Popular social and e-commerce sites increasingly rely on crowd computing to rate and rank content, users, products and businesses. Today, attackers who create fake (Sybil) identities can easily tamper with these computations. Exist-ing defenses that largely focus on detecting individual Sybil identities have a fundamental limitation: Adaptive attack-ers can create hard-to-detect Sybil identities to tamper ar-bitrary crowd computations. In this paper, we propose Stamper, an approach for detect-ing tampered crowd computations that significantly raises the bar for evasion by adaptive attackers. Stamper design is based on two key insights: First, Sybil attack detection gains strength in numbers: we propose statistical analysis techniques that c...
Fake identities and Sybil accounts are pervasive in to-day’s online communities. They are responsibl...
Sybil accounts are fake identities created to unfairly increase the power or resources of a single m...
Crowdsourcing sites such as Mechanical Turk and Crowdflower provide a marketplace where requesters c...
Popular social and e-commerce sites increasingly rely on crowd computing to rate and rank content, u...
As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to ...
As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to ...
Phishing is an ongoing kind of semantic attack that tricks victims into inadvertently sharing sensit...
Crowd-powered systems have become a popular way to augment the capabilities of automated systems in ...
Sybil accounts are fake identities created to unfairly increase the power or resources of a single m...
A good phishing site should resemble the target site as much as possible, and it should hide the dif...
Recent work in security and systems has embraced the use of machine learning (ML) techniques for ide...
Today, users sign on to most online social networking sites like Facebook, Twitter, and Google+ via ...
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provide...
Fake identities and Sybil accounts are pervasive in to-day’s online communities. They are responsibl...
Internet users today are connected more widely and ubiquitously than ever before. As a result, vario...
Fake identities and Sybil accounts are pervasive in to-day’s online communities. They are responsibl...
Sybil accounts are fake identities created to unfairly increase the power or resources of a single m...
Crowdsourcing sites such as Mechanical Turk and Crowdflower provide a marketplace where requesters c...
Popular social and e-commerce sites increasingly rely on crowd computing to rate and rank content, u...
As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to ...
As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to ...
Phishing is an ongoing kind of semantic attack that tricks victims into inadvertently sharing sensit...
Crowd-powered systems have become a popular way to augment the capabilities of automated systems in ...
Sybil accounts are fake identities created to unfairly increase the power or resources of a single m...
A good phishing site should resemble the target site as much as possible, and it should hide the dif...
Recent work in security and systems has embraced the use of machine learning (ML) techniques for ide...
Today, users sign on to most online social networking sites like Facebook, Twitter, and Google+ via ...
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provide...
Fake identities and Sybil accounts are pervasive in to-day’s online communities. They are responsibl...
Internet users today are connected more widely and ubiquitously than ever before. As a result, vario...
Fake identities and Sybil accounts are pervasive in to-day’s online communities. They are responsibl...
Sybil accounts are fake identities created to unfairly increase the power or resources of a single m...
Crowdsourcing sites such as Mechanical Turk and Crowdflower provide a marketplace where requesters c...