Filters








1,471 Hits in 4.8 sec

How is e-mail sender authentication used and misused?

Tatsuya Mori, Kazumichi Sato, Yousuke Takahashi, Keisuke Ishibashi
2011 Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference on - CEAS '11  
This paper addresses the question "How is the DNS Sender Policy Framework (SPF), which is the most popular e-mail sender authentication mechanism, used and misused in the wild?"  ...  Since today's primary e-mail sender authentication mechanisms are designed as fully decentralized architecture, it is crucial for e-mail operators to know how other organizations are using and misusing  ...  Acknowledgements We thank Mitsuhiro Shigematsu, Masashi Mitsuda, and Kanako Nozue for their assistance in collecting the data sets used in this work.  ... 
doi:10.1145/2030376.2030380 dblp:conf/ceas/MoriSTI11 fatcat:xwur5vesjrbr3guowpu73wmruu

CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks [article]

Shehroze Farooqi and Maaz Musa and Zubair Shafiq and Fareed Zaffar
2020 arXiv   pre-print
We then monitor the received emails and use Facebook's ad transparency tool to detect any unrecognized use of the shared honeytoken.  ...  We design and implement CanaryTrap to investigate misuse of data shared with third-party apps on Facebook.  ...  This work is supported in part by the National Science Foundation (grants 1715152, 1815131, and 1954224) and a grant from the Higher Education Commission (HEC) Pakistan.  ... 
arXiv:2006.15794v1 fatcat:o5r2vduhkndyfmdnyk74frnyta

CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks

Shehroze Farooqi, Maaz Musa, Zubair Shafiq, Fareed Zaffar
2020 Proceedings on Privacy Enhancing Technologies  
We then monitor the received emails and use Facebook's ad transparency tool to detect any unrecognized use of the shared honeytoken.  ...  We design and implement CanaryTrap to investigate misuse of data shared with third-party apps on Facebook.  ...  This work is supported in part by the National Science Foundation (grants 1715152, 1815131, and 1954224) and a grant from the Higher Education Commission (HEC) Pakistan.  ... 
doi:10.2478/popets-2020-0076 fatcat:3cf6anvddjcqhihebykh5zh76u

Technology Corner: Analysing E-Mail Headers for Forensic Investigation

M. Banday
2011 Journal of Digital Forensics, Security and Law  
Electronic Mail (E-Mail), which is one of the most widely used applications of Internet, has become a global communication infrastructure service.  ...  This paper projects the need for e-mail forensic investigation and lists various methods and tools used for its realization.  ...  This is the address, sender of this e-mail wants recipient to use for sending reply in response to this e-mail. Normally, this is used by the senders to send replies.  ... 
doi:10.15394/jdfsl.2011.1095 fatcat:jetkok7cnjayvmndvgv3rxvvnq

A misuse-based network Intrusion Detection System using Temporal Logic and stream processing

Abdulbasit Ahmed, Alexei Lisitsa, Clare Dixon
2011 2011 5th International Conference on Network and System Security  
and authentication).  ...  the OS and common client applications such as e-mail clients and Web browsers. • An application service: agents perform monitoring for a specific application service only, such as a Web server program  ...  The options syntax is: ... } For instance, if we set language = JAVA then this will set the target language to be JAVA which will cause ANTLR to generate the lexer and parser analysers in JAVA.  ... 
doi:10.1109/icnss.2011.6059953 dblp:conf/nss/AhmedLD11 fatcat:lsgkv7acf5aujbe4oa6lgaaoh4

Email Spoofing

Kunal Pandove, Amandeep Jindal, Rajinder Kumar
2010 International Journal of Computer Applications  
Sending fake emails is usually used to convince the receiver so that he stays unaware of the real sender. Email spoofing may be effectively used to launch phishing attacks on the receivers.  ...  The attacker may also use the attack with some amplification and in addition use mass mailer to spam mail users. Infections may be propagated by the means of spoofed emails to attack victims.  ...  INTRODUCTION E-mail spoofing is a term used to describe (usually fraudulent) email activity in which the sender address and other parts of the email header are altered to appear as though the e-mail originated  ... 
doi:10.5120/881-1252 fatcat:fmbcoxfccbbhzmyku4u5ll62ui

Cryptography [chapter]

Umesh Hodeghatta Rao, Umesha Nayak
2014 The InfoSec Handbook  
from your e-mail.  ...  E-mails sent in plain text can become a serious problem, as someone could tap the network and read your personal e-mail-something that has become quite common.  ...  IPSec protocol suites include: HMAC is a mechanism used for message authentication using cryptographic hash functions such as MD5, SHA-1, etc.  ... 
doi:10.1007/978-1-4302-6383-8_8 fatcat:5kb4ygqgdferlkxn2kpo2wn4gq

