Online advertising: Analysis of privacy threats and protection approaches

J Estrada-Jiménez, J Parra-Arnau… - Computer …, 2017 - Elsevier
Online advertising, the pillar of the “free” content on the Web, has revolutionized the
marketing business in recent years by creating a myriad of new opportunities for advertisers …

You are what you include: large-scale evaluation of remote javascript inclusions

N Nikiforakis, L Invernizzi, A Kapravelos… - Proceedings of the …, 2012 - dl.acm.org
JavaScript is used by web developers to enhance the interactivity of their sites, offload work
to the users' browsers and improve their sites' responsiveness and user-friendliness, making …

Addroid: Privilege separation for applications and advertisers in android

P Pearce, AP Felt, G Nunez, D Wagner - … of the 7th ACM Symposium on …, 2012 - dl.acm.org
Advertising is a critical part of the Android ecosystem---many applications use one or more
advertising services as a source of revenue. To use these services, developers must bundle …

Knowing your enemy: understanding and detecting malicious web advertising

Z Li, K Zhang, Y **e, F Yu, XF Wang - … of the 2012 ACM conference on …, 2012 - dl.acm.org
With the Internet becoming the dominant channel for marketing and promotion, online
advertisements are also increasingly used for illegal purposes such as propagating …

A study of security isolation techniques

R Shu, P Wang, SA Gorski III, B Andow… - ACM Computing …, 2016 - dl.acm.org
Security isolation is a foundation of computing systems that enables resilience to different
forms of attacks. This article seeks to understand existing security isolation techniques by …

The dark alleys of madison avenue: Understanding malicious advertisements

A Zarras, A Kapravelos, G Stringhini, T Holz… - Proceedings of the …, 2014 - dl.acm.org
Online advertising drives the economy of the World Wide Web. Modern websites of any size
and popularity include advertisements to monetize visits from their users. To this end, they …

FlowFox: a web browser with flexible and precise information flow control

W De Groef, D Devriese, N Nikiforakis… - Proceedings of the 2012 …, 2012 - dl.acm.org
We present FlowFox, the first fully functional web browser that implements a precise and
general information flow control mechanism for web scripts based on the technique of …

[PDF][PDF] What Mobile Ads Know About Mobile Users.

S Son, D Kim, V Shmatikov - ndss, 2016 - ndss-symposium.org
We analyze the software stack of popular mobile advertising libraries on Android and
investigate how they protect the users of advertising-supported apps from malicious …

Containing malicious package updates in npm with a lightweight permission system

G Ferreira, L Jia, J Sunshine… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
The large amount of third-party packages available in fast-moving software ecosystems,
such as Node. js/npm, enables attackers to compromise applications by pushing malicious …

JSand: complete client-side sandboxing of third-party JavaScript without browser modifications

P Agten, S Van Acker, Y Brondsema… - Proceedings of the 28th …, 2012 - dl.acm.org
The inclusion of third-party scripts in web pages is a common practice. A recent study has
shown that more than half of the Alexa top 10000 sites include scripts from more than 5 …