Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions

@inproceedings{Arshad2016IncludeMO,
  title={Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions},
  author={Sajjad Arshad and Amin Kharraz and William Robertson},
  booktitle={Financial Cryptography},
  year={2016}
}
Modern websites include various types of third-party content such as JavaScript, images, stylesheets, and Flash objects in order to create interactive user interfaces. In addition to explicit inclusion of third-party content by website publishers, ISPs and browser extensions are hijacking web browsing sessions with increasing frequency to inject third-party content (e.g., ads). However, third-party content can also introduce security risks to users of these websites, unbeknownst to both website… CONTINUE READING

Figures, Tables, and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 18 CITATIONS

Tracing Information Flows Between Ad Exchanges Using Retargeted Ads

VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND

Diffusion of User Tracking Data in the Online Advertising Ecosystem

VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Characterizing Pixel Tracking through the Lens of Disposable Email Services

VIEW 1 EXCERPT
CITES METHODS

Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild

VIEW 1 EXCERPT
CITES BACKGROUND

MalFilter: A Lightweight Real-Time Malicious URL Filtering System in Large-Scale Networks

  • Guolin Tan, Peng Zhang, +3 authors Li Guo
  • Computer Science
  • 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom)
  • 2018
VIEW 2 EXCERPTS
CITES METHODS & BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 36 REFERENCES

A Tutorial on Hidden Markov Models and Selected Applications

VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Ad Injection at Scale: Assessing Deceptive Advertisement Modifications

VIEW 3 EXCERPTS

Google study exposes ”tangled web” of companies profiting from ad injection

  • Ginny Marvin
  • 2015
VIEW 2 EXCERPTS

Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks

VIEW 1 EXCERPT

Trends and Lessons from Three Years Fighting Malicious Extensions

VIEW 2 EXCERPTS

Unraveling the relationship between ad-injecting browser extensions and malvertising

  • Xinyu Xing, Wei Meng, +4 authors Wenke Lee
  • In International World Wide Web Conference (WWW),
  • 2015
VIEW 3 EXCERPTS

Hulk: Eliciting Malicious Behavior in Browser Extensions

VIEW 1 EXCERPT