Friend-in-the-middle Attacks
نویسندگان
چکیده
In the ongoing arms race between spammers and the multimillion dollar anti-spam industry, the number of unsolicited e-mail messages (better known as “spam”) and phishing has increased heavily in the last decade. In this paper, we show that our novel friend-in-the-middle attack on social networking sites (SNSs) can be used to harvest social data in an automated fashion. This social data can then be exploited for large-scale attacks such as context-aware spam and social-phishing. We prove the feasibility of our attack exemplarily on Facebook and identify possible consequences based on a mathematical model and simulations. Alarmingly, all major SNSs are vulnerable to our attack as they fail to secure the network layer appropriately.
منابع مشابه
Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites
Within this paper we present our novel friend injection attack which exploits the fact that the great majority of social networking sites fail to protect the communication between its users and their services. In a practical evaluation, on the basis of public wireless access points, we furthermore demonstrate the feasibility of our attack. The friend injection attack enables a stealth infiltrat...
متن کاملPolitical Stability, Corruption, Democracy and Terrorism In the Middle East and North Africa
Terrorism has been considered as a challenge with serious effect in the world as a result of instability, corruption and lack of democracy in most countries. Confronting this phenomenon requires recognizing its roots to find possible solutions. This study aims to examine the effect of some actual factors which causes the terrorism in short and long run. To this end, investigation has been condu...
متن کاملNew Science and Technology in Line with Terrorist Groups in the Middle East
Abstract:Terrorism is a phenomenon that has spread to almost all parts of the world in the late 20th century and the beginning of the 21th century to the extent that many Middle East-ern countries have been subjected to such violence and unrest; in fact, with the advent of science and technology, particularly the global spread of the Internet and social net-works, the face of terrorism ha...
متن کاملNew Fixed Point Attacks on GOST2 Block Cipher
GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...
متن کاملMiddle Class Downward Mobility in the Socio-Physical Space in Tehran
Social mobility takes shape of a physical aspect which makes it possible to translate downward mobility in the physical space. Huge inflation and decrease of purchasing power during the recent years have led to downward mobility of middle class in Iran. Various facets of decrease in physical and social space have to be studied. For this purpose, 20 cases who had experienced such situation have ...
متن کامل