automated user profiling recent advances in intrusion detection. pp. 422- 441 ,(2010) , 10.1007/978-3-642-15512-3_22
Arvind Narayanan, Vitaly Shmatikov, Robust De-anonymization of Large Sparse Datasets ieee symposium on security and privacy. pp. 111- 125 ,(2008) , 10.1109/SP.2008.33
Vitaly Shmatikov, Arvind Narayanan, De-anonymizing Social Networks ieee symposium on security and privacy. pp. 173- 187 ,(2009) , 10.1109/SP.2009.22