Filters








13,747 Hits in 7.1 sec

On the feasibility of inference attacks by third-party extensions to social network systems

Seyed Hossein Ahmadinejad, Philip W.L. Fong
2013 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13  
Social Network Systems (SNSs) providers allow third-party extensions to access users' information through an Application Programming Interface (API).  ...  In this work, we conduct a comprehensive empirical study to assess the feasibility and accuracy of inference attacks that are launched from the extension API of SNSs.  ...  Our emphasis on the role of third-party extensions in launching inference attacks differentiates us from other related work on generic inference attacks over social network data sets [6, 5, 3] .  ... 
doi:10.1145/2484313.2484333 dblp:conf/ccs/AhmadinejadF13 fatcat:tuqa73lsm5hzfcsevy24ju3xea

A Mechanism to Preserve Private Data in Social Networking System

Lakshmi Vidyadharan, Karthigha M, Mary Treesa Thomas
2015 International Journal of Computer Applications  
Once an extension is certified by the user to access data from users' profile, then there is no more control on how it uses the data.  ...  SNS allows third party extensions to access the users' information through Application Programming Interface (API).  ...  Principles of Social Networking Social Network Systems (SNSs) are one of the most popular application genres on the Internet.  ... 
doi:10.5120/19617-1515 fatcat:w5dv4ylr3jbjvbwfv7nv6ps6ym

Inference attacks by third-party extensions to social network systems

Seyed Hossein Ahmadinejad, Mohd Anwar, Philip W. L. Fong
2011 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
We study inference attacks that can be launched via the extension API of Facebook.  ...  We explain the threat of these attacks through a reduction to authentication attacks, devise a taxonomy for such attacks, and propose a risk metric to help subscribers of third-party applications refine  ...  ACKNOWLEDGMENT The authors would like to thank Jun Biao Zhang for helping to identify the permissions required by the example attacks, and Ida Siahaan and Philipp Woelfel for their helpful discussions.  ... 
doi:10.1109/percomw.2011.5766884 dblp:conf/percom/AhmadinejadAF11 fatcat:ezitgfnccra6tcdfawy4274qxa

Social Networking Sites Security: Quo Vadis

Markus Huber, Martin Mulazzani, Edgar Weippl
2010 2010 IEEE Second International Conference on Social Computing  
Social networking sites have been studied extensively within the past five years, especially in the area of information security.  ...  Furthermore we found that research focuses mainly on Facebook, while scant attention is paid to other social networking sites.  ...  They also offer their software to use it on top of Facebook as a third party application in combination with a Firefox extension.  ... 
doi:10.1109/socialcom.2010.166 dblp:conf/socialcom/HuberMW10 fatcat:4p4qdo74cvao7i43q5vl3vvgna

Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications

2018 Future Internet  
The push notification attack bypasses the standard ways of protecting user privacy based on the network layer by operating at the application level.  ...  In an offline attack, a passive attacker correlates the social network activity of a user with the received push notification.  ...  Push notifications are extensively used by almost all popular mobile apps and especially by social networking applications, for instance to notify the user about a new social interaction such as a new  ... 
doi:10.3390/fi10020013 fatcat:enkpvvaxujdjdlsdzigy65kiq4

Privacy and security in online social networks: A survey

Imrul Kayes, Adriana Iamnitchi
2017 Online Social Networks and Media  
Built on a foundation of trust-users connect to other users with common interests or overlapping personal trajectories-online social networks and the associated applications extract an unprecedented volume  ...  Online Social Networks (OSN) are a permanent presence in today's personal and professional lives of a huge segment of the population, with direct consequences to offline activities.  ...  Persona application in Facebook is similar to any third-party Facebook application, where users log-in by authenticating to the browser extension.  ... 
doi:10.1016/j.osnem.2017.09.001 fatcat:xme5wwkyfbhnpgoiwgadknageq

Potential mass surveillance and privacy violations in proximity-based social applications [article]

Silvia Puglisi, David Rebollo-Monedero, Jordi Forné
2016 arXiv   pre-print
We analyse a set of popular dating application that shares users relative distances within a certain radius and show how, by using the information shared on these platforms, it is possible to formalise  ...  The same attack can also be used to follow a user in all their movements within a certain period of time, therefore identifying their habits and Points of Interest across the city.  ...  ACKNOWLEDGMENT This work was partly supported by the Spanish Government through projects CONSEQUENCE (TEC2010-20572-C02-02) and EMRISCO (TEC2013-47665-C4-1-R).  ... 
arXiv:1605.06533v1 fatcat:yft6j524arazhhdzu3swv3cvce

Potential Mass Surveillance and Privacy Violations in Proximity-Based Social Applications

Silvia Puglisi, David Rebollo-Monedero, Jordi Forne
2015 2015 IEEE Trustcom/BigDataSE/ISPA  
We analyse a set of popular dating application that shares users relative distances within a certain radius and show how, by using the information shared on these platforms, it is possible to formalise  ...  The same attack can also be used to follow a user in all their movements within a certain period of time, therefore identifying their habits and Points of Interest across the city.  ...  ACKNOWLEDGMENT This work was partly supported by the Spanish Government through projects CONSEQUENCE (TEC2010-20572-C02-02) and EMRISCO (TEC2013-47665-C4-1-R).  ... 
doi:10.1109/trustcom.2015.481 dblp:conf/trustcom/PuglisiRF15 fatcat:zxocvvjzyrenjh4ltm6mgs2tda

