Proceedings of the Web Conference 2020 2020
DOI: 10.1145/3366423.3380124
|View full text |Cite
|
Sign up to set email alerts
|

Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…The crawler is fed with the aforementioned domains list, loads the corresponding web pages, and then recursively accesses three random pages from each domain, up to a distance of three clicks from the initial main page. This results in up to 13 different pages per domain, mimicking the configuration used in other privacy-related studies [20]. To avoid the detection of our automated browser by bot detectors, we implemented the most recently-proposed methods [21,22,23].…”
Section: A the Analysis Platformmentioning
confidence: 99%
“…The crawler is fed with the aforementioned domains list, loads the corresponding web pages, and then recursively accesses three random pages from each domain, up to a distance of three clicks from the initial main page. This results in up to 13 different pages per domain, mimicking the configuration used in other privacy-related studies [20]. To avoid the detection of our automated browser by bot detectors, we implemented the most recently-proposed methods [21,22,23].…”
Section: A the Analysis Platformmentioning
confidence: 99%
“…Such crawlers were often deployed in large-scale scans to discover privacy leakages around the web, often using either the Tranco or the Alexa [2] top domain datasets as inputs. The resulting studies measured privacy leakages found in email tracking [21], link tracking [66], third-party cookies [67] (used on 70% of sites for tracking purposes), the ad ecosystem [23], HTTP headers [35], contact forms [72] (where 2.5% of the total number of contact forms leaked the user's PII through the URL query string), and registration forms [9]. Many other crawls characterized privacy leakages (often by looking at domains of third-party requests) more broadly on the web [3,34,38,39,69], or in specific sectors such as adult websites [44,76], health websites [37], online collaboration services [31], and the financial sector [65].…”
Section: Related Workmentioning
confidence: 99%
“…This action is risky because the user can click in dangerous elements when browsing some websites. [85] shows that these dangerous situations are extremely common in all types of domains, which makes a large number of users vulnerable to different possible attacks. Furthermore, in section II click related problems have been explained.…”
Section: ) General Questionsmentioning
confidence: 99%