Exploiting Innocuous Activity for Correlating Users Across Sites

Download Now
Provided by: Association for Computing Machinery
Topic: Security
Format: PDF
The authors study how potential attackers can identify accounts on different social network sites that all belong to the same user, exploiting only innocuous activity that inherently comes with posted content. They examine three specific features on Yelp, Flickr, and Twitter: the geo-location attached to a user's posts, the timestamp of posts, and the user's writing style as captured by language models. They show that among these three features the location of posts is the most powerful feature to identify accounts that belong to the same user in different sites.
Download Now

Find By Topic