{"id":"https://openalex.org/W2991497622","doi":"https://doi.org/10.1145/3359789.3359832","title":"I know what you did last login","display_name":"I know what you did last login","publication_year":2019,"publication_date":"2019-11-22","ids":{"openalex":"https://openalex.org/W2991497622","doi":"https://doi.org/10.1145/3359789.3359832","mag":"2991497622"},"language":"en","primary_location":{"id":"doi:10.1145/3359789.3359832","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3359789.3359832","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359832","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359832","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076314268","display_name":"Ayako A. Hasegawa","orcid":"https://orcid.org/0000-0002-5527-5306"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ayako Akiyama Hasegawa","raw_affiliation_strings":["NTT Secure Platform Laboratories"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100907993","display_name":"Takuya Watanabe","orcid":"https://orcid.org/0000-0002-9166-1749"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Takuya Watanabe","raw_affiliation_strings":["NTT Secure Platform Laboratories"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001132409","display_name":"Eitaro Shioji","orcid":"https://orcid.org/0000-0001-8743-9101"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Eitaro Shioji","raw_affiliation_strings":["NTT Secure Platform Laboratories"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012291537","display_name":"Mitsuaki Akiyama","orcid":"https://orcid.org/0000-0001-7052-8562"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mitsuaki Akiyama","raw_affiliation_strings":["NTT Secure Platform Laboratories"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5076314268"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3391,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.70400789,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"732","last_page":"746"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.9309285283088684},{"id":"https://openalex.org/keywords/monetization","display_name":"Monetization","score":0.8527214527130127},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.7715675830841064},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6485763192176819},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.5975881814956665},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5738759636878967},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5413112640380859},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5316931009292603},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.4314665198326111},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.36987727880477905},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3425992429256439}],"concepts":[{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.9309285283088684},{"id":"https://openalex.org/C2780602052","wikidata":"https://www.wikidata.org/wiki/Q289845","display_name":"Monetization","level":2,"score":0.8527214527130127},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.7715675830841064},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6485763192176819},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.5975881814956665},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5738759636878967},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5413112640380859},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5316931009292603},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.4314665198326111},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.36987727880477905},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3425992429256439},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3359789.3359832","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3359789.3359832","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359832","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3359789.3359832","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3359789.3359832","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359832","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5199999809265137,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2991497622.pdf","grobid_xml":"https://content.openalex.org/works/W2991497622.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1267153886","https://openalex.org/W1603565383","https://openalex.org/W1767117126","https://openalex.org/W2006605027","https://openalex.org/W2009829087","https://openalex.org/W2022710553","https://openalex.org/W2039381601","https://openalex.org/W2054626033","https://openalex.org/W2108384401","https://openalex.org/W2109878465","https://openalex.org/W2113266120","https://openalex.org/W2122750868","https://openalex.org/W2125927592","https://openalex.org/W2142168244","https://openalex.org/W2143445293","https://openalex.org/W2151295171","https://openalex.org/W2181155974","https://openalex.org/W2338036545","https://openalex.org/W2346878720","https://openalex.org/W2396697587","https://openalex.org/W2398686783","https://openalex.org/W2610414453","https://openalex.org/W2610533455","https://openalex.org/W2610906739","https://openalex.org/W2794651469","https://openalex.org/W2794995912","https://openalex.org/W2795566406","https://openalex.org/W2888940660","https://openalex.org/W2889246521","https://openalex.org/W2902517157","https://openalex.org/W2940919681","https://openalex.org/W2963884623","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4296873905","https://openalex.org/W4312342191","https://openalex.org/W2990215692","https://openalex.org/W2520281795","https://openalex.org/W2956015248","https://openalex.org/W4323565542","https://openalex.org/W4297808986","https://openalex.org/W72090","https://openalex.org/W4240504770","https://openalex.org/W3092408833"],"abstract_inverted_index":{"Account":[0],"security":[1],"to":[2,47,160,197,204],"protect":[3],"user":[4,106,118],"accounts":[5,104],"against":[6],"sensitive":[7,151,170],"data":[8],"breaches":[9],"is":[10],"a":[11,76,91,105,126],"major":[12],"mission":[13],"for":[14,36,193,202],"online":[15,123,134,194],"service":[16,103,195],"providers.":[17],"Therefore,":[18],"they":[19],"exert":[20],"tremendous":[21],"effort":[22],"in":[23],"securing":[24],"account":[25,34,78],"authentication.":[26],"Although":[27],"threats":[28,46],"from":[29,49,69],"complete":[30],"outsiders,":[31],"such":[32],"as":[33],"hijacking":[35],"monetization,":[37],"still":[38],"occur,":[39],"recent":[40],"studies":[41],"have":[42,169],"shed":[43],"light":[44,54],"on":[45,55,122,133,175,187],"privacy":[48,98],"insiders.":[50],"This":[51],"paper":[52],"sheds":[53],"the":[56,62,73,81,100,130,166,188],"latter":[57],"threats.":[58],"Specifically,":[59],"we":[60,184],"present":[61],"first":[63],"comprehensive":[64],"study":[65,128],"of":[66,75,102,129,145,190],"an":[67],"attack":[68],"insiders":[70],"that":[71,136,142,148,154],"identifies":[72],"existence":[74],"target's":[77,82],"by":[79],"using":[80],"email":[83],"address":[84],"and":[85,120,125,153,177,201],"insecure":[86],"login-related":[87,131,199],"messages":[88,132,200],"displayed.":[89],"Such":[90],"threat":[92],"may":[93],"violate":[94],"intimates'":[95],"or":[96,112],"acquaintances'":[97],"because":[99],"kinds":[101],"has":[107],"implies":[108],"his/her":[109],"personal":[110],"preferences":[111],"situation.":[113],"We":[114,140],"conducted":[115],"surveys":[116],"regarding":[117],"expectations":[119],"behaviors":[121],"services":[124,135,152,157,171],"measurement":[127],"are":[137,150,172],"considered":[138],"sensitive.":[139],"found":[141],"over":[143],"80%":[144],"participants":[146,167],"answered":[147],"there":[149],"almost":[155],"all":[156],"were":[158],"vulnerable":[159],"our":[161,191],"attack.":[162],"Moreover,":[163],"about":[164],"half":[165],"who":[168],"insecurely":[173],"registered":[174],"them":[176],"thus":[178],"could":[179],"be":[180],"potential":[181],"victims.":[182],"Finally,":[183],"make":[185],"recommendations":[186],"basis":[189],"findings":[192],"providers":[196],"improve":[198],"users":[203],"take":[205],"appropriate":[206],"defensive":[207],"actions.":[208]},"counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
