Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services
暂无分享,去创建一个
Ben Y. Zhao | Gang Wang | Haitao Zheng | Ana Nika | Bolun Wang | Tianyi Wang | Haitao Zheng | A. Nika | Tianyi Wang | Bolun Wang | Gang Wang
[1] Vitaly Shmatikov,et al. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations , 2014, 2014 IEEE Symposium on Security and Privacy.
[2] Alec Wolman,et al. Enabling new mobile applications with location proofs , 2009, HotMobile '09.
[3] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[4] Justin Manweiler,et al. SMILE: encounter-based trust for mobile social services , 2009, CCS.
[5] Christopher Krügel,et al. Framing Dependencies Introduced by Underground Commoditization , 2015, WEIS.
[6] Ben Y. Zhao,et al. Whispers in the dark: analysis of an anonymous social network , 2014, Internet Measurement Conference.
[7] Latifur Khan,et al. SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps , 2014, NDSS.
[8] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[9] Jack Brassil,et al. Traffic Signature-Based Mobile Device Location Authentication , 2014, IEEE Transactions on Mobile Computing.
[10] Marco Gruteser,et al. USENIX Association , 1992 .
[11] Tobias Jeske. Floating Car Data from Smartphones : What Google and Waze Know About You and How Hackers Can Control Traffic , 2013 .
[12] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[13] Krishna P. Gummadi,et al. Exploiting Social Interactions in Mobile Systems , 2007, UbiComp.
[14] Antonio Alfredo Ferreira Loureiro,et al. Is it possible to find social properties in vehicular networks? , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).
[15] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[16] Nikita Borisov,et al. Smartphone Fingerprinting Via Motion Sensors: Analyzing Feasiblity at Large-Scale and Studing Real Usage Patterns , 2016, ArXiv.
[17] Alec Wolman,et al. I am a sensor, and I approve this message , 2010, HotMobile '10.
[18] Iyad Rahwan,et al. Error and attack tolerance of collective problem solving: The DARPA Shredder Challenge , 2014, EPJ Data Science.
[19] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[20] César A. Hidalgo,et al. Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.
[21] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[22] Nikita Borisov,et al. Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses , 2016, NDSS.
[23] Guohong Cao,et al. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System , 2013, IEEE Transactions on Mobile Computing.
[24] Mark E. J. Newman,et al. Power-Law Distributions in Empirical Data , 2007, SIAM Rev..
[25] Matthew Smith,et al. Rethinking SSL development in an appified world , 2013, CCS.
[26] Ben Y. Zhao,et al. Uncovering social network sybils in the wild , 2011, IMC '11.
[27] Xue Liu,et al. Location Cheating: A Security Challenge to Location-Based Social Network Services , 2011, 2011 31st International Conference on Distributed Computing Systems.
[28] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.
[29] Claudio Soriente,et al. Smartphones as Practical and Secure Location Verification Tokens for Payments , 2014, NDSS.
[30] Bogdan Carbunar,et al. You unlocked the Mt. Everest badge on foursquare! Countering location fraud in Geosocial Networks , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).
[31] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[32] Gang Wang,et al. On the validity of geosocial mobility traces , 2013, HotNets.
[33] Roberto Tamassia,et al. Haze: privacy-preserving real-time traffic statistics , 2013, SIGSPATIAL/GIS.
[34] Eran Yahav,et al. Exploiting Social Navigation , 2014, ArXiv.
[35] Sebastien Ardon,et al. EMO: A statistical encounter-based mobility model for simulating delay tolerant networks , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[36] Damon McCoy,et al. Dialing Back Abuse on Phone Verified Accounts , 2014, CCS.
[37] Le Zhang,et al. SybilSCAR: Sybil detection in online social networks via local rule based propagation , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[38] Urs Hengartner,et al. Proving your location without giving up your privacy , 2010, HotMobile '10.
[39] Jinyuan Jia,et al. Random Walk Based Fake Account Detection in Online Social Networks , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[40] Stephan Huber,et al. Calculate Travel Time and Distance with Openstreetmap Data Using the Open Source Routing Machine (OSRM) , 2016 .
[41] Xin Liu,et al. Exploring social properties in vehicular ad hoc networks , 2012, Internetware.
[42] Chris Kanich,et al. Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context , 2010, USENIX Security Symposium.
[43] Thrasyvoulos Spyropoulos,et al. Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing , 2010, 2010 Proceedings IEEE INFOCOM.
[44] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[45] Satyajayant Misra,et al. SybilExposer: An effective scheme to detect Sybil communities in online social networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[46] Jan Magne Tjensvold. Comparison of the IEEE 802.11, 802.15.1, 802.15.4 and 802.15.6 wireless standards , 2007 .