theme image
Ad injection at scale: assessing deceptive advertisement modifications Ad injection at scale: assessing deceptive advertisement modifications
  1. publications
  2. anti-abuse

Ad injection at scale: assessing deceptive advertisement modifications

Available Media

Publication (Pdf)

Conference Security and Privacy
Authors Kurt Thomas , Elie Bursztein , Chris Grier ,
Award Distinguished Practical Paper Award
Citation

Bibtex Citation

@inproceedings{ THOMAS2015AD,title = {Ad injection at scale: assessing deceptive advertisement modifications},author = {"Kurt, Thomas" and "Elie, Bursztein" and "Chris, Grier" and "Grant, Ho" and "Nav, Jagpal" and "Alexandros, Kapravelos" and "Damon, McCoy" and "Antonio, Nappa" and "Vern, Paxson" and "Paul, Pearce" and "Niels, Provos" and "Moheeb, Abu Rajab"},booktitle = {Security and Privacy},year = {2015},organization = {IEEE}}

Today, web injection manifests in many forms, but fundamentally occurs when malicious and unwanted actors tamper directly with browser sessions for their own profit. In this work we illuminate the scope and negative impact of one of these forms, ad injection, in which users have ads imposed on them in addition to, or different from, those that websites originally sent them. We develop a multi-staged pipeline that identifies ad injection in the wild and captures its distribution and revenue chains. We find that ad injection has entrenched itself as a cross-browser monetization platform impacting more than 5% of unique daily IP addresses accessing Googletens of millions of users around the globe. Injected ads arrive on a clients machine through multiple vectors: our measurements identify 50,870 Chrome extensions and 34,407 Windows binaries, 38% and 17% of which are explicitly malicious. A small number of software developers support the vast majority of these injectors who in turn syndicate from the larger ad ecosystem. We have contacted the Chrome Web Store and the advertisers targeted by ad injectors to alert each of the deceptive practices involved.

Related

newsletter signup slide

Get cutting edge research directly in your inbox.

newsletter signup slide

Get cutting edge research directly in your inbox.