NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media

NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media Abstract Nowadays, a big part of people rely on available content in social media in their decisions (e.g., reviews and feedback on a topic or product). The possibility that anybody can leave a review provides a golden opportunity for spammers to write spam [...]

MasterPrint: Exploring the Vulnerability of Partial Fingerprint-based Authentication Systems

MasterPrint: Exploring the Vulnerability of Partial Fingerprint-based Authentication Systems Abstract This paper investigates the security of partial fingerprint-based authentication systems, especially when multiple fingerprints of a user are enrolled. A number of consumer electronic devices, such as smartphones, are beginning to incorporate fingerprint sensors for user authentication. The sensors embedded in these devices are [...]

Guessing Attacks on User-Generated Gesture Passwords

Guessing Attacks on User-Generated Gesture Passwords Abstract Touchscreens, the dominant input type for mobile phones, require unique authentication solutions. Gesture passwords have been proposed as an alternative ubiquitous authentication technique. Prior security analysis has relied on inconsistent measurements such as mutual information or shoulder surfing attacks.We present the first approach for measuring the security of [...]

DAPASA: Detecting Android Piggybacked Apps through Sensitive Subgraph Analysis

DAPASA: Detecting Android Piggybacked Apps through Sensitive Subgraph AnalysisAbstractWith the exponential growth of smartphone adoption, malware attacks on smartphones have resulted in serious threats to users, especially those on popular platforms, such as Android. Most Android malware is generated by piggybacking malicious payloads into benign applications (apps), which are called piggybacked apps. In this paper, [...]

Real Time Detection of Phishing Websites

Real time detection of phishing websites Abstract Web Spoofing lures the user to interact with the fake websites rather than the real ones. The main objective of this attack is to steal the sensitive information from the users. The attacker creates a `shadow' website that looks similar to the legitimate website. This fraudulent act allows [...]

Fast Detection of Transformed Data Leaks

Fast Detection of Transformed Data Leaks Abstract The leak of sensitive data on computer systems poses a serious threat to organizational security. Statistics show that the lack of proper encryption on files and communications due to human errors is one of the leading causes of data loss. Organizations need tools to identify the exposure of [...]

Personal Information in Passwords and Its Security Implications

Personal Information in Passwords and Its Security Implications Abstract While it is not recommended, Internet users tend to include personal information in their passwords for easy memorization. However, the use of personal information in passwords and its security implications have yet to be studied. In this paper, we dissect user passwords from several leaked data [...]

Steganography with Multiple JPEG Images of the Same Scene

Steganography with Multiple JPEG Images of the Same Scene Abstract It is widely recognized that incorporating side-information at the sender can significantly improve steganographic security in practice. Currently, most side-informed schemes utilize a high-quality “precover” image that is subsequently processed and then jointly quantized and embedded with a secret. In this paper, we investigate [...]

Counterfeit Detection Based on Unclonable Feature of Paper Using Mobile Camera

Counterfeit Detection Based on Unclonable Feature of Paper Using Mobile Camera Abstract This paper studies the authentication problem of specific pieces of paper using mobile imaging devices. Prior work showing high matching accuracy has used the normal vector field, which serves as a unique, microscopic, physically unclonable feature of paper surfaces, estimated by consumer grade [...]

A Practical Privacy-Preserving Recommender System

A Practical Privacy-Preserving Recommender System Abstract The main goal of a personalized recommender system is to provide useful recommendations on various items to the users. In order to generate recommendations, the service needs to access various types of user data such as previous product purchasing history, demographic and biographical information. However, users are sensitive to [...]