How Tracking Companies Circumvented Ad Blockers Using WebSockets

@inproceedings{Bashir2018HowTC,
  title={How Tracking Companies Circumvented Ad Blockers Using WebSockets},
  author={Muhammad Ahmad Bashir and Sajjad Arshad and Engin Kirda and William K. Robertson and Christo Wilson},
  booktitle={IMC '18},
  year={2018}
}
In this study of 100,000 websites, we document how Advertising and Analytics (A&A) companies have used WebSockets to bypass ad blocking, exfiltrate user tracking data, and deliver advertisements. Specifically, our measurements investigate how a long-standing bug in Chrome's (the world's most popular browser) chrome.webRequest API prevented blocking extensions from being able to interpose on WebSocket connections. We conducted large-scale crawls of top publishers before and after this bug was… CONTINUE READING
4
Twitter Mentions

Citations

Publications citing this paper.
SHOWING 1-10 OF 11 CITATIONS

Who's Tracking Sensitive Domains?

VIEW 2 EXCERPTS
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-6 OF 6 REFERENCES

ws-gateway websocket circumvention ? #1936

  • R. Hill
  • GitHub, Aug
  • 2016
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

The Web Never Forgets: Persistent Tracking Mechanisms in the Wild

VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Remote physical device fingerprinting

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL