2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2020
DOI: 10.1109/eurospw51379.2020.00068
|View full text |Cite
|
Sign up to set email alerts
|

My Boss is Really Cool: Malware-Induced Misperception in Workplace Communication Through Covert Linguistic Manipulation of Emails

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…In Section 7 we expand on the future adaptation for generating abstractive summaries, by using sentences that are different than the original sentences. This adaptation is possible given that approaches for automated word manipulation in various forms of online text such as email [47], Twitter posts [25], Wikipedia articles [46], or text converted to speech by an voice assistant [48] exist.…”
Section: Automatic Text Summarizationmentioning
confidence: 99%
See 3 more Smart Citations
“…In Section 7 we expand on the future adaptation for generating abstractive summaries, by using sentences that are different than the original sentences. This adaptation is possible given that approaches for automated word manipulation in various forms of online text such as email [47], Twitter posts [25], Wikipedia articles [46], or text converted to speech by an voice assistant [48] exist.…”
Section: Automatic Text Summarizationmentioning
confidence: 99%
“…The intention to publish automated language models despite the adversarial output, after all, is to increase defenders' understanding of the threat from text generation, and contribute to building tools that could guard against the harms [27,41,65]. The Kerckhoffs' doctrine that "security through obscurity doesn't work" is thus thrown into the mix as an argumentation for publishing fake text generators because an adversary would figure out the language model themselves, if they haven't already, and proceed with exploitation (akin to zero-day vulnerabilities) [47]. Adversaries, in the traditional security sense, pose extensive knowledge of targeted systems that help them work through the obscurity or find a zeroday vulnerability.…”
Section: An Adversarial Disclosure Test 61 Ethical Argumentationmentioning
confidence: 99%
See 2 more Smart Citations