Design and Evaluation of Enumeration Attacks on Package Tracking Systems
暂无分享,去创建一个
Hyoungshick Kim | Simon S. Woo | Woojoong Ji | Hanbin Jang | Hyoungshick Kim | Woojoong Ji | Hanbin Jang
[1] Hyoungshick Kim,et al. Design and analysis of enumeration attacks on finding friends with phone numbers: A case study with KakaoTalk , 2015, Comput. Secur..
[2] Christopher Krügel,et al. Abusing Social Networks for Automated User Profiling , 2010, RAID.
[3] Ponnurangam Kumaraguru,et al. Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks , 2016, SPSM@CCS.
[4] Hyoungshick Kim,et al. Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook , 2017, ISPEC.
[5] James T. Curran,et al. Fortuna: Cryptographically Secure Pseudo-Random Number Generation In Software And Hardware , 2006 .
[6] Jason Hong,et al. The state of phishing attacks , 2012, Commun. ACM.
[7] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[8] Edgar R. Weippl,et al. Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications , 2012, NDSS.
[9] Paul C. van Oorschot,et al. Revisiting Defenses against Large-Scale Online Password Guessing Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[10] Hyoungshick Kim,et al. I’ve Got Your Packages: Harvesting Customers’ Delivery Order Information using Package Tracking Number Enumeration Attacks , 2020, WWW.