(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–43 of 43 results for author: Shafiq, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11856  [pdf

    cs.CY

    Google's Chrome Antitrust Paradox

    Authors: Shaoor Munir, Konrad Kollnig, Anastasia Shuba, Zubair Shafiq

    Abstract: This article delves into Google's dominance of the browser market, highlighting how Google's Chrome browser is playing a critical role in asserting Google's dominance in other markets. While Google perpetuates the perception that Google Chrome is a neutral platform built on open-source technologies, we argue that Chrome is instrumental in Google's strategy to reinforce its dominance in online adve… ▽ More

    Submitted 26 June, 2024; v1 submitted 4 April, 2024; originally announced June 2024.

  2. arXiv:2406.07647  [pdf, other

    cs.CR

    FP-Inconsistent: Detecting Evasive Bots using Browser Fingerprint Inconsistencies

    Authors: Hari Venugopalan, Shaoor Munir, Shuaib Ahmed, Tangbaihe Wang, Samuel T. King, Zubair Shafiq

    Abstract: As browser fingerprinting is increasingly being used for bot detection, bots have started altering their fingerprints for evasion. We conduct the first large-scale evaluation of evasive bots to investigate whether and how altering fingerprints helps bots evade detection. To systematically investigate evasive bots, we deploy a honey site incorporating two anti-bot services (DataDome and BotD) and s… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  3. arXiv:2406.06958  [pdf, other

    cs.CR cs.CY cs.MA cs.NI cs.SI

    Turning the Tide on Dark Pools? Towards Multi-Stakeholder Vulnerability Notifications in the Ad-Tech Supply Chain

    Authors: Yash Vekaria, Rishab Nithyanand, Zubair Shafiq

    Abstract: Online advertising relies on a complex and opaque supply chain that involves multiple stakeholders, including advertisers, publishers, and ad-networks, each with distinct and sometimes conflicting incentives. Recent research has demonstrated the existence of ad-tech supply chain vulnerabilities such as dark pooling, where low-quality publishers bundle their ad inventory with higher-quality ones to… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

    ACM Class: K.4.1; K.4.3; K.4.4; D.2.0; D.2.4; G.3; H.3.7; K.1; K.6.1; K.6.5

  4. arXiv:2406.05310  [pdf, other

    cs.CR

    COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar

    Authors: Pouneh Nikkhah Bahrami, Aurore Fass, Zubair Shafiq

    Abstract: As third-party cookies are going away, first-party cookies are increasingly being used for tracking. Prior research has shown that third-party scripts write (or \textit{ghost-write}) first-party cookies in the browser's cookie jar because they are included in the website's main frame. What is more is that a third-party script is able to access all first-party cookies, both the actual first-party c… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  5. arXiv:2405.18385  [pdf, other

    cs.CR

    Blocking Tracking JavaScript at the Function Granularity

    Authors: Abdul Haddi Amjad, Shaoor Munir, Zubair Shafiq, Muhammad Ali Gulzar

    Abstract: Modern websites extensively rely on JavaScript to implement both functionality and tracking. Existing privacy enhancing content blocking tools struggle against mixed scripts, which simultaneously implement both functionality and tracking, because blocking the script would break functionality and not blocking it would allow tracking. We propose Not.js, a fine grained JavaScript blocking tool that o… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  6. arXiv:2309.12591  [pdf, other

    cs.CY cs.CR cs.HC cs.SI

    Before Blue Birds Became X-tinct: Understanding the Effect of Regime Change on Twitter's Advertising and Compliance of Advertising Policies

    Authors: Yash Vekaria, Zubair Shafiq, Savvas Zannettou

    Abstract: Social media platforms, including Twitter (now X), have policies in place to maintain a safe and trustworthy advertising environment. However, the extent to which these policies are adhered to and enforced remains a subject of interest and concern. We present the first large-scale audit of advertising on Twitter focusing on compliance with the platform's advertising policies, particularly those re… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

    ACM Class: K.4.1; K.4.2; K.4.3

  7. arXiv:2308.08160  [pdf, other

    cs.LG

    Benchmarking Adversarial Robustness of Compressed Deep Learning Models

    Authors: Brijesh Vora, Kartik Patwari, Syed Mahbub Hafiz, Zubair Shafiq, Chen-Nee Chuah

    Abstract: The increasing size of Deep Neural Networks (DNNs) poses a pressing need for model compression, particularly when employed on resource constrained devices. Concurrently, the susceptibility of DNNs to adversarial attacks presents another significant hurdle. Despite substantial research on both model compression and adversarial robustness, their joint examination remains underexplored. Our study bri… ▽ More

    Submitted 16 August, 2023; originally announced August 2023.

  8. arXiv:2308.03417  [pdf, other

    cs.CR cs.LG

    PURL: Safe and Effective Sanitization of Link Decoration

    Authors: Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby

    Abstract: While privacy-focused browsers have taken steps to block third-party cookies and mitigate browser fingerprinting, novel tracking techniques that can bypass existing countermeasures continue to emerge. Since trackers need to share information from the client-side to the server-side through link decoration regardless of the tracking technique they employ, a promising orthogonal approach is to detect… ▽ More

    Submitted 6 March, 2024; v1 submitted 7 August, 2023; originally announced August 2023.

  9. arXiv:2307.00143  [pdf, other

    cs.CR

    Centauri: Practical Rowhammer Fingerprinting

    Authors: Hari Venugopalan, Kaustav Goswami, Zainul Abi Din, Jason Lowