Online tracking: A 1-million-site measurement and analysis

S Englehardt, A Narayanan - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
We present the largest and most detailed measurement of online tracking conducted to date,
based on a crawl of the top 1 million websites. We make 15 types of measurements on each …

Minesweeper: An in-depth look into drive-by cryptocurrency mining and its defense

RK Konoth, E Vineti, V Moonsamy, M Lindorfer… - Proceedings of the …, 2018 - dl.acm.org
A wave of alternative coins that can be effectively mined without specialized hardware, and
a surge in cryptocurrencies' market value has led to the development of cryptocurrency …

How you get shot in the back: A systematical study about cryptojacking in the real world

G Hong, Z Yang, S Yang, L Zhang, Y Nan… - Proceedings of the …, 2018 - dl.acm.org
As a new mechanism to monetize web content, cryptocurrency mining is becoming
increasingly popular. The idea is simple: a webpage delivers extra workload (JavaScript) …

In-depth survey of digital advertising technologies

G Chen, JH Cox, AS Uluagac… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Some of the world's most well-known IT companies are in fact advertising companies
deriving their primary revenues through digital advertising. For this reason, these IT giants …

Annoyed users: Ads and ad-block usage in the wild

E Pujol, O Hohlfeld, A Feldmann - Proceedings of the 2015 Internet …, 2015 - dl.acm.org
Content and services which are offered for free on the Internet are primarily monetized
through online advertisement. This business model relies on the implicit agreement between …

Outguard: Detecting in-browser covert cryptocurrency mining in the wild

A Kharraz, Z Ma, P Murley, C Lever, J Mason… - The World Wide Web …, 2019 - dl.acm.org
In-browser cryptojacking is a form of resource abuse that leverages end-users' machines to
mine cryptocurrency without obtaining the users' consent. In this paper, we design …

Tracing information flows between ad exchanges using retargeted ads

MA Bashir, S Arshad, W Robertson… - 25th USENIX Security …, 2016 - usenix.org
Numerous surveys have shown that Web users are concerned about the loss of privacy
associated with online tracking. Alarmingly, these surveys also reveal that people are also …

What makes a “bad” ad? user perceptions of problematic online advertising

E Zeng, T Kohno, F Roesner - Proceedings of the 2021 CHI Conference …, 2021 - dl.acm.org
Online display advertising on websites is widely disliked by users, with many turning to ad
blockers to avoid “bad” ads. Recent evidence suggests that today's ads contain potentially …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Understanding malvertising through ad-injecting browser extensions

X Xing, W Meng, B Lee, U Weinsberg, A Sheth… - Proceedings of the 24th …, 2015 - dl.acm.org
Malvertising is a malicious activity that leverages advertising to distribute various forms of
malware. Because advertising is the key revenue generator for numerous Internet …