Proceedings of the Internet Measurement Conference 2019
DOI: 10.1145/3355369.3355603
|View full text |Cite
|
Sign up to set email alerts
|

A Longitudinal Analysis of the ads.txt Standard

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(18 citation statements)
references
References 36 publications
0
17
0
Order By: Relevance
“…To identify resource inclusion from third-party A&A domains, we apply two heuristics to the HTTP requests in our inclusion trees. First, we match each requested URL against the EasyList and EasyPrivacy 10 block lists [10,11,13]. Second, we apply the methods developed by Fouad et al to identify inclusions of tracking pixels [35].…”
Section: Identifying Aanda Domainsmentioning
confidence: 99%
See 2 more Smart Citations
“…To identify resource inclusion from third-party A&A domains, we apply two heuristics to the HTTP requests in our inclusion trees. First, we match each requested URL against the EasyList and EasyPrivacy 10 block lists [10,11,13]. Second, we apply the methods developed by Fouad et al to identify inclusions of tracking pixels [35].…”
Section: Identifying Aanda Domainsmentioning
confidence: 99%
“…To estimate the number of unique Californians visiting websites in our corpus, we use data from the marketing research company Semrush. 11 In September 2020 we purchased a "custom report" from Semrush for $750 that contained the unique monthly US visitors to 203,365 of the 497,870 domains in our corpus in August 2020 (Semrush did not have visitor estimates for the remaining domains). These visitor counts are based on Semrush's proprietary measurement and estimation methods.…”
Section: Estimating Unique Visitorsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this type of attack, fraudsters take advantage of the impossibility to validate the veracity of the information included in ad-tags or OpenRTB messages. Domain spoofing is a wellknown attack to introduce counterfeit inventory in the programmatic ecosystem [16]. In particular, fraudsters launch fraudulent ad requests from instrumented browsers claiming to come from popular domains, referred to as premium sites, where ad spaces are more expensive.…”
Section: B Lack Of Transparency and Fraud In Online Advertising 1) Pmentioning
confidence: 99%
“…There is a not negligible portion of publishers not adopting it. Moreover, Ads.txt imposes to blindly trust authorized sellers [20] and authorized resellers that could have received the requests through an unauthorized source [16]. Given the limitations of Ads.txt, the IAB launched the Ads.cert specification, whose beta version is included in OpenRTB 3.0.…”
Section: B Lack Of Transparency and Fraud In Online Advertising 1) Pmentioning
confidence: 99%