Proceedings of the Seventh Symposium on Usable Privacy and Security 2011
DOI: 10.1145/2078827.2078839
|View full text |Cite
|
Sign up to set email alerts
|

Reciprocity attacks

Abstract: In mobile and pervasive computing environments, users may easily exchange information via ubiquitously available computers ranging from sensors, embedded processors, wearable and handheld devices, to servers. The unprecedented level of interaction between users and intelligent environments poses unparalleled privacy challenges. We identify a new attack that can be used to acquire users' private information-using reciprocity norms. By mutually exchanging information with users, an attacker may use a psychologic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…Because reciprocity largely depends on user interactions with the system, it naturally focuses on usability, and has different tradeoff with security for different context models. Therefore, any reciprocity schemes must be designed, implemented, and validated judiciously to defend against reciprocity attacks [70].…”
Section: Trustworthiness Requirementsmentioning
confidence: 99%
“…Because reciprocity largely depends on user interactions with the system, it naturally focuses on usability, and has different tradeoff with security for different context models. Therefore, any reciprocity schemes must be designed, implemented, and validated judiciously to defend against reciprocity attacks [70].…”
Section: Trustworthiness Requirementsmentioning
confidence: 99%
“…Zhu et al [11] study how an attacker manages to influence the human to take the wrong decision and acquire his private information. They simulate a scenario where an attacker plays successfully the norm of reciprocity (mutual messages exchange with the user) with the victims who are shopping online with mobile devices.…”
Section: Related Workmentioning
confidence: 99%