2010
DOI: 10.1007/978-3-642-15512-3_22
|View full text |Cite
|
Sign up to set email alerts
|

Abusing Social Networks for Automated User Profiling

Abstract: Abstract.Recently, social networks such as Facebook have experienced a huge surge in popularity. The amount of personal information stored on these sites calls for appropriate security precautions to protect this data.In this paper, we describe how we are able to take advantage of a common weakness, namely the fact that an attacker can query popular social networks for registered e-mail addresses on a large scale. Starting with a list of about 10.4 million email addresses, we were able to automatically identif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
68
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 106 publications
(74 citation statements)
references
References 29 publications
2
68
0
Order By: Relevance
“…There are two major research directions on the privacy and security issues in OSNs: (1) to reveal the privacy threats in OSNs by conducting surveys [16,17] and proposing attack models [26], information inference algorithms [6,8,9,13,14,19,28], de-anonymization algorithms [4,21], and re-identification algorithms [27]; and (2) to reinforce users' privacy by redesigning the OSN system structure [5,10,20,23] and conducting anonymization [22,25]. This paper investigates the privacy setting breaches, which belongs to (1).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…There are two major research directions on the privacy and security issues in OSNs: (1) to reveal the privacy threats in OSNs by conducting surveys [16,17] and proposing attack models [26], information inference algorithms [6,8,9,13,14,19,28], de-anonymization algorithms [4,21], and re-identification algorithms [27]; and (2) to reinforce users' privacy by redesigning the OSN system structure [5,10,20,23] and conducting anonymization [22,25]. This paper investigates the privacy setting breaches, which belongs to (1).…”
Section: Related Workmentioning
confidence: 99%
“…Regarding information inference, there are profile mining [6,8,19,29] and link mining [13-15, 24, 28] approaches, both of which this paper explores. Zheleva et al [29] presented several classification models using links and group memberships to infer the target users' profiles.…”
Section: Related Workmentioning
confidence: 99%
“…These risks are illustrated by Balduzzi et al (2010) and Jagatic et al (2007). If the e-mail addresses of users were made public, then spammers could crawl the OSNs and collect e-mail addresses and who they belong to from user profiles.…”
Section: Privacy Attacks Associated With Personal Details Disclosurementioning
confidence: 99%
“…2 It is necessary to highlight possible risks associated with such self-disclosure tools. 6 It is envisioned that increased privacy awareness may encourage users to secure their data. 6 We evaluated users' awareness of their privacy on Facebook.…”
Section: Introductionmentioning
confidence: 99%
“…6 It is envisioned that increased privacy awareness may encourage users to secure their data. 6 We evaluated users' awareness of their privacy on Facebook. Our aim was to highlight social media privacy risks by using Facebook as a case study.…”
Section: Introductionmentioning
confidence: 99%