"A Practical Attack to De-Anonymize Social Network Users"

In the last couple of months, we have worked on a technique to de-anonymize users based on the way they interact with social networks. The idea behind our attack is the fact that the group memberships of a user (i.e., the groups of a social network to which a user belongs) is often sufficient to uniquely identify this user. This means that there are only a few (or in the best case only one) users of a social network that are a member of exactly the same groups.

The attack scenario is the following: a malicious website wants to de-anonymize a user, i.e., find out the real name and identity of a visitor. The attack is implemented in two phases. In a first phase, we crawl the groups of a social network to determine the members of the different groups. This is our database from which we can generate a group fingerprint per user. In the second phase, we use the well-known technique of history stealing to probe the browser's history for links to group, thus determining the group fingerprint of the visitor. Wen can then compare this fingerprint to our database and de-anonymize the visitor. Even when unique identification is not possible, then the attack might still significantly reduce the size of the set of candidates that the victim belongs to.

As a proof-of-concept, we implemented the attack for XING, a well-known "Social Network for Business Professionals". Please note that this attack is not specific to XING or any other social network - it is generally applicable to different kinds of modern web applications that contain unique links for user that can be probed via history stealing. We crawled the ~7000 public groups of XING and found about 1.8 million members that belong to at least one group. These users are vulnerable to our attack and we have a demo website to participate in our experiment. Note that this test is only successful if you are a member of XING and a member of at least one group. If you regularly participate in groups the chances are higher that we can successfully de-anonymize you :-)

The following pictures show the different stages of the proof-of-concept attack:



We have published a technical report that summarizes our preliminary results at http://www.iseclab.org/papers/sonda-TR.pdf. In the next couple of weeks, we will finish the work on the paper and present our results at the 31st IEEE Symposium on Security & Privacy in May. A demo of the attack is available at http://www.iseclab.org/people/gilbert/experiment/.

Trackbacks

  1. Sex animals.

    Very interesting work, thanks a lot!

  2. Oxycodone side effects.

    Cool blog!

Comments

Display comments as (Linear | Threaded)

  1. kasimir says:

    Great work, very interesting. Did you talk about such stuff in lectures, when you've been in mannheim?

  2. Thorsten says:

    Thanks :)

    When I was in Mannheim, I did not work on such things. This is now part of my work as a postdoc here in Vienna.

  3. kasimir says:

    I visited it-security and the hacker seminar, which were great lectures, but this topic would have been great too.

  4. seo chicago says:

    How effective does de-anomyzing social network users work in preventing attacks? My network is constantly getting attacked and my boss is willing to try anything to secure our network.

  5. Denver Homes says:

    I was thinking the same thing. My network was attacked recently and it cost me thousands in business lost. Looking for an update on the effectiveness of this technique soon!

  6. emergency seed bank says:

    Social networks are always under attacks from hackers. Even my emergency seed bank fan page has been spammed. What are social networks doing to tighten up their security?

  7. maeng da kratom says:

    How common is it for social networks to be attacked by spam bots? I have started a forum for kratom users, and I worry that my forum can be hacked and all the user information can be compromised.


Add Comment


E-Mail addresses will not be displayed and will only be used for E-Mail notifications

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA 1CAPTCHA 2CAPTCHA 3CAPTCHA 4CAPTCHA 5