skip to main content
10.1145/1397735.1397748acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Photo-based authentication using social networks

Published: 18 August 2008 Publication History

Abstract

We present Lineup, a system that uses the social network graph in Facebook and auxiliary information (e.g., "tagged" user photos) to build a photo-based Web site authentication framework. Lineup's underlying mechanism leverages the concept of CAPTCHAs, programs that are designed to distinguish bots from human users. Lineup extends this functionality to help a Web site ascertain a user's identity or membership in a certain group (e.g., an interest group, invitees to a certain event) in order to infer some level of trust. Lineup works by presenting a user with photographs and asking the user to identify subjects in the photo whom a user with the appropriate identity or group membership should know. We present the design and implementation for Lineup, describe a preliminary prototype implementation, and discuss Lineup's security properties, including possible guarantees and threats.

References

[1]
L. V. Ahn. Human computation. PhD thesis, Carnegie Mellon University, 2005.
[2]
A. Barabasi. Scale-free networks. Scientific American, 288:60--69, 2003.
[3]
K. Bharat and M. R. Henzinger. Improved algorithms for topic distillation in a hyperlinked environment. In ACM SIGIR, pages 104--111, Melbourne, Australia, 1998.
[4]
d. boyd. Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life. MIT Press, 2007.
[5]
J. Leskovec, L. A. Adamic, and B. A. Huberman. The dynamics of viral marketing. ACM Trans. Web, 1(1):5, 2007.
[6]
J. Leskovec and C. Faloutsos. Scalable modeling of real graphs using kronecker multiplication. In Proc. of the 24th intl conf on Machine learning, Corvalis, Oregon, 2007. ACM.
[7]
L. Lessig. Code Version 2.0. Basic Books, New York, 2006.
[8]
A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and analysis of online social networks. In Proc. of the 7th ACM SIGCOMM conference on Internet measurement, San Diego, CA, USA, 2007. ACM.
[9]
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation systems. Communications of the ACM, 43(12):45--48, 2000.

Cited By

View all
  • (2022)SoK: Social Cybersecurity2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833757(1863-1879)Online publication date: May-2022
  • (2022)DDoS attack resisting authentication protocol for mobile based online social network applicationsJournal of Information Security and Applications10.1016/j.jisa.2022.10311565:COnline publication date: 1-Mar-2022
  • (2021)A Low-Cost Attack against the hCaptcha System2021 IEEE Security and Privacy Workshops (SPW)10.1109/SPW53761.2021.00061(422-431)Online publication date: May-2021
  • Show More Cited By

Index Terms

  1. Photo-based authentication using social networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WOSN '08: Proceedings of the first workshop on Online social networks
    August 2008
    92 pages
    ISBN:9781605581828
    DOI:10.1145/1397735
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 August 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. social networks
    2. trust

    Qualifiers

    • Research-article

    Conference

    SIGCOMM '08
    Sponsor:
    SIGCOMM '08: ACM SIGCOMM 2008 Conference
    August 18, 2008
    WA, Seattle, USA

    Acceptance Rates

    Overall Acceptance Rate 12 of 36 submissions, 33%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 15 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)SoK: Social Cybersecurity2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833757(1863-1879)Online publication date: May-2022
    • (2022)DDoS attack resisting authentication protocol for mobile based online social network applicationsJournal of Information Security and Applications10.1016/j.jisa.2022.10311565:COnline publication date: 1-Mar-2022
    • (2021)A Low-Cost Attack against the hCaptcha System2021 IEEE Security and Privacy Workshops (SPW)10.1109/SPW53761.2021.00061(422-431)Online publication date: May-2021
    • (2021)A Systematic Survey on CAPTCHA Recognition: Types, Creation and Breaking TechniquesArchives of Computational Methods in Engineering10.1007/s11831-021-09608-429:2(1107-1136)Online publication date: 14-Jun-2021
    • (2018)CAPTCHA Design and Security IssuesAdvances in Cyber Security: Principles, Techniques, and Applications10.1007/978-981-13-1483-4_4(69-92)Online publication date: 7-Dec-2018
    • (2017)Social Authentication Applications, Attacks, Defense Strategies and Future Research Directions: A Systematic ReviewIEEE Communications Surveys & Tutorials10.1109/COMST.2017.265174119:2(1080-1111)Online publication date: Oct-2018
    • (2017)A Novel Approach for Emergency Backup Authentication Using Fourth FactorInnovations in Computer Science and Engineering10.1007/978-981-10-3818-1_34(313-323)Online publication date: 20-Jun-2017
    • (2016)Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social NetworksProceedings of the 2016 ACM International Workshop on Attribute Based Access Control10.1145/2875491.2875495(25-34)Online publication date: 11-Mar-2016
    • (2016)I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs2016 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP.2016.37(388-403)Online publication date: Mar-2016
    • (2015)Secrets, Lies, and Account RecoveryProceedings of the 24th International Conference on World Wide Web10.1145/2736277.2741691(141-150)Online publication date: 18-May-2015
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media