Stealing Reality
نویسندگان
چکیده
In this paper we discuss the threat of malware targeted at extracting information about the relationships in a real-world social network as well as characteristic information about the individuals in the network, which we dub Stealing Reality. We present Stealing Reality (SR), explain why it differs from traditional types of network attacks, and discuss why its impact is significantly more dangerous than that of other attacks. We also present our initial analysis and results regarding the form that an SR attack might take, with the goal of promoting the discussion of defending against such an attack, or even just detecting the fact that one has already occurred.
منابع مشابه
Stealing Reality: When Criminals Become Data Scientists
Yaniv Altshuler,1, 2 Nadav Aharony,1 Yuval Elovici,2, 3 Alex Pentland,1 and Manuel Cebrian1, 4 The Media Laboratory, Massachusetts Institute of Technology, Cambridge, MA 02139, USA Deutsche Telekom Laboratories, Ben Gurion University, Beer Sheva 84105, Israel Department of Information Systems Engineering, Ben Gurion University, Beer Sheva 84105, Israel Department of Computer Science and Enginee...
متن کاملNondelinquent youths' stealing behavior and their perceptions of parents, school, and peers.
Correlates of stealing behavior were investigated in a sample of 167 nondelinquent 10- to 15-year-olds. Stealing was related to youths' attitudes toward parents and school, as well as reasons for stealing. Stealing was most frequent among older males. Attitude toward school was most consistently related to stealing behavior, though perceptions of family's values and the consequences of stealing...
متن کاملEquipment for Anti - Electricity Stealing with Remote Monitoring
The power theft monitoring is an important research in electric power system, and electricity-stealing prevention became a big problem to the electricity board. based on the kind of electricity-stealing and actual demand of prevention of stealing electricity, the equipment of electricity-stealing with remote monitoring is designed, with PIC microcontroller as the control core. In this the stand...
متن کاملEfficient Work Stealing for Portability of Nested Parallelism and Composability of Multithreaded Program
We present performance evaluations of parallel-for loop with work stealing technique. The parallel-for by work stealing transforms the parallel-loop into a form of binary tree by making use of method of divide-and-conquer. Iterations are distributed in the leaves procedures of the binary tree, and the parallel executions are performed by stealing subtrees from the bottom of the tree. The work s...
متن کاملFaster Work Stealing With Return Barriers
Work-stealing is a promising approach for effectively exploiting software parallelism on parallel hardware. A programmer who uses work-stealing explicitly identifies potential parallelism and the runtime then schedules work, keeping otherwise idle hardware busy while relieving overloaded hardware of its burden. However, work-stealing comes with substantial overheads. Our prior work demonstrates...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1010.1028 شماره
صفحات -
تاریخ انتشار 2010