A summary of two practical attacks against social networks

Bilge, Leyla; Balduzzi, Marco; Balzarotti, Davide; Kirda, Engin
ITWDC 2011, 21st International Tyrrhenian Workshop on Digital Communications: Trustworthy Internet, September 6-8, 2010, Island of Ponza, Italy / Also published as chapter book 13 of "Trustworthy internet", Springer, ISBN: 978-8847018174

Social networking sites have been increasingly gaining popularity, and they have already changed the communication habits of hundred of millions of users. Unfortunately, this new technology can easily be misused to collect private information and violate the users’ privacy. In this chapter, we summarize two practical attacks we have presented in the past: an impersonation attack in which we automatically clone a user profile, and an attack that abuses the information provided by social networks to automatically correlate information extracted from different social networks. Our results show that these attacks are very successful in practice and that they can significantly impact the users’ privacy. Therefore, these attacks represent a first important step to raise awareness among users about the privacy and security risks involved in sharing information in one or more social networks.


DOI
Type:
Conférence
City:
Island of Ponza
Date:
2010-09-06
Department:
Sécurité numérique
Eurecom Ref:
3348
Copyright:
© Springer. Personal use of this material is permitted. The definitive version of this paper was published in ITWDC 2011, 21st International Tyrrhenian Workshop on Digital Communications: Trustworthy Internet, September 6-8, 2010, Island of Ponza, Italy / Also published as chapter book 13 of "Trustworthy internet", Springer, ISBN: 978-8847018174 and is available at : http://dx.doi.org/10.1007/978-88-470-1818-1_13

PERMALINK : https://www.eurecom.fr/publication/3348