skip to main content
10.1145/3075564.3076260acmconferencesArticle/Chapter ViewAbstractPublication PagescfConference Proceedingsconference-collections
research-article

Social Engineering 2.0: A Foundational Work: Invited Paper

Authors Info & Claims
Published:15 May 2017Publication History

ABSTRACT

During the past few years, social engineering has rapidly evolved and has become a mainstream technique in cybercrime and terrorism. It is used especially in targeted attacks involving complex human and technological exploits, aimed at deceiving humans and IT systems. Building on the work carried out in the DOGANA project, funded by the European Union, this paper provides an overview of the evolution and of the current landscape of social engineering, and introduces as its main contribution a theoretical model of how human exploits are built, named the Victim Communication Stack.

References

  1. L. Kharouni et al., "Operation Pawn Storm Using Decoys to Evade Detection," Trendmicro, 2014. {Online}. Available: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-pawn-storm.pdfGoogle ScholarGoogle Scholar
  2. P. Paganini, "The differences between targeted attacks and advanced persistent threats," 2015. {Online}. Available: http://securityaffairs.co/wordpress/40228/cyber-crime/targeted-attacks-vs-advanced-persistent-threats.html.Google ScholarGoogle Scholar
  3. K. D. Mitnick, W. L. Simon, and S. Wozniak, The art of deception: Controlling the human element of security. Indianapolis, IN: Wiley, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K. D. Mitnick and W. L. Simon, The art of intrusion: The real stories behind the exploits of hackers, intruders and Deceivers. New York: Wiley, John & Sons, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. lvxferis, "Hacking the mind for fun and profit," in phrack.org, 2010. {Online}. Available: http://phrack.org/issues/67/15.html. Accessed: Mar. 6, 2017.Google ScholarGoogle Scholar
  6. S. Granger, "Social Engineering Fundamentals, Part I: Hacker Tactics," 2001. {Online}. Available: http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics. Accessed: Mar. 6, 2017.Google ScholarGoogle Scholar
  7. E. Frumento, F. Freschi, "How the Evolution of Workforces Influences Cybercrime Strategies: The Example of Healthcare," in B. Akhgar, B. Brewster (Eds.): Combatting Cybercrime and Cyberterrorism -- Challenges, Trends and Priorities, Springer, 2015.Google ScholarGoogle Scholar
  8. K. Thomas, D. Huang, D. Wang, E. Bursztein, C. Grier, T. J. Holt, C. Kruegel, D. McCoy, S. Savage, G. Vigna, Framing Dependencies Introduced by Underground Commoditization, Workshop on the Economics of Information Security, 2015.Google ScholarGoogle Scholar
  9. European Cybercrime Center (EC3), The Internet Organized Crime Threat Assessment (iOCTA), 2014. {Online}. Available: https://www.europol.europa.eu/content/internet-organised-crime-threatassesment-iocta.Google ScholarGoogle Scholar
  10. S. Blackmore, "The meme machine". United Kingdom: Oxford University Press, 1999.Google ScholarGoogle Scholar
  11. I. Mann, "Hacking the human: Social engineering techniques and security countermeasures". Aldershot, Hants, England: Ashgate Publishing, 2009.Google ScholarGoogle Scholar
  12. A. Algarni, Y. Xu, T. Chan, and Y.-C. Tian, "Social engineering in social networking sites: Affect-based model," 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), pp. 508--515, Dec. 2013Google ScholarGoogle Scholar
  13. G. Farrell, K. Clark, D. Ellingworth, and K. Pease "Of targets and supertargets: a routine activity theory of high crime rates", Internet Journal of Criminology (IJC), Mar. 2005.Google ScholarGoogle Scholar
  14. A. Bermingham, M. Conway, L. McInerney, N. O'Hare, and A. F. Smeaton, "Combining social network analysis and sentiment analysis to explore the potential for online Radicalisation," International Conference on Advances in Social Network Analysis and Mining, Jul. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Huber, S. Kowalski, M. Nohlberg, and S. Tjoa, "Towards automating social engineering using social networking sites," International Conference on Computational Science and Engineering, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Anti-Phishing Working Group (APWG), "Phishing activity trends report {18} unifying the global response to Cybercrime", Oct. 3, 2016. {Online}. Available: http://docs.apwg.org/reports/apwg_trends_report_q2_2016.pdfGoogle ScholarGoogle Scholar
  17. Y. Ilyin, "What is "whaling", and what's the difference from phishing", Kaspersky Lab, January 6, 2016. {Online}. Available: https://business.kaspersky.com/whaling/5009/Google ScholarGoogle Scholar
  18. S. Pontiroli, "Social Engineering, Hacking The Human OS," in Kaspersky Blog, 2013. {Online}. Available: https://blog.kaspersky.com/social-engineering-hacking-the-human-os.Google ScholarGoogle Scholar
  19. C. Nachreiner, "Signature antivirus' dirty little secret," in HelpNet Security, 2015. {Online}. Available: http://www.net-security.org/article.php?id=2239&p=2.Google ScholarGoogle Scholar
  20. M. Valori, G. Pravettoni, C. Lucchiari and E. Frumento, "Cognitive approach for social engineering," Wien, 2010 {Online}. Available: https://deepsec.net/docs/Slides/2010/DeepSec_2010_Cognitive_approach_for_Social_Engineering.pdf.Google ScholarGoogle Scholar
  21. E. Frumento and R. Puricelli, "An innovative and comprehensive framework for Social Vulnerability Assessment," Magdeburger Journal zur Sicherheitsforschung, Proceedings, 2014Google ScholarGoogle Scholar
  22. J. Spaulding, S. Upadhyaya, A. Mohaisen, The landscape of Domain Name Typosquatting: Techniques and Countermeasures, arXiv Pre-Print, arXiv:1603.02767, 2016.Google ScholarGoogle Scholar
  23. T. Berners-Lee, "The next web," TED Talks, 2009. {Online}. Available: http://www.ted.com/talks/tim_berners_lee_on_the_next_web?nolanguage=us.Google ScholarGoogle Scholar

Index Terms

  1. Social Engineering 2.0: A Foundational Work: Invited Paper

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CF'17: Proceedings of the Computing Frontiers Conference
          May 2017
          450 pages
          ISBN:9781450344876
          DOI:10.1145/3075564

          Copyright © 2017 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 15 May 2017

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          CF'17 Paper Acceptance Rate43of87submissions,49%Overall Acceptance Rate240of680submissions,35%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader