References
1. Facebook. Facebook statistics, 2010. [Online; accessed 5-January-2010], http://www.
facebook.com/press/info.php?statistics.
2. R. Gross and A. Acquisti. Information revelation and privacy in online social networks (the
Facebook case). In Proceedings of the 2005 ACM workshop on Privacy in the electronic
society, pages 71–80, 2005.
3. H. Jones and J.H. Soltren. Facebook: Threats to Privacy. Project MAC: MIT Project on
Mathematics and Computing, 2005.
4. J. Bonneau, J. Anderson, R. Anderson, and F. Stajano. Eight friends are enough: social graph
approximation via public listings. In Proceedings of the Second ACM EuroSys Workshop on
Social Network Systems, pages 13–18. ACM, 2009.
5. Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda. All your contacts are
belong to us: Automated identity theft attacks on social networks. In 18th International
World Wide Web Conference, April 2009.
6. T.N. Jagatic, N.A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Communications
of the ACM, 50(10):94–100, 2007.
7. G. Brown, T. Howe, M. Ihbe, A. Prakash, and K. Borders. Social networks and context-aware
spam. In Proceedings of the ACM 2008 conference on Computer supported cooperative
work, pages 403–412. ACM New York, NY, USA, 2008.
8. Markus Huber, Stewart Kowalski, Marcus Nohlberg, and Simon Tjoa. Towards automating
social engineering using social networking sites. Computational Science and Engineering,
IEEE International Conference on, 3:117–124, 2009.
9. X. He. A Performance Analysis of Secure HTTP Protocol. STAR Lab Technical Report,
Department of Electrical and Computer Engineering, Tennessee Tech University, 2003.
10. Wikipedia. List of social networking websites — Wikipedia, The Free Encyclopedia,
2009. [Online; accessed 10-December-2009], http://en.wikipedia.org/wiki/List_
of_social_networking_websites.
11. C. Dwyer, S.R. Hiltz, and K. Passerini. Trust and privacy concern within social networking
sites: A comparison of Facebook and MySpace. In Americas Conference on Information
Systems (AMCIS), Keystone, Colorado, USA, 2007.
12. Facebook. Facebook asks more than 350 million users around the world to personalize their
privacy, 2009. [Online; accessed 4-March-2010], http://www.facebook.com/press/
releases.php?p=133917.
13. A. Felt and D. Evans. Privacy protection for social networking APIs. 2008 Web 2.0 Security
and Privacy (W2SP’08), 2008.
14. Alexa. Site info: Facebook, 2010. [Online; accessed 20-January-2010], http://www.
alexa.com/siteinfo/facebook.com#trafficstats.
15. dpkt - python packet creation / parsing library. http://code.google.com/p/dpkt/.
16. Python mechanize library. http://wwwsearch.sourceforge.net/mechanize/.
17. B. Adida. Sessionlock: securing web sessions against eavesdropping. 2008.
18. Xing business network - social network for business professionals. https://www.xing.
com/.
19. C. Jackson and A. Barth. ForceHTTPS: Protecting high-security web sites from network
attacks. 2008.