Proceedings of the 2017 Internet Measurement Conference 2017
DOI: 10.1145/3131365.3131397
|View full text |Cite
|
Sign up to set email alerts
|

If you are not paying for it, you are the product

Abstract: Online advertising is progressively moving towards a programmatic model in which ads are matched to actual interests of individuals collected as they browse the web. Le ing the huge debate around privacy aside, a very important question in this area, for which li le is known, is: How much do advertisers pay to reach an individual?In this study, we develop a rst of its kind methodology for computing exactly that -the price paid for a web user by the ad ecosystem -and we do that in real time. Our approach is bas… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
37
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 56 publications
(38 citation statements)
references
References 27 publications
(32 reference statements)
1
37
0
Order By: Relevance
“…However, in exchange, and not explicitly communicated to the user, they sell collected user data to interested third-parties. This is typically the case within the real-time bidding ad-ecosystem, where data such as location and user behavioral traits are sold for better ad-targeting [17].…”
Section: Discussionmentioning
confidence: 99%
“…However, in exchange, and not explicitly communicated to the user, they sell collected user data to interested third-parties. This is typically the case within the real-time bidding ad-ecosystem, where data such as location and user behavioral traits are sold for better ad-targeting [17].…”
Section: Discussionmentioning
confidence: 99%
“…There are also several cases where a website can end up hosting malicious content unintentionally. Those cases include: (i) the website registers a benign service worker that includes untrusted dynamic thirdparty scripts [52], which in turn possibly load malicious code; (ii) the website includes third-party libraries 1 , one of which can turn rogue or be compromised, and then divert the user to a new tab (e.g., using popunders [37] or clickjacking [80]) where it can register its own service worker bound to a third-party domain; (iii) the website is compromised and attackers plant their malicious JavaScript code directly into the page, thus registering their malicious service worker -a scenario that we see quite often in recent years [58], [53]; or (iv) the website includes iframes with dynamic content, which are typically auctioned at real-time [73] and loaded with content from third parties.…”
Section: A Threat Modelmentioning
confidence: 99%
“…Using smart contracts, service providers can ensure that rewards provided by the service, and the data provided by users are exchanged simultaneously. This can be achieved because smart contract terms and conditions are strictly followed after they are agreed by the parties involved [13].…”
Section: Using Blockchain Technologies Smart Contracts and Incentivementioning
confidence: 99%