{"id":308183,"date":"2005-07-14T12:00:21","date_gmt":"2005-07-14T19:00:21","guid":{"rendered":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/?p=308183"},"modified":"2016-10-19T09:40:17","modified_gmt":"2016-10-19T16:40:17","slug":"keeping-e-mail-safe-microsoft-co-sponsors-conference-e-mail-anti-spam","status":"publish","type":"post","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/blog\/keeping-e-mail-safe-microsoft-co-sponsors-conference-e-mail-anti-spam\/","title":{"rendered":"Keeping E-Mail Safe: Microsoft Co-Sponsors Conference on E-Mail and Anti-Spam"},"content":{"rendered":"<p><em>By Rob Knies, Managing Editor, Microsoft Research<\/em><\/p>\n<p>Joshua Goodman\u2019s grandfather recently got himself a new computer. He\u2019s a medical writer who had been accustomed to typing his columns and mailing them to his publishers. But the publishers increasingly began to ask that he submit his material via e-mail, so he went out and purchased a new PC.<\/p>\n<p>Joshua Goodman\u2019s grandfather is 90 years old.<\/p>\n<p>Such stories\u2014we\u2019ve all heard them\u2014illustrate the importance society has come to place on e-mail in the Internet age. They also underscore the importance of ensuring that e-mail is easy to use and free of irritants such as spam and phishing attacks, which often target the elderly with their scams.<\/p>\n<p>Goodman, a researcher for the Machine Learning and Applied Statistics (MLAS) Group within Microsoft Research, is among those committed to combating spam and phishing. He is serving as general conference chair for the second <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/academic.research.microsoft.com\/Conference\/1847\/ceas-conference-on-email-and-anti-spam\" target=\"_blank\">Conference on Email and Anti-Spam<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (CEAS), scheduled for July 21-22 at Stanford University, in cooperation with the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/www.iacr.org\/\" target=\"_blank\">International Association for Cryptologic Research<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> and the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/www.ieee-security.org\/\" target=\"_blank\">Institute of Electrical and Electronics Engineers\u2019 Technical Committee on Security and Privacy<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. Microsoft is a co-sponsor of the conference.<\/p>\n<p>\u201cE-mail has turned into this thing that everyone uses,\u201d Goodman said. \u201cIt\u2019s a large driving force in people\u2019s lives. It\u2019s key for e-commerce, but flaws in it also create huge vulnerabilities. It\u2019s an extremely important area, and there\u2019s a lot of interest and a lot of different areas to explore.\u201d<\/p>\n<p>The first CEAS, also co-sponsored by Microsoft, was held in Mountain View, Calif., in July 2004, with David Heckerman, MLAS research area manager for Microsoft Research, as general conference chair and Goodman acting as program co-chair. Heckerman also co-authored one of the seminal papers on statistical spam filtering.<\/p>\n<p>\u201cE-mail is the No. 1 application that people use, and spam continues to be a major problem with e-mail\u201d, Goodman said. \u201cIt\u2019s amazing there wasn\u2019t a conference like this sooner.\u201d<\/p>\n<p>Microsoft authors wrote seven of the 26 papers accepted for this year\u2019s conference, and they\u2019ll be presenting their findings to a gathering significantly different from many such events.<\/p>\n<p>\u201cMost computer-science conferences are mainly attended by researchers,\u201d Goodman said. \u201cWe\u2019re making this one a little more interdisciplinary. We\u2019ll have a lot of people from industrial research labs and a lot of academic researchers, and we\u2019ll have people from companies that build spam-fighting software.<\/p>\n<p>\u201cThat\u2019s what great about this conference: You get to present to people who can actually use your ideas, and you get feedback from people who have experience actually deploying these systems.\u201d<\/p>\n<p>The Microsoft papers accepted for the conference include:<\/p>\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/academic.research.microsoft.com\/Publication\/2203551\/automatic-discovery-of-personal-topics-to-organize-email\" target=\"_blank\"><strong><em>Automatic Discovery of Personal Topics to Organize Email<\/em><\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><strong>, by Arun Surendran, John Platt, and Erin Renshaw<\/strong>: This paper describes a procedure to discover a user\u2019s personal topics by clustering the user\u2019s e-mail. Topics are automatically labeled by the use of appropriate keywords, which are obtained using domain knowledge about e-mail and the workplace of the user. An e-mail\/document browser uses the keywords as standing queries to create virtual folders that organize, index, and retrieve e-mail efficiently.