Stealing Reality

نویسندگان

  • Yaniv Altshuler
  • Nadav Aharony
  • Yuval Elovici
  • Alex Pentland
  • Manuel Cebrián
چکیده

In this paper we discuss the threat of malware targeted at extracting information about the relationships in a real-world social network as well as characteristic information about the individuals in the network, which we dub Stealing Reality. We present Stealing Reality (SR), explain why it differs from traditional types of network attacks, and discuss why its impact is significantly more dangerous than that of other attacks. We also present our initial analysis and results regarding the form that an SR attack might take, with the goal of promoting the discussion of defending against such an attack, or even just detecting the fact that one has already occurred.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stealing Reality: When Criminals Become Data Scientists

Yaniv Altshuler,1, 2 Nadav Aharony,1 Yuval Elovici,2, 3 Alex Pentland,1 and Manuel Cebrian1, 4 The Media Laboratory, Massachusetts Institute of Technology, Cambridge, MA 02139, USA Deutsche Telekom Laboratories, Ben Gurion University, Beer Sheva 84105, Israel Department of Information Systems Engineering, Ben Gurion University, Beer Sheva 84105, Israel Department of Computer Science and Enginee...

متن کامل

Nondelinquent youths' stealing behavior and their perceptions of parents, school, and peers.

Correlates of stealing behavior were investigated in a sample of 167 nondelinquent 10- to 15-year-olds. Stealing was related to youths' attitudes toward parents and school, as well as reasons for stealing. Stealing was most frequent among older males. Attitude toward school was most consistently related to stealing behavior, though perceptions of family's values and the consequences of stealing...

متن کامل

Equipment for Anti - Electricity Stealing with Remote Monitoring

The power theft monitoring is an important research in electric power system, and electricity-stealing prevention became a big problem to the electricity board. based on the kind of electricity-stealing and actual demand of prevention of stealing electricity, the equipment of electricity-stealing with remote monitoring is designed, with PIC microcontroller as the control core. In this the stand...

متن کامل

Efficient Work Stealing for Portability of Nested Parallelism and Composability of Multithreaded Program

We present performance evaluations of parallel-for loop with work stealing technique. The parallel-for by work stealing transforms the parallel-loop into a form of binary tree by making use of method of divide-and-conquer. Iterations are distributed in the leaves procedures of the binary tree, and the parallel executions are performed by stealing subtrees from the bottom of the tree. The work s...

متن کامل

Faster Work Stealing With Return Barriers

Work-stealing is a promising approach for effectively exploiting software parallelism on parallel hardware. A programmer who uses work-stealing explicitly identifies potential parallelism and the runtime then schedules work, keeping otherwise idle hardware busy while relieving overloaded hardware of its burden. However, work-stealing comes with substantial overheads. Our prior work demonstrates...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1010.1028  شماره 

صفحات  -

تاریخ انتشار 2010