2012
DOI: 10.1007/978-3-642-32946-3_1
|View full text |Cite
|
Sign up to set email alerts
|

Social Authentication: Harder Than It Looks

Abstract: Abstract. A number of web service firms have started to authenticate users via their social knowledge, such as whether they can identify friends from photos. We investigate attacks on such schemes. First, attackers often know a lot about their targets; most people seek to keep sensitive information private from others in their social circle. Against close enemies, social authentication is much less effective. We formally quantify the potential risk of these threats. Second, when photos are used, there is a gro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(19 citation statements)
references
References 15 publications
0
19
0
Order By: Relevance
“…The first to analyze SA and discuss potential vulnerabilities were Kim et al [16], who presented a formal quantification of the risks that threaten SA. A key observation is that tightly connected communities exhibit higher risks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The first to analyze SA and discuss potential vulnerabilities were Kim et al [16], who presented a formal quantification of the risks that threaten SA. A key observation is that tightly connected communities exhibit higher risks.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers, however, have analyzed [16] its weaknesses, and demonstrated [20] that the existing system is vulnerable to attacks that employ face recognition software. We further demonstrate that SA is vulnerable to an attack that previous work has overlooked; the adversary first builds a collection of the photos uploaded by the victim and his online friends.…”
Section: Introductionmentioning
confidence: 99%
“…This mechanism controlled the third party application from preventing the private information of the user profile. Other related work has analyzed both privacy risks associated with information disclosure in social networks, and developed initial mechanisms to protect against some involuntary information disclosure and proposed a framework for deriving a "privacy score" to inform the user of the potential risks to their privacy created by their activities and activities with other users within the social network [7].However the previous research areas concentrated on friends grouping policy to enable different privacy setting to provide, which data should be accessed by which group of users and similarly work carried out to prevent the third party application from accessing the user data from the profile. A new framework was developed to give more security to the data available on user profile.…”
Section: Related Workmentioning
confidence: 99%
“…First, the Syrian case illustrates that the use of authentication techniques that depend upon "who you know," also called social authentication, must be evaluated in terms of possible risks to dissidents (Kim, Tang, and Anderson 2012). For example, Facebook considered a protocol that required that you indicate the faces that you recognize to recover a lost password.…”
Section: Syriamentioning
confidence: 99%