Readings in Social Computing Systems

Summer semester 2013

A. Course introduction

Lecture#

Date

Papers

Presenters

1

April 24th, 2013

Course Introduction

Krishna Gummadi

B. Security: Understanding security threats

Lecture#

Date

Papers

Presenters

Malicious crowdsourcing services

2

May 8th, 2013

Paper to be presented

1. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse (Usenix Security’11)  PDF

Related reading

a. Serf and Turf: Crowdturfing for Fun and Profit (WWW’12)  PDF

Bimal Viswanath

Unwanted communication

3.

May 15th, 2013

Paper to be presented

1. Suspended Accounts in Retrospect:An Analysis of Twitter Spam (IMC’11) PDF

Related reading

a. Detecting and Characterizing Social Spam Campaigns (IMC’10) PDF

b. @spam: The Underground on 140 Characters or Less (CCS’10) PDF

Bimal Viswanath

Attacks on reputation systems

4.

May 22nd, 2013

Paper to be presented

1. Opinion Spam and Analysis (WSDM’08) PDF

Bimal Viswanath

Social engineering attacks

5.

May 29th, 2013

Paper to be presented

1.  All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks (WWW’09) PDF

Related reading

a.  Social Phishing (CACM’07) PDF

Bimal Viswanath

C. Security: Building robust defenses

Lecture#

Date

Papers

Presenters

Combating spam using behavioral profiling

6.

June 5th, 2013

Paper to be presented

1. Detecting Spammers on Twitter (CEAS’10) PDF

Related reading

a. Detecting and Analyzing Automated Activity on Twitter (PAM’11) PDF

b. Design and Evaluation of a Real-Time URL Spam Filtering Service (Oakland’11) PDF

Bimal Viswanath

Leveraging network structure to build reputation

7.

June 12th, 2013

Paper to be presented

1. Combating Web Spam with TrustRank (VLDB’04) PDF

Related reading

a. The PageRank Citation Ranking: Bringing Order to the Web  PDF

b. Propagation of Trust and Distrust (WWW '04) PDF

c. Topical TrustRank: Using Topicality to Combat Web Spam (WWW’06) PDF

Bimal Viswanath

Social network-based Sybil detection

8.

June 19th, 2013

Paper to be presented

1. Aiding the Detection of Fake Accounts in Large Scale Social Online Services (NSDI’12) PDF

Related reading

a. An Analysis of Social Network-based Sybil Defenses (SIGCOMM’10) PDF

b. SybilGuard: Defending Against Sybil Attacks via Social Networks (SIGCOMM’06) PDF

Bimal Viswanath

Social network-based Sybil tolerance

9.

July 3rd, 2013

Paper to be presented

1.  Bazaar: Strengthening User Reputations in Online Marketplaces (NSDI’11) PDF

Related reading

a. Ostra: Leveraging trust to thwart unwanted communication (NSDI’08) PDF

b. Canal: Scaling social network-based Sybil tolerance schemes (Eurosys’12) PDF

c. Exploring the design space of social network-based Sybil defenses (COMSNETS’12) PDF

Bimal Viswanath

D. User privacy

Lecture#

Date

Papers

Presenters

Privacy leakage to providers, third-parties and strangers in social networks

10.

July 10th, 2013

Papers to be presented

1. On the Leakage of Personally Identifiable Information Via Online Social Networks (WOSN’09) PDF

2. Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs (WOSN’09) PDF

Related reading

a. Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals (WWW’12) PDF

b. Persona: An Online Social Network with User-Defined Privacy (SIGCOMM’09) PDF

Bimal Viswanath

Exploiting social interactions to infer private information

11.

July 17th, 2013

Paper to be presented

1. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles (WWW’09) PDF

Related reading

a. You Are Who You Know: Inferring User Profiles in Online Social Networks (WSDM’10) PDF

b. Exploiting Innocuous Activity for Correlating Users Across Sites (WWW’13) PDF

Bimal Viswanath

Building tools to better manage privacy settings for content shared with friends

12.

July 24th, 2013

Papers to be presented

1. Privacy Wizards for Social Networking Sites (WWW’10) PDF

Related reading

a. Imagined communities: Awareness, information sharing, and privacy on the facebook (PET’06) PDF

b. Analyzing Facebook privacy settings: User expectations vs. reality (IMC’11) PDF

Bimal Viswanath