Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–14 of 14 results for author: Overdorf, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.08084  [pdf, other

    cs.SI cs.CR

    Characterizing and Detecting Propaganda-Spreading Accounts on Telegram

    Authors: Klim Kireev, Yevhen Mykhno, Carmela Troncoso, Rebekah Overdorf

    Abstract: Information-based attacks on social media, such as disinformation campaigns and propaganda, are emerging cybersecurity threats. The security community has focused on countering these threats on social media platforms like X and Reddit. However, they also appear in instant-messaging social media platforms such as WhatsApp, Telegram, and Signal. In these platforms information-based attacks primarily… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  2. arXiv:2312.11292  [pdf

    cs.CR

    DFRWS EU 10-Year Review and Future Directions in Digital Forensic Research

    Authors: Frank Breitinger, Jan-Niclas Hilgert, Christopher Hargreaves, John Sheppard, Rebekah Overdorf, Mark Scanlon

    Abstract: Conducting a systematic literature review and comprehensive analysis, this paper surveys all 135 peer-reviewed articles published at the Digital Forensics Research Conference Europe (DFRWS EU) spanning the decade since its inaugural running (2014-2023). This comprehensive study of DFRWS EU articles encompasses sub-disciplines such as digital forensic science, device forensics, techniques and funda… ▽ More

    Submitted 15 March, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

  3. arXiv:2112.02366  [pdf, other

    cs.SI cs.CR cs.CY

    Characterizing Retweet Bots: The Case of Black Market Accounts

    Authors: Tuğrulcan Elmas, Rebekah Overdorf, Karl Aberer

    Abstract: Malicious Twitter bots are detrimental to public discourse on social media. Past studies have looked at spammers, fake followers, and astroturfing bots, but retweet bots, which artificially inflate content, are not well understood. In this study, we characterize retweet bots that have been uncovered by purchasing retweets from the black market. We detect whether they are fake or genuine accounts i… ▽ More

    Submitted 23 March, 2022; v1 submitted 4 December, 2021; originally announced December 2021.

    Comments: Accepted to ICWSM 2022

  4. Tactical Reframing of Online Disinformation Campaigns Against The Istanbul Convention

    Authors: Tuğrulcan Elmas, Rebekah Overdorf, Karl Aberer

    Abstract: In March 2021, Turkey withdrew from The Istanbul Convention, a human-rights treaty that addresses violence against women, citing issues with the convention's implicit recognition of sexual and gender minorities. In this work, we trace disinformation campaigns related to the Istanbul Convention and its associated Turkish law that circulate on divorced men's rights Facebook groups. We find that thes… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

    Comments: Accepted to Data For the Welbeing of Most Vulnerable (DWMV) Workshop colocated with ICWSM 2021

  5. arXiv:2101.05919  [pdf, other

    cs.SI cs.CY

    A Dataset of State-Censored Tweets

    Authors: Tuğrulcan Elmas, Rebekah Overdorf, Karl Aberer

    Abstract: Many governments impose traditional censorship methods on social media platforms. Instead of removing it completely, many social media companies, including Twitter, only withhold the content from the requesting country. This makes such content still accessible outside of the censored region, allowing for an excellent setting in which to study government censorship on social media. We mine such con… ▽ More

    Submitted 19 March, 2021; v1 submitted 14 January, 2021; originally announced January 2021.

    Comments: Accepted to ICWSM 2021

    Journal ref: ICWSM , 2021, Vol.15, p.1009

  6. arXiv:2010.10600  [pdf, other

    cs.SI cs.CY

    Misleading Repurposing on Twitter

    Authors: Tuğrulcan Elmas, Rebekah Overdorf, Karl Aberer

    Abstract: We present the first in-depth and large-scale study of misleading repurposing, in which a malicious user changes the identity of their social media account via, among other things, changes to the profile attributes in order to use the account for a new purpose while retaining their followers. We propose a definition for the behavior and a methodology that uses supervised learning on data mined fro… ▽ More

    Submitted 20 September, 2022; v1 submitted 20 October, 2020; originally announced October 2020.

  7. arXiv:2006.04959  [pdf, ps, other

    cs.CY cs.HC

    Thinking Taxonomically about Fake Accounts: Classification, False Dichotomies, and the Need for Nuance

    Authors: Rebekah Overdorf, Christopher Schwartz

    Abstract: It is often said that war creates a fog in which it becomes difficult to discern friend from foe on the battlefield. In the ongoing war on fake accounts, conscious development of taxonomies of the phenomenon has yet to occur, resulting in much confusion on the digital battlefield about what exactly a fake account is. This paper intends to address this problem, not by proposing a taxonomy of fake a… ▽ More

    Submitted 8 June, 2020; originally announced June 2020.

  8. arXiv:2003.06857  [pdf, other

    cs.SI cs.CY

    Can Celebrities Burst Your Bubble?

