Proceedings 2018 Network and Distributed System Security Symposium 2018
DOI: 10.14722/ndss.2018.23331
|View full text |Cite
|
Sign up to set email alerts
|

Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis

Abstract: Abstract-Millions of people use adblockers to remove intrusive and malicious ads as well as protect themselves against tracking and pervasive surveillance. Online publishers consider adblockers a major threat to the ad-powered "free" Web. They have started to retaliate against adblockers by employing antiadblockers which can detect and stop adblock users. To counter this retaliation, adblockers in turn try to detect and filter anti-adblocking scripts. This back and forth has prompted an escalating arms race be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
44
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 35 publications
(44 citation statements)
references
References 15 publications
(31 reference statements)
0
44
0
Order By: Relevance
“…Apps may also attempt to use anti ad-blockers to detect presence of ad-blockers [41,42]. While we did not observe such behavior, if and when that happens, we can block anti ad-blocking scripts that are downloaded from third-parties [23] or use more sophisticated dynamic analysis techniques to circumvent anti ad-blocking logic that is part of the app [43].…”
Section: Discussionmentioning
confidence: 91%
“…Apps may also attempt to use anti ad-blockers to detect presence of ad-blockers [41,42]. While we did not observe such behavior, if and when that happens, we can block anti ad-blocking scripts that are downloaded from third-parties [23] or use more sophisticated dynamic analysis techniques to circumvent anti ad-blocking logic that is part of the app [43].…”
Section: Discussionmentioning
confidence: 91%
“…In Reference [61], static program analysis is applied to JavaScript source code to identify JavaScript that loads and displays ads. Anti-adblockers scripts are detected on 30.5% of the Alexa top 10K websites [99]. JavaScript rewriting and API hooking is proposed in Reference [99] to counter anti-adblocker scripts.…”
Section: Ad Blocking and Anti-adblockingmentioning
confidence: 99%
“…Alternatively, the ad-blocker's adversaries may try to detect its presence, to display warnings or deny access to the user. A common strategy (used by 30% of publishers in the Alexa top-10k) adds fake ad-content (honeypots) to a page and uses JavaScript to check if the ads were blocked [95]. This practice leads to an orthogonal arms race on ad-block detection [57,58,60] (see Appendix A).…”
Section: Threat Model and Adversariesmentioning
confidence: 99%
“…Attack C4: Detection with adversarial honeypots. To detect adblocking, publishers can use honeypots that falsely trigger adblockers [95]. The false positives in Figures 5-6 are innocuous elements that are falsely classified as ads or ad-disclosures.…”
Section: Originalmentioning
confidence: 99%