Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revisionBoth sides next revision
public:papers:ifipsec2021 [2021-03-26 11:26] x242168public:papers:ifipsec2021 [2021-08-16 12:44] x242168
Line 6: Line 6:
 <TEXT size="large"> <TEXT size="large">
  
-\_{{fa>user}}\_\_//Authors://  Lydia Kraus and Mária Svidronová and Elizabeth Stobert+\_{{fa>user}}\_\_//Authors://  Lydia Kraus and Mária Švidroňová and Elizabeth Stobert
  
 {{fa>user-circle-o}}\_//Primary contact:// Lydia Kraus %%<%%<lydia.kraus@mail.muni.cz>%%>%% {{fa>user-circle-o}}\_//Primary contact:// Lydia Kraus %%<%%<lydia.kraus@mail.muni.cz>%%>%%
Line 12: Line 12:
 {{fa>bullhorn}}\_//Conference:// [[https://ifipsec.org/2021/|IFIP SEC 2021]] {{fa>bullhorn}}\_//Conference:// [[https://ifipsec.org/2021/|IFIP SEC 2021]]
  
-\_{{fa>id-badge}}\_\_//DOI:// [[TBD]]+\_{{fa>id-badge}}\_\_//DOI:// [[https://doi.org/10.1007/978-3-030-78120-0_27]]
 </TEXT> </TEXT>
 </col> </col>
Line 19: Line 19:
 <TEXT align="right"> <TEXT align="right">
 /* <popover trigger="focus" title="Not yet available" content="Pre-print will be added in July 2021."> */ /* <popover trigger="focus" title="Not yet available" content="Pre-print will be added in July 2021."> */
-<button type="warning" icon="fa fa-fw fa-file-pdf-o">[[|Pre-print PDF]]</button>+<button type="warning" icon="fa fa-fw fa-file-pdf-o">[[https://crocs.fi.muni.cz/_media/publications/pdf/2021-ifipsec-kraus.pdf|Pre-print PDF]]</button>
 /* </popover> */ /* </popover> */
 \_ \_
Line 33: Line 33:
   Title         = {How Do Users Chain Email Accounts Together?},   Title         = {How Do Users Chain Email Accounts Together?},
   Author        = {Lydia Kraus and Maria Svidronova and Elizabeth Stobert},   Author        = {Lydia Kraus and Maria Svidronova and Elizabeth Stobert},
-  BookTitle     = {Accepted at IFIP International Conference on ICT Systems Security and Privacy Protection},+  BookTitle     = {IFIP International Conference on ICT Systems Security and Privacy Protection},
   Pages         = {},   Pages         = {},
   Publisher     = {Springer, Cham},   Publisher     = {Springer, Cham},
Line 48: Line 48:
  
 ===== Selected conclusions ===== ===== Selected conclusions =====
-TBD+ 
 +  * Our results show that email account topologies are diverse, but that many include elements of line and loop topologies.  
 +  * Loop topologies are especially concerning, as they allow attackers who already have access to one account to easily gain access to a further account.  
 +  * We also found that users created other vulnerabilities in their topologies by placing the final recovery nodes in inaccessible accounts, or by using accounts owned by somebody else as a recovery option. 
 +  * Users also tended to keep accounts with physical recovery options (which could be strong recovery options) separate from the rest of the recovery topology. 
 +  * Participants were often unaware of the connections between their accounts and only realized during the study that there are recovery links they are not happy with.
  
 ===== Research artifacts (supplementary material) ===== ===== Research artifacts (supplementary material) =====