C
Christopher William Palow
Researcher at Facebook
Publications - 6
Citations - 731
Christopher William Palow is an academic researcher from Facebook. The author has contributed to research in topics: Session ID & Session fixation. The author has an hindex of 6, co-authored 6 publications receiving 657 citations.
Papers
More filters
Proceedings ArticleDOI
CopyCatch: stopping group attacks by spotting lockstep behavior in social networks
TL;DR: The method, which is referred to as CopyCatch, detects lockstep Page Like patterns on Facebook by analyzing only the social graph between users and Pages and the times at which the edges in the graph were created.
Proceedings ArticleDOI
Uncovering Large Groups of Active Malicious Accounts in Online Social Networks
TL;DR: This work designs and implements a malicious account detection system called SynchroTrap that clusters user accounts according to the similarity of their actions and uncovers large groups of malicious accounts that act similarly at around the same time for a sustained period of time.
Patent
Authenticating user sessions based on reputation of user locations
TL;DR: In this article, a session is authenticated based on locations associated with a user account used for sending a request for creating a session and the level of authentication required for the session is determined based on the suspiciousness index.
Patent
Preventing phishing attacks based on reputation of user locations
TL;DR: In this paper, a session is authenticated based on locations associated with a user account used for sending a request for creating a session and the level of authentication required for the session is determined based on the suspiciousness index.
Patent
Preventing unauthorized account access using compromised login credentials
Andrei Bajenov,Jonathan H. Frank,Matthew Knight Jones,Alok Mengharajani,Christopher William Palow,Allan Stewart +5 more
TL;DR: In this paper, a system can require enhanced authentication based on the measurement of suspicious behavior, such as whether a login attempt originates from a network source or a physical source that has previously originated an attempt to log in using login information known to have been compromised, and whether multiple login attempts using the login information from multiple users has originated from the source.