    Authors: Tuğrulcan Elmas, Kristina Hardi, Rebekah Overdorf, Karl Aberer

    Abstract: Polarization is a growing, global problem. As such, many social media based solutions have been proposed in order to reduce it. In this study, we propose a new solution that recommends topics to celebrities to encourage them to join a polarized debate and increase exposure to contrarian content - bursting the filter bubble. Using a state-of-the art model that quantifies the degree of polarization,… ▽ More

    Submitted 16 March, 2020; v1 submitted 15 March, 2020; originally announced March 2020.

    Comments: 5 pages, 3 figures, accepted for non-archival track of IID2020, workshop in WWW2020

    Journal ref: Proceedings of the Workshop on Misinformation Integrity in Social Networks 2021 (MISINFO 2021) Vol-2890

  9. arXiv:1910.07783  [pdf, other

    cs.CR cs.SI

    Ephemeral Astroturfing Attacks: The Case of Fake Twitter Trends

    Authors: Tuğrulcan Elmas, Rebekah Overdorf, Ahmed Furkan Özkalay, Karl Aberer

    Abstract: We uncover a previously unknown, ongoing astroturfing attack on the popularity mechanisms of social media platforms: ephemeral astroturfing attacks. In this attack, a chosen keyword or topic is artificially promoted by coordinated and inauthentic activity to appear popular, and, crucially, this activity is removed as part of the attack. We observe such attacks on Twitter trends and find that these… ▽ More

    Submitted 11 March, 2021; v1 submitted 17 October, 2019; originally announced October 2019.

    Comments: Accepted to the IEEE Euro S&P 2021

  10. arXiv:1906.08021  [pdf, ps, other

    cs.CY

    Subtle Censorship via Adversarial Fakeness in Kyrgyzstan

    Authors: Christopher Schwartz, Rebekah Overdorf

    Abstract: With the shift of public discourse to social media, we see simultaneously an expansion of civic engagement as the bar to enter the conversation is lowered, and the reaction by both state and non-state adversaries of free speech to silence these voices. Traditional forms of censorship struggle in this new situation to enforce the preferred narrative of those in power. Consequently, they have develo… ▽ More

    Submitted 19 June, 2019; originally announced June 2019.

    Comments: Accepted HotPETs talk, 2019

  11. arXiv:1811.11293  [pdf, other

    cs.CY cs.LG

    Questioning the assumptions behind fairness solutions

    Authors: Rebekah Overdorf, Bogdan Kulynych, Ero Balsa, Carmela Troncoso, Seda Gürses

    Abstract: In addition to their benefits, optimization systems can have negative economic, moral, social, and political effects on populations as well as their environments. Frameworks like fairness have been proposed to aid service providers in addressing subsequent bias and discrimination during data collection and algorithm design. However, recent reports of neglect, unresponsiveness, and malevolence cast… ▽ More

    Submitted 27 November, 2018; originally announced November 2018.

    Comments: Presented at Critiquing and Correcting Trends in Machine Learning (NeurIPS 2018 Workshop), Montreal, Canada. This is a short version of arXiv:1806.02711

  12. POTs: Protective Optimization Technologies

    Authors: Bogdan Kulynych, Rebekah Overdorf, Carmela Troncoso, Seda Gürses

    Abstract: Algorithmic fairness aims to address the economic, moral, social, and political impact that digital systems have on populations through solutions that can be applied by service providers. Fairness frameworks do so, in part, by mapping these problems to a narrow definition and assuming the service providers can be trusted to deploy countermeasures. Not surprisingly, these decisions limit fairness f… ▽ More

    Submitted 26 January, 2020; v1 submitted 7 June, 2018; originally announced June 2018.

    Comments: Appears in Conference on Fairness, Accountability, and Transparency (FAT* 2020). Bogdan Kulynych and Rebekah Overdorf contributed equally to this work. Version v1/v2 by Seda Gürses, Rebekah Overdorf, and Ero Balsa was presented at HotPETS 2018 and at PiMLAI 2018

  13. arXiv:1805.04494  [pdf, other

    cs.CR

    Under the Underground: Predicting Private Interactions in Underground Forums

    Authors: Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy

    Abstract: Underground forums where users discuss, buy, and sell illicit services and goods facilitate a better understanding of the economy and organization of cybercriminals. Prior work has shown that in particular private interactions provide a wealth of information about the cybercriminal ecosystem. Yet, those messages are seldom available to analysts, except when there is a leak. To address this problem… ▽ More

    Submitted 11 May, 2018; originally announced May 2018.

  14. How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services

    Authors: Rebekah Overdorf, Marc Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz

    Abstract: Recent studies have shown that Tor onion (hidden) service websites are particularly vulnerable to website fingerprinting attacks due to their limited number and sensitive nature. In this work we present a multi-level feature analysis of onion site fingerprintability, considering three state-of-the-art website fingerprinting methods and 482 Tor onion services, making this the largest analysis of th… ▽ More

    Submitted 20 September, 2017; v1 submitted 28 August, 2017; originally announced August 2017.

    Comments: Accepted by ACM CCS 2017