Facebook asks users to add their phone numbers for 2-factor authentication, then misuses that info to target ads. Researchers at Northeastern uncovered this by signing up as an advertiser and finding many clever tricks to reverse-engineer FB's targeting.
Good writing is hard for academics.
For fun,
@demirag_d
and I studied 379 USENIX Security papers, focusing on the opening sentence. How do authors try to hook the reader?
Full write-up:
Thread: ⬇️
* People ask LLMs to write code
* LLMs recommend imports that don't actually exist
* Attackers work out what these imports' names are, and create & upload them with malicious payloads
* People using LLM-written code then auto-add malware themselves
🥳🏆 Congratulations🏆 👏
The paper "Careless Participants Are Essential For Our
#Phishing
Study: Understanding the Impact of Screening Methods" by T. Matsuura, A. Hasegawa, M. Akiyama and T. Mori was honored as the best paper at this year's
#EuroUSEC2021
.
嬉しい採録通知!このテーマは、3月に修了した学生が地道にコツコツと積み上げた成果なので、論文発表できる機会を得られて本当によかった
A. Natatsuka et al., Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework, to appear at RAID 2022