Privacy and Utility of Inference Control Mechanisms for Social Computing Applications

Seyed Hossein Ahmadinejad, Philip W.L. Fong, Reihaneh Safavi-Naini
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
To the best of our knowledge, ours is the first work to articulate precise privacy and utility goals of inference control mechanisms for third-party applications in social computing platforms.  ...  Modern social computing platforms (e.g., Facebook) are extensible. Third-party developers deploy extensions (e.g., Facebook applications) that augment the functionalities of the underlying platforms.  ...  Acknowledgments This work is supported in part by an NSERC Discovery Grant (RGPIN-2014-06611) and a Canada Research Chair (950-229712).  ... 
doi:10.1145/2897845.2897878 dblp:conf/ccs/AhmadinejadFS16 fatcat:kux6h5qskvc7jegwgz33znzibi

Review of Data Integrity Attacks and Mitigation Methods in Edge Computing [chapter]

Poornima Mahadevappa, Raja Kumar Murugesan
2021 Communications in Computer and Information Science  
Due to the lack of transparency of stakeholders processing edge data, it is challenging to identify the vulnerabilities.  ...  The edge data analytics process the ubiquitous data on the edge layer to offer real-time interactions for the application.  ...  Since these attacks can obstruct the normal operation of the network without being detected, the intention of these attacks can be to gain control over the system, establish undetectable errors, or malicious  ... 
doi:10.1007/978-981-16-8059-5_31 fatcat:5i6xq2vtibg7lit5wcprpzyvgu

Applications of Differential Privacy in Social Network Analysis: A Survey [article]

Honglu Jiang, Jian Pei, Dongxiao Yu, Jiguo Yu, Bei Gong, Xiuzhen Cheng
2021 arXiv   pre-print
We present a concise review of the foundations of differential privacy and the major variants and discuss how differential privacy is applied to social network analysis, including privacy attacks in social  ...  As social network analysis has been extensively adopted in many applications, it opens a new arena for the application of differential privacy.  ...  Privacy Attacks and Types of Differential Privacy for Social Networks In this section, we first summarize the popular privacy attacks and provide insights on how to model privacy in social networks.  ... 
arXiv:2010.02973v2 fatcat:finuu7fjenhzzcfhplapwt37mi

Weaving a safe web of news

Kanak Kiscuitwala, Willem Bult, Mathias Lécuyer, T.J. Purtell, Madeline K.B. Ross, Augustin Chaintreau, Chris Haseman, Monica S. Lam, Susan E. McGregor
2013 Proceedings of the 22nd International Conference on World Wide Web - WWW '13 Companion  
Skype has gone from in the mid-2000s being the tool most widely used and promoted by human rights activists to now when people ask me I say, 'Definitely, don't use it,' " -Ronald J.  ...  ACKNOWLEDGEMENTS Dispatch is one of the inaugural recipients of a "Magic Grant" from the Brown Institute of Media Innovation.  ...  Our research is also supported in part by NSF Programmable Open Mobile Internet (POMI) 2020 Expedition Grant 0832820 and the Stanford MobiSocial Computing Laboratory.  ... 
doi:10.1145/2487788.2488063 dblp:conf/www/KiscuitwalaBLPRCHLM13 fatcat:cj4pm5kxw5brnohsylvgfasof4

Online social networks security and privacy: comprehensive review and analysis

Ankit Kumar Jain, Somya Ranjan Sahoo, Jyoti Kaubiyal
2021 Complex & Intelligent Systems  
We have also discussed OSN attacks on various OSN web applications by citing some statistics reports. In addition to this, we have discussed numerous defensive approaches to OSN security.  ...  The information shared in social network and media spreads very fast, almost instantaneously which makes it attractive for attackers to gain information.  ...  We have taken cognizance of popularity and narrowed down the list of networks to keep the scope of study feasible. By extension, the chosen social networks employ state-of-the-art defence strategies.  ... 
doi:10.1007/s40747-021-00409-7 fatcat:s4mc4ydaa5hdhpgghwqsjmyruq

A Survey on Interdependent Privacy

Mathias Humbert, Benjamin Trubert, Kévin Huguenin
2019 ACM Computing Surveys  
The privacy of individuals does not only depend on their own actions and data but may also be affected by the privacy decisions and by the data shared by other individuals.  ...  This interdependence is an essential aspect of privacy and ignoring it can lead to serious privacy violations.  ...  The authors also warmly thank Holly Cogliati for her great editing job on the manuscript. This work was partially funded by the Swiss National Science Foundation with Grant #200021_178978.  ... 
doi:10.1145/3360498 fatcat:xu2jtvhv7vhcrpo6agsrr2tf6u

User-Centric Privacy Preservation Solution to Control Third Party Access in Digital Databases

Muditha Tissera, Samantha Thelijjagoda, Jeevani Goonathilake
2017 Zenodo  
However intelligent algorithms dynamically derive user sensitive database attributes to hide, when controlling third party access.  ...  The author attempts to solve this human critical problem by proposing a fine-grain privacy preservation solution.  ...  by third party institutions.  ... 
doi:10.5281/zenodo.3951349 fatcat:wtkemiwecngbtewxjpkdxtkume
« Previous Showing results 1 — 15 out of 13,747 results