Design and analysis of enumeration attacks on finding friends with phone numbers: A case study with KakaoTalk

نویسندگان

  • Eunhyun Kim
  • Kyungwon Park
  • Hyoungshick Kim
  • Jaeseung Song
چکیده

Users' phone numbers are popularly used for finding friends in instant messaging (IM) services. In this paper, we present a new security concern about this search feature through a case study with KakaoTalk which is the most widely used IM in Korea. We demonstrate that there are multiple ways of collecting victims' personal information such as their (display) names, phone numbers and photos, which can be potentially misused for a variety of cyberecriminal activities. Our experimental results show that a user's personal data can be obtained automatically (0.26 s on average). The results also indicate that a large portion of KakaoTalk users (72.8%) have used real or real-like names in their profiles, which means that our discovered enumeration attacks seem to be practically dangerous. To mitigate these attacks, we present three countermeasures including a misuse detection system that can discover abnormal application activities within a certain time-window. © 2015 Elsevier Ltd. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

I've Got Your Number: - Harvesting Users' Personal Data via Contacts Sync for the KakaoTalk Messenger

Instant messaging (IM) is increasingly popular among not only Internet but also smartphone users. In this paper, we analyze the security issue of an IM application, KakaoTalk, which is the most widely used in South Korea, with a focus on automated friends registration based on contacts sync. We demonstrate that there are multiple ways of collecting victims’ personal information such as their na...

متن کامل

Relation between CBC Finding and BH attacks in children

ABSTRACT Breath holding (B.H) attacks is one of the most common problem in children that disturbs their parents. With respect to the presence of discrepancies between anemia and iron therapy in this condition, this study designed for evaluation the relation of C.B.C findings and B.H attacks. This analytical case-control study was done on 86 patients under 6 years old who referred to outpatien...

متن کامل

Communication Behaviour of Farmers with the Agricultural Extension Agents Using Cell Phone: A Case of Bangladesh

The cell phone is one of the potential Information Communication Technologies (ICTs) in agricultural development especially in developing countries like Bangladesh. Thus, this paper deals with the farmers’ communication with the agricultural extension agents using mobile phone. The study was conducted in Mymensingh District in Bangladesh. Data were collected from a sample of 110 farmers while b...

متن کامل

Enumeration of Dominant Solutions: An Application in Transport Network Design

A One-Dimensional Binary Integer Programming Problem (1DB-IPP) is concerned with selecting a subset from a set of k items in budget constraint to optimize an objective function. In this problem a dominant solution is defined as a feasible selection to which no further item could be added in budget constraint. This paper presents a simple algorithm for Enumeration of Dominant Solutions (EDS) and...

متن کامل

Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook

We introduce a new privacy issue on Facebook. We were motivated by the Facebook’s search option, which exposes a user profile with his or her phone number. Based on this search option, we developed a method to automatically collect Facebook users’ personal data (e.g., phone number, location and birthday) by enumerating the possibly almost entire phone number range for the target area. To show t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 52  شماره 

صفحات  -

تاریخ انتشار 2015