Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance

@inproceedings{Arshad2016IdentifyingEA,
  title={Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance},
  author={Sajjad Arshad and Amin Kharraz and William K. Robertson},
  booktitle={RAID},
  year={2016}
}
Extensions provide useful additional functionality for web browsers, but are also an increasingly popular vector for attacks. Due to the high degree of privilege extensions can hold, extensions have been abused to inject advertisements into web pages that divert revenue from content publishers and potentially expose users to malware. Users are often unaware of such practices, believing the modifications to the page originate from publishers. Additionally, automated identification of unwanted… CONTINUE READING
1
Twitter Mention

Citations

Publications citing this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 41 REFERENCES

Ad Injection at Scale: Assessing Deceptive Advertisement Modifications

VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Unraveling the relationship between ad-injecting browser extensions and malvertising

  • Xinyu Xing, Wei Meng, +4 authors Wenke Lee
  • In International World Wide Web Conference (WWW),
  • 2015
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Google study exposes ”tangled web” of companies profiting from ad injection

  • Ginny Marvin
  • 2015
VIEW 1 EXCERPT

Trends and Lessons from Three Years Fighting Malicious Extensions

VIEW 2 EXCERPTS

Detecting malicious HTTP redirections using trees of user browsing activity

VIEW 1 EXCERPT

Hulk: Eliciting Malicious Behavior in Browser Extensions

VIEW 2 EXCERPTS