Friend-in-the-middle Attacks

نویسندگان

  • Markus Huber
  • Martin Mulazzani
  • Edgar Weippl
  • Gerhard Kitzler
  • Sigrun Goluch
چکیده

In the ongoing arms race between spammers and the multimillion dollar anti-spam industry, the number of unsolicited e-mail messages (better known as “spam”) and phishing has increased heavily in the last decade. In this paper, we show that our novel friend-in-the-middle attack on social networking sites (SNSs) can be used to harvest social data in an automated fashion. This social data can then be exploited for large-scale attacks such as context-aware spam and social-phishing. We prove the feasibility of our attack exemplarily on Facebook and identify possible consequences based on a mathematical model and simulations. Alarmingly, all major SNSs are vulnerable to our attack as they fail to secure the network layer appropriately.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites

Within this paper we present our novel friend injection attack which exploits the fact that the great majority of social networking sites fail to protect the communication between its users and their services. In a practical evaluation, on the basis of public wireless access points, we furthermore demonstrate the feasibility of our attack. The friend injection attack enables a stealth infiltrat...

متن کامل

Political Stability, Corruption, Democracy and Terrorism In the Middle East and North Africa

Terrorism has been considered as a challenge with serious effect in the world as a result of instability, corruption and lack of democracy in most countries. Confronting this phenomenon requires recognizing its roots to find possible solutions. This study aims to examine the effect of some actual factors which causes the terrorism in short and long run. To this end, investigation has been condu...

متن کامل

New Science and Technology in Line with Terrorist Groups in the Middle East

Abstract:Terrorism is a phenomenon that has spread to almost all parts of the world in the late 20th century and the beginning of the 21th century to the extent that many Middle East-ern countries have been subjected to such violence and unrest; in fact, with the advent of science and technology, particularly the global spread of the Internet and social net-works, the face of terrorism ha...

متن کامل

New Fixed Point Attacks on GOST2 Block Cipher

GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...

متن کامل

Middle Class Downward Mobility in the Socio-Physical Space in Tehran

Social mobility takes shape of a physical aspect which makes it possible to translate downward mobility in the physical space. Huge inflation and decrease of purchasing power during the recent years have led to downward mobility of middle class in Iran. Various facets of decrease in physical and social space have to be studied. For this purpose, 20 cases who had experienced such situation have ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010