Anti-Spam Approaches: Analyses and Comparisons

Joon S. Park, Hsin-Yang Lu, Chia-Jung Tsui
2009 The Open Information Systems Journal  
In this article, we analyze key anti-spam approaches, including filtering, remailers, e-postage, Hashcash, and sender authentication. We discuss their advantages and disadvantages in various aspects.  ...  The e-mail system is one of the most common communication platforms these days. The term spam refers to unsolicited bulk e-mail that people do not want to receive.  ...  Like domain-basis sender authentication, it is still necessary to educate end users and keep them alert to cyber attacks even if e-mail passes the sender authentication.  ... 
doi:10.2174/1874133900903010036 fatcat:hyphzb6pfndyrfuh5iw5xnbiwe

Armed for the Spam Battle: A Technological and Organizational Infrastructure Framework

Guido Schryen
2007 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)  
and propagation by the ICANN, the ISOC, and by large e-mail service providers.  ...  The key element of our infrastructure is a new organizational unit that reliably and transparently limits the number of e-mails that can be sent per day and per account.  ...  In order to protect e-mail accounts from easy misuse, an authentication mechanism has to be applied. If SMTP-based connection is used, then SMTP-AUTH [9] can be used.  ... 
doi:10.1109/hicss.2007.86 dblp:conf/hicss/Schryen07 fatcat:qwdzjvuu2zfb5dylervrcwvkoa

Editorial

Stephen Mason
2014 Digital Evidence and Electronic Signature Law Review  
the authenticity of the sender's e-mail address, the linguistic structure of the text of the e-mail, and whether there are references to physical attributes, such as a postal address or a telephone number  ...  It is for this reason that a name typed into an e-mail is easier to deal with.  ... 
doi:10.14296/deeslr.v2i0.1742 fatcat:fwtcrh7ainfhpby4t7gppgcnwy

A policy driven approach to email services

S. Kaushik, P. Ammann, D. Wijesekera, W. Winsborough, R. Ritchey
2004 Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004.  
Our scheme rewards faithful senders with better quality of service and discourages misbehavior.  ...  Our scheme provides receivers with policy-driven control over whether and how a given message appears in the recipients mailbox.  ...  system (or e-mail system) has three major components: user agents, mail servers, and the Simple Mail Transfer Protocol (SMTP) [21] .  ... 
doi:10.1109/policy.2004.1309163 dblp:conf/policy/KaushikAWWR04 fatcat:c2zgdgpqzrhkbh3snsoqy54qrm

A Formal Approach towards Assessing the Effectiveness of Anti-Spam Procedures

G. Schryen
2006 Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)  
So far we have been reasonably able to resist spam e-mails and use the Internet for regular communication by deploying complementary anti-spam approaches.  ...  Spam e-mails have become a serious technological and economic problem.  ...  Another authentication-based approach is the use of an Lightweight MTA Authentication Protocol (LMAP) [9] .  ... 
doi:10.1109/hicss.2006.9 dblp:conf/hicss/Schryen06 fatcat:7juezqhnr5fhxnoi4ux7oooppi

On the security and privacy of Interac e-Transfers [article]

Fabian Willems , Carlisle Adams School of Electrical Engineering and Computer Science, University of Ottawa)
2019 arXiv   pre-print
To the best of our knowledge, this paper is the very first to examine the privacy and security of Interac e-Transfers.  ...  Anyone with illegitimate intent can use this information to carry out attacks, including the fraudulent redirection of Standard e-Transfers.  ...  Question 5: How can the learned information be misused for more sophisticated attacks?  ... 
arXiv:1910.01587v2 fatcat:qnslnaqmq5hbhelqoxwzdr6f5q

Emailing System with Elevated Safeguard Procedures

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
When have the key that is basic public Sender encrypts the e mail accessory and promises the message to your receiver.  ...  Email, e mail, or e mail, is considered probably the most normally employed solution on the net.  ...  Despite the readiness of at present's electronic mail infrastructure, it's difficult to assurance the authenticity of a sender target for inbound mails.  ... 
doi:10.35940/ijitee.i3124.0789s319 fatcat:y5wugtd76bgq3hrj7z3qybpr3m

E-mail bombs and countermeasures: cyber attacks on availability and brand integrity

T. Bass, A. Freyre, D. Gruber, G. Watt
1998 IEEE Network  
The simplicity of SMTP mail can be combined with the robustness of the sendmail MTA program and misused in numerous ways to create extraordinary and powerful e-mail bombs.  ...  Also discussed is an actual Internet-based attack that was launched in 1997 on the Langley AFB SMTP e-mail infrastructure.  ...  Watt at the above e-mail address.  ... 
doi:10.1109/65.681925 fatcat:ckqrzhjdzjbijol6xqbtyl36he
« Previous Showing results 1 — 15 out of 1,471 results