IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2021
DOI: 10.1109/infocomwkshps51825.2021.9484564
|View full text |Cite
|
Sign up to set email alerts
|

A system for detecting third-party tracking through the combination of dynamic analysis and static analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…On the other hand, seamlessly interconnected devices in the Metaverse via Bluetooth and other communication protocols promise unlimited room for third-party tracking/cross-app tracking [81,82] . To further improve the solution, third-party tracking/cross-app tracking analysis tools and detection algorithms should be applied [83] . Considering that the computational power of devices is usually limited in the early metaverse era, especially with mobile and other portable devices, a lightweight detection mechanism can be utilized to detect and block third-party tracking/cross-app tracking by using a blocklist to block known threat requests and some machine learning models to detect and block malicious activities from a third party [84] .…”
Section: Expandability Related Security and Privacy Issues And Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, seamlessly interconnected devices in the Metaverse via Bluetooth and other communication protocols promise unlimited room for third-party tracking/cross-app tracking [81,82] . To further improve the solution, third-party tracking/cross-app tracking analysis tools and detection algorithms should be applied [83] . Considering that the computational power of devices is usually limited in the early metaverse era, especially with mobile and other portable devices, a lightweight detection mechanism can be utilized to detect and block third-party tracking/cross-app tracking by using a blocklist to block known threat requests and some machine learning models to detect and block malicious activities from a third party [84] .…”
Section: Expandability Related Security and Privacy Issues And Solutionsmentioning
confidence: 99%
“…Sensory data leakage [61][62][63] , Biometrics leakage [68][69][70] Firewall [59] , Static scan [60] , End-to-end authentication protocol [64] , Two-factor [66] or three-factor [67] Authentication, local storage [72] Real world building Meta user relations [73][74][75] Graph-based framework for privacy preservation [77] , Differential privacy [78] Expandability Third-party tracking [81] , Cross-app tracking [79] Third-party tracking/cross-app tracking analysis tools and detection algorithms [83] , Machine learning based blocking model [84] Combination Virtual economy security [85] , Data security and privacy in digital twin [90] ,…”
Section: Socializationmentioning
confidence: 99%
“…However, still there is a need for future research to improve browser plugins that could help internet users to enhance their privacy. [19] suggested a new system called MFTracker Detector based on the theory of structural holes to discover third-party trackers by generating Jlist (JavaScript based list) and Flist (Flash based list).…”
Section: Gómez-boix Et Al Carried Out Similar Work Inmentioning
confidence: 99%
“…This tool gives the site visitors the preference to choose if they want to be tracked or not by the site and whether they want to share any collected data from their activities or not. However, it is useless and can be ignored [19].…”
Section: Do Not Track Headermentioning
confidence: 99%