Infiltrating social network accounts: Attacks and defenses Book Chapter

Potharaju, R, Carbunar, B, Azimpourkivi, M et al. (2015). Infiltrating social network accounts: Attacks and defenses . 457-485. 10.1007/978-3-319-14971-4_15

cited authors

  • Potharaju, R; Carbunar, B; Azimpourkivi, M; Vasudevan, V; Iyengar, SS

abstract

  • Social networks collect and make public an unprecedented amount of user location information. This raises significant user privacy concerns. In this chapter, we describe social networking infiltration attacks, where adversaries befriend random victims of their choice and acquire access to their private information. To address this problem, we propose verification mechanisms that use location information certified by geosocial networks to quantify the context shared by a user and an inviter. We develop novel visual notifications that leverage the outcome of the proposed verifications to inform users about the context they share with inviters. The impact of location information makes it however vulnerable to attacks: users can rely on existing tools to report fraudulent locations. We describe venue centric location verification solutions that are resilient to powerful adversaries.

publication date

  • September 17, 2015

Digital Object Identifier (DOI)

start page

  • 457

end page

  • 485