scispace - formally typeset
C

Christopher William Palow

Researcher at Facebook

Publications -  6
Citations -  731

Christopher William Palow is an academic researcher from Facebook. The author has contributed to research in topics: Session ID & Session fixation. The author has an hindex of 6, co-authored 6 publications receiving 657 citations.

Papers
More filters
Proceedings ArticleDOI

CopyCatch: stopping group attacks by spotting lockstep behavior in social networks

TL;DR: The method, which is referred to as CopyCatch, detects lockstep Page Like patterns on Facebook by analyzing only the social graph between users and Pages and the times at which the edges in the graph were created.
Proceedings ArticleDOI

Uncovering Large Groups of Active Malicious Accounts in Online Social Networks

TL;DR: This work designs and implements a malicious account detection system called SynchroTrap that clusters user accounts according to the similarity of their actions and uncovers large groups of malicious accounts that act similarly at around the same time for a sustained period of time.
Patent

Authenticating user sessions based on reputation of user locations

TL;DR: In this article, a session is authenticated based on locations associated with a user account used for sending a request for creating a session and the level of authentication required for the session is determined based on the suspiciousness index.
Patent

Preventing phishing attacks based on reputation of user locations

TL;DR: In this paper, a session is authenticated based on locations associated with a user account used for sending a request for creating a session and the level of authentication required for the session is determined based on the suspiciousness index.
Patent

Preventing unauthorized account access using compromised login credentials

TL;DR: In this paper, a system can require enhanced authentication based on the measurement of suspicious behavior, such as whether a login attempt originates from a network source or a physical source that has previously originated an attempt to log in using login information known to have been compromised, and whether multiple login attempts using the login information from multiple users has originated from the source.