{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:41:00Z","timestamp":1762004460830,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,3]],"date-time":"2012-12-03T00:00:00Z","timestamp":1354492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-07-1-0907"],"award-info":[{"award-number":["N00014-07-1-0907"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["257007"],"award-info":[{"award-number":["257007"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,3]]},"DOI":"10.1145\/2420950.2421008","type":"proceedings-article","created":{"date-parts":[[2012,12,19]],"date-time":"2012-12-19T14:12:22Z","timestamp":1355926342000},"page":"399-408","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["All your face are belong to us"],"prefix":"10.1145","author":[{"given":"Iasonas","family":"Polakis","sequence":"first","affiliation":[{"name":"FORTH-ICS, Greece"}]},{"given":"Marco","family":"Lancini","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italia"}]},{"given":"Georgios","family":"Kontaxis","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Federico","family":"Maggi","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italia"}]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"FORTH-ICS, Greece"}]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Stefano","family":"Zanero","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italia"}]}],"member":"320","published-online":{"date-parts":[[2012,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"BlackHat USA","author":"Acquisti A.","year":"2011","unstructured":"A. Acquisti , R. Gross , and F. Stutzman . Faces of Facebook: How the largest real ID database in the world came to be . BlackHat USA , 2011 , http:\/\/www.heinz.cmu.edu\/~acquisti\/face-recognition-study-FAQ\/acquisti-faces-BLACKHAT-draft.pdf. A. Acquisti, R. Gross, and F. Stutzman. Faces of Facebook: How the largest real ID database in the world came to be. BlackHat USA, 2011, http:\/\/www.heinz.cmu.edu\/~acquisti\/face-recognition-study-FAQ\/acquisti-faces-BLACKHAT-draft.pdf."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11909033_9"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894166.1894195"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.31"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046724"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2011.6130218"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197508"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_11_1","volume-title":"Harvard University Press","author":"Dunbar R.","year":"1998","unstructured":"R. Dunbar . Grooming, Gossip, and the Evolution of Language. Harvard University Press , 1998 . R. Dunbar. Grooming, Gossip, and the Evolution of Language. Harvard University Press, 1998."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Ninth Workshop on the Economics of Information Security","author":"Herley C.","year":"2010","unstructured":"C. Herley . The plight of the targeted attacker in a world of scale . In Proceedings of the Ninth Workshop on the Economics of Information Security , 2010 . C. Herley. The plight of the targeted attacker in a world of scale. In Proceedings of the Ninth Workshop on the Economics of Information Security, 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2026647.2026653"},{"key":"e_1_3_2_1_15_1","volume-title":"Facebook Security Phishing Attack In The Wild. Retrieved on","author":"Jacoby D.","year":"2012","unstructured":"D. Jacoby . Facebook Security Phishing Attack In The Wild. Retrieved on January 2012 from http:\/\/www.securelist.com\/en\/blog\/208193325\/Facebook_Security_Phishing_Attack_In_The_Wild. D. Jacoby. Facebook Security Phishing Attack In The Wild. Retrieved on January 2012 from http:\/\/www.securelist.com\/en\/blog\/208193325\/Facebook_Security_Phishing_Attack_In_The_Wild."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135853"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197507"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2009.61"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866922"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408667"},{"key":"e_1_3_2_1_22_1","volume-title":"The underground credentials market. Computer Fraud & Security, (3)","author":"Shulman A.","year":"2010","unstructured":"A. Shulman . The underground credentials market. Computer Fraud & Security, (3) , 2010 . A. Shulman. The underground credentials market. Computer Fraud & Security, (3), 2010."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 6th USENIX Conference on Hot Topics in Security. USENIX","author":"Staddon J.","year":"2011","unstructured":"J. Staddon and A. Swerdlow . Public vs. publicized: content use trends and privacy expectations . In Proceedings of the 6th USENIX Conference on Hot Topics in Security. USENIX , 2011 . J. Staddon and A. Swerdlow. Public vs. publicized: content use trends and privacy expectations. In Proceedings of the 6th USENIX Conference on Hot Topics in Security. USENIX, 2011."},{"volume-title":"Proceedings of the 2009 Web 2.0 Security and Privacy Workshop.","author":"Ur B. E.","key":"e_1_3_2_1_24_1","unstructured":"B. E. Ur and V. Ganapathy . Evaluating attack amplification in online social networks . In Proceedings of the 2009 Web 2.0 Security and Privacy Workshop. B. E. Ur and V. Ganapathy. Evaluating attack amplification in online social networks. In Proceedings of the 2009 Web 2.0 Security and Privacy Workshop."}],"event":{"name":"ACSAC '12: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Orlando Florida USA","acronym":"ACSAC '12"},"container-title":["Proceedings of the 28th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2420950.2421008","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2420950.2421008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:33Z","timestamp":1750234713000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2420950.2421008"}},"subtitle":["breaking Facebook's social authentication"],"short-title":[],"issued":{"date-parts":[[2012,12,3]]},"references-count":24,"alternative-id":["10.1145\/2420950.2421008","10.1145\/2420950"],"URL":"https:\/\/doi.org\/10.1145\/2420950.2421008","relation":{},"subject":[],"published":{"date-parts":[[2012,12,3]]},"assertion":[{"value":"2012-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}