Design and analysis of enumeration attacks on finding friends with phone numbers: A case study with KakaoTalk
نویسندگان
چکیده
Users' phone numbers are popularly used for finding friends in instant messaging (IM) services. In this paper, we present a new security concern about this search feature through a case study with KakaoTalk which is the most widely used IM in Korea. We demonstrate that there are multiple ways of collecting victims' personal information such as their (display) names, phone numbers and photos, which can be potentially misused for a variety of cyberecriminal activities. Our experimental results show that a user's personal data can be obtained automatically (0.26 s on average). The results also indicate that a large portion of KakaoTalk users (72.8%) have used real or real-like names in their profiles, which means that our discovered enumeration attacks seem to be practically dangerous. To mitigate these attacks, we present three countermeasures including a misuse detection system that can discover abnormal application activities within a certain time-window. © 2015 Elsevier Ltd. All rights reserved.
منابع مشابه
I've Got Your Number: - Harvesting Users' Personal Data via Contacts Sync for the KakaoTalk Messenger
Instant messaging (IM) is increasingly popular among not only Internet but also smartphone users. In this paper, we analyze the security issue of an IM application, KakaoTalk, which is the most widely used in South Korea, with a focus on automated friends registration based on contacts sync. We demonstrate that there are multiple ways of collecting victims’ personal information such as their na...
متن کاملRelation between CBC Finding and BH attacks in children
ABSTRACT Breath holding (B.H) attacks is one of the most common problem in children that disturbs their parents. With respect to the presence of discrepancies between anemia and iron therapy in this condition, this study designed for evaluation the relation of C.B.C findings and B.H attacks. This analytical case-control study was done on 86 patients under 6 years old who referred to outpatien...
متن کاملCommunication Behaviour of Farmers with the Agricultural Extension Agents Using Cell Phone: A Case of Bangladesh
The cell phone is one of the potential Information Communication Technologies (ICTs) in agricultural development especially in developing countries like Bangladesh. Thus, this paper deals with the farmers’ communication with the agricultural extension agents using mobile phone. The study was conducted in Mymensingh District in Bangladesh. Data were collected from a sample of 110 farmers while b...
متن کاملEnumeration of Dominant Solutions: An Application in Transport Network Design
A One-Dimensional Binary Integer Programming Problem (1DB-IPP) is concerned with selecting a subset from a set of k items in budget constraint to optimize an objective function. In this problem a dominant solution is defined as a feasible selection to which no further item could be added in budget constraint. This paper presents a simple algorithm for Enumeration of Dominant Solutions (EDS) and...
متن کاملHello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook
We introduce a new privacy issue on Facebook. We were motivated by the Facebook’s search option, which exposes a user profile with his or her phone number. Based on this search option, we developed a method to automatically collect Facebook users’ personal data (e.g., phone number, location and birthday) by enumerating the possibly almost entire phone number range for the target area. To show t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 52 شماره
صفحات -
تاریخ انتشار 2015