<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/academic.research.microsoft.com\/Publication\/2203211\/searching-for-john-doe-finding-spammers-and-phishers\" target=\"_blank\"><strong><em>Searching For John Doe: Finding Spammers and Phishers<\/em><\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><strong>, by Aaron Kornblum<\/strong>: Researchers from MSR are not the only ones presenting during this conference. Kornblum is an attorney at Microsoft who works on fighting spam. This paper describes some of Microsoft\u2019s efforts to find spammers, many of whom work hard to be anonymous. By subpoenaing information and \u201cfollowing the money,\u201d even clever spammers often can be tracked down, the first step in a successful lawsuit.<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/academic.research.microsoft.com\/Publication\/2203563\/the-social-network-and-relationship-finder-social-sorting-for-email-triage\" target=\"_blank\"><strong><em>The Social Network and Relationship Finder: Social Sorting for Email Triage<\/em><\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><strong>, by Carman Neustaedter (of the University of Calgary), A.J. Bernheim Brush, Marc A. Smith, and Danyel Fisher<\/strong>: E-mail triage is the process of examining unhandled e-mail and deciding what to do with it. Studies have found that people use a variety of approaches to triage their e-mail, many of which have a social component. The Social Network and Relationship Finder aggregates social meta-data about e-mail correspondents to help people sort their mail faster.<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/academic.research.microsoft.com\/Publication\/2203570\/computers-beat-humans-at-single-character-recognition-in-reading-based-human-interaction-proofs\" target=\"_blank\"><strong><em>Computers Beat Humans at Single Character Recognition in Reading Based Human Interaction Proofs (HIPs)<\/em><\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><strong>, by Kumar Chellapilla, Kevin Larson, Patrice Simard, and Mary Czerwinski<\/strong>: Human interaction proofs (HIPs) are challenges designed to be easily solved by humans but too hard for computers to solve. They have become commonplace on the Internet for protecting online services, such as free e-mail systems, from abuse by automated scripts and\/or bots. For a computer to solve these problems, it must solve both the segmentation problem: finding where the letters are, and the recognition problem: reading the individual letters. This paper compares human and computer single-character recognition abilities and demonstrates that computers are as good as or better than humans at single-character recognition in HIPs. Using this knowledge, the researchers hope to build better HIP systems, in part by focusing on making the segmentation problem harder.<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/academic.research.microsoft.com\/Publication\/2203577\/implicit-queries-for-email\" target=\"_blank\"><strong><em>Implicit Queries for Email<\/em><\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><strong>, by Joshua Goodman and Vitor Carvalho<\/strong>: E-mail is the No. 1 application that people use; search is the other. How can we combine these two systems? This paper tries to automate the process of finding keywords in e-mail to send to a search engine, making search easier for users. The paper shows how to use machine-learning methods to learn what kinds of words are most likely to be relevant. One key idea in the paper is to look at query logs from MSN Search: the words and phrases people have searched for in the past are the ones they will want to search for in the future.<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/academic.research.microsoft.com\/Publication\/2140718\/good-word-attacks-on-statistical-spam-filters\" target=\"_blank\"><strong><em>Good Word Attacks on Statistical Spam Filters<\/em><\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><strong>, by Daniel Lowd (of the University of Washington) and Christopher Meek<\/strong>: It has been known for several years that most spam filters are susceptible to \u201cgood work attacks,\u201d in which words typically found in good (non-spam) e-mail messages are added to a spam message to trick a filter. This paper carefully examines how well these techniques work and tries to find ways to build filters that are more robust. Unfortunately, the attacks are powerful, and the best method found is simply to retrain and deploy new filters under attack quickly.<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/academic.research.microsoft.com\/Publication\/2203571\/forward-thinking\" target=\"_blank\"><strong><em>Forward Thinking<\/em><\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><strong>, by Marc A. Smith, Jeff Ubois (of UC Berkeley), and Ben Gross (of the University of Illinois at Urbana-Champaign)<\/strong>: There has been little research published on e-mail forwarding behavior despite its implications for security, knowledge management, and the design of e-mail interfaces. This paper examines the decisions made in forwarding, reading, and acting on e-mails depending on the credibility of the sender\u2019s reputation.<\/li>\n<\/ul>\n<p>Eric Bosco, vice president of Communications and Community Engineering for AOL, and Peter Neumann, principal scientist for the Principled Systems Group within the SRI International Computer Science Lab, are the invited speakers for CEAS 2005.<\/p>\n<p>Microsoft employees serving on the CEAS program committee are Heckerman; <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/horvitz\/\" target=\"_blank\">Eric Horvitz<\/a>, senior researcher and group manager of the Adaptive Systems and Interaction Group within Microsoft Research; Geoff Hulten, a researcher in the Anti-Spam Technology and Strategy Group; and Platt, a senior researcher in the Microsoft Research Knowledge Tools Group.<\/p>\n<p><strong>Learn more<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/cm-edgetun.pages.dev\/presspass\/newsroom\/security\/factsheets\/MSonSpamFS.mspx\">MS on Spam and Phishing<\/a><\/li>\n<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/security\/default.aspx\">Microsoft Secure<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>By Rob Knies, Managing Editor, Microsoft Research Joshua Goodman\u2019s grandfather recently got himself a new computer. He\u2019s a medical writer who had been accustomed to typing his columns and mailing them to his publishers. But the publishers increasingly began to ask that he submit his material via e-mail, so he went out and purchased a [&hellip;]<\/p>\n","protected":false},"author":39507,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":[],"msr_hide_image_in_river":0,"footnotes":""},"categories":[194487,194489],"tags":[215903,215900,215894,215897,186660,215909,215906],"research-area":[13558],"msr-region":[],"msr-event-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-impact-theme":[],"msr-promo-type":[],"msr-podcast-series":[],"class_list":["post-308183","post","type-post","status-publish","format-standard","hentry","category-privacy","category-security","tag-ceas","tag-conference-on-email-and-anti-spam","tag-e-mail","tag-phishing","tag-spam","tag-spam-fighting-software","tag-statistical-spam-filtering","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_event_details":{"start":"","end":"","location":""},"podcast_url":"","podcast_episode":"","msr_research_lab":[],"msr_impact_theme":[],"related-publications":[],"related-downloads":[],"related-videos":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-events":[],"related-researchers":[],"msr_type":"Post","byline":"","formattedDate":"July 14, 2005","formattedExcerpt":"By Rob Knies, Managing Editor, Microsoft Research Joshua Goodman\u2019s grandfather recently got himself a new computer. He\u2019s a medical writer who had been accustomed to typing his columns and mailing them to his publishers. But the publishers increasingly began to ask that he submit his&hellip;","locale":{"slug":"en_us","name":"English","native":"","english":"English"},"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/posts\/308183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/users\/39507"}],"replies":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/comments?post=308183"}],"version-history":[{"count":2,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/posts\/308183\/revisions"}],"predecessor-version":[{"id":308873,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/posts\/308183\/revisions\/308873"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/media?parent=308183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/categories?post=308183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/tags?post=308183"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=308183"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=308183"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=308183"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=308183"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=308183"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=308183"},{"taxonomy":"msr-promo-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-promo-type?post=308183"},{"taxonomy":"msr-podcast-series","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-podcast-series?post=308183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}