Proceedings of the 15th ACM International Conference on Computing Frontiers 2018
DOI: 10.1145/3203217.3203269
|View full text |Cite
|
Sign up to set email alerts
|

Gathering and analyzing identity leaks for a proactive warning of affected users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Nevertheless, it is natural to realize that, the computational time complexity can be very high for this detection method and also for the distributed environments, this method is prune to errors. The next method is one of the extensions, proposed by T. Malderle et al [8]. This work elaborates the mechanisms for collecting evidences of the data leakage and further validates the evidences against the prevention principles.…”
Section: Parallel Research Outcomes: Surveymentioning
confidence: 95%
“…Nevertheless, it is natural to realize that, the computational time complexity can be very high for this detection method and also for the distributed environments, this method is prune to errors. The next method is one of the extensions, proposed by T. Malderle et al [8]. This work elaborates the mechanisms for collecting evidences of the data leakage and further validates the evidences against the prevention principles.…”
Section: Parallel Research Outcomes: Surveymentioning
confidence: 95%
“…Topic #13 describes selling leaked user data from security breaches, in the form of combo lists, i.e. combinations of usernames/emails and passwords [28], which can be used for compromising accounts with the same credentials in other services, by means of credential stuffing attacks, as seen in Topic #5. Topic #14 involves mostly guides and e-books regarding carding and other methods of financial fraud.…”
Section: Topic Modellingmentioning
confidence: 99%
“…It is also possible that the controller responsible for a breach is no longer available, because the company went bankrupt or the service was terminated. For instance, unintentionally or unlawfully disclosed sensitive personal data originating from phishing attacks are freely available on the internet [18]. In these cases there is no controller to become aware of a breach.…”
Section: Data Breachesmentioning
confidence: 99%