Stealing Reality

In this paper we discuss the threat of malware targeted at ext racting information about the relationships in a real-world social network as well as characteristic inform ation about the individuals in the network, which we dubStealing Reality . We present Stealing Reality (SR), explain why it differs fr om traditional types of network attacks, and discuss why its impact is significantly more dan gerous than that of other attacks. We also present our initial analysis and results regarding the form that an S R attack might take, with the goal of promoting the discussion of defending against such an attack, or even just detecting the fact that one has already occurred.

[1]  David Davies,et al.  Security focus , 1987, Comput. Law Secur. Rev..

[2]  R. Rosenfeld Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.

[3]  Lars-Ake Levin,et al.  Problems of Information Transmission , 1973 .

[4]  児玉 文雄 Harvard Business Review : 抄録雑誌の概要 , 1987 .

[5]  Michael Harpham December , 1855, The Hospital.