Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
Heartfield R., Loukas G. ACM Computing Surveys48 (3):1-39,2015.Type:Article
Date Reviewed: Feb 3 2016

Social engineering attacks include a large variety of ways to manipulate and deceive users. A specific type is semantic attacks that deceive rather than directly attack a user. We find here a taxonomy and description of semantic attacks indicating possible defenses. The taxonomy is based on analyzing how an attack handles the three distinct stages of an attack: orchestration, exploitation, and execution. These are well-chosen subgroups that provide a clear picture about the nature of the attacks and allow grouping of all the known attacks of this type.

A more general (in scope) threat classification uses threat patterns providing detailed descriptions of how the attacks reach their goals, and it is complementary to the one given here. Four examples illustrate the classification, followed by a table describing 30 attacks that have been found on the web. This is followed by a discussion of defense mechanisms, consisting of organizational and technical aspects. An attack and defense matrix summarizes this information, providing a mapping of defenses against semantic attacks. The paper ends with a section indicating open problems.

Overall, this is a very useful paper that provides a clear perspective of what we know about semantic attacks and what we need to study further. Because semantic attacks have many aspects in common with other types of attacks, this paper is highly recommended for anybody doing research on security threats as well as for architects and developers who have to build or evaluate secure systems.

Reviewer:  E. B. Fernandez Review #: CR144148 (1605-0321)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy