Open Access System for Information Sharing

Login Library

 

Article
Cited 9 time in webofscience Cited 15 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorJonghyuk Song-
dc.contributor.authorSangho Lee-
dc.contributor.authorKim, J-
dc.date.accessioned2017-07-19T13:36:13Z-
dc.date.available2017-07-19T13:36:13Z-
dc.date.created2017-02-16-
dc.date.issued2016-05-
dc.identifier.issn1545-5971-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/37301-
dc.description.abstractTwitter is a popular online social network service for sharing short messages (tweets) among friends. Its users frequently use URL shortening services that provide (i) a short alias of a long URL for sharing it via tweets and (ii) public click analytics of shortened URLs. The public click analytics is provided in an aggregated form to preserve the privacy of individual users. In this paper, we propose practical attack techniques inferring who clicks which shortened URLs on Twitter using the combination of public information: Twitter metadata and public click analytics. Unlike the conventional browser history stealing attacks, our attacks only demand publicly available information provided by Twitter and URL shortening services. Evaluation results show that our attack can compromise Twitter users' privacy with high accuracy.-
dc.languageEnglish-
dc.publisherIEEE Computer Society-
dc.relation.isPartOfIEEE Transactions on Dependable and Secure Computing-
dc.titleInference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata-
dc.typeArticle-
dc.identifier.doi10.1109/TDSC.2014.2382577-
dc.type.rimsART-
dc.identifier.bibliographicCitationIEEE Transactions on Dependable and Secure Computing, v.13, no.3, pp.340 - 354-
dc.identifier.wosid000376088100003-
dc.date.tcdate2018-03-23-
dc.citation.endPage354-
dc.citation.number3-
dc.citation.startPage340-
dc.citation.titleIEEE Transactions on Dependable and Secure Computing-
dc.citation.volume13-
dc.contributor.affiliatedAuthorKim, J-
dc.identifier.scopusid2-s2.0-84970021955-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.scptc0*
dc.date.scptcdate2018-05-121*
dc.description.isOpenAccessN-
dc.type.docTypeArticle-
dc.subject.keywordAuthorURL shortening service-
dc.subject.keywordAuthorTwitter-
dc.subject.keywordAuthorprivacy leak-
dc.subject.keywordAuthorinference-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

김종KIM, JONG
Dept of Computer Science & Enginrg
Read more

Views & Downloads

Browse