TY - JOUR
T1 - Addressing the privacy threat to identify existence of a target’s account on sensitive services
AU - Hasegawa, Ayako Akiyama
AU - Watanabe, Takuya
AU - Shioji, Eitaro
AU - Akiyama, Mitsuaki
AU - Mori, Tatsuya
N1 - Publisher Copyright:
© 2020 Information Processing Society of Japan.
PY - 2020/12
Y1 - 2020/12
N2 - Online service providers exert tremendous effort to protect users’ accounts against sensitive data breaches. Although threats from complete outsiders, such as account hijacking for monetization, still occur, recent studies have shed light on threats to privacy from insiders. In this study, we focus on these latter threats. Specifically, we present the first comprehensive study of an attack from insiders that identifies the existence of a target’s account by using the target’s email address and the insecure login-related messages that are displayed. Such a threat may violate intimates’ or acquaintances’ privacy because the kinds of service accounts a user has implies his/her personal preferences or situation. We conducted surveys regarding user expectations and behaviors on online services and an extensive measurement study of login-related messages on online services that are considered sensitive. We found that over 80% of participants answered that they have sensitive services and that almost all services were vulnerable to our attack. Moreover, about half the participants who have sensitive services were insecurely registered on them, thus could be potential victims. Finally, we recommend ways for online service providers to improve login-related messages and for users to take appropriate defensive actions. We also report our responsible disclosure process.
AB - Online service providers exert tremendous effort to protect users’ accounts against sensitive data breaches. Although threats from complete outsiders, such as account hijacking for monetization, still occur, recent studies have shed light on threats to privacy from insiders. In this study, we focus on these latter threats. Specifically, we present the first comprehensive study of an attack from insiders that identifies the existence of a target’s account by using the target’s email address and the insecure login-related messages that are displayed. Such a threat may violate intimates’ or acquaintances’ privacy because the kinds of service accounts a user has implies his/her personal preferences or situation. We conducted surveys regarding user expectations and behaviors on online services and an extensive measurement study of login-related messages on online services that are considered sensitive. We found that over 80% of participants answered that they have sensitive services and that almost all services were vulnerable to our attack. Moreover, about half the participants who have sensitive services were insecurely registered on them, thus could be potential victims. Finally, we recommend ways for online service providers to improve login-related messages and for users to take appropriate defensive actions. We also report our responsible disclosure process.
KW - Account security
KW - Insider attack
KW - Login
KW - Privacy
KW - Usable security
UR - http://www.scopus.com/inward/record.url?scp=85098799472&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85098799472&partnerID=8YFLogxK
U2 - 10.2197/ipsjjip.28.1030
DO - 10.2197/ipsjjip.28.1030
M3 - Article
AN - SCOPUS:85098799472
SN - 0387-5806
VL - 28
SP - 1030
EP - 1046
JO - Journal of information processing
JF - Journal of information processing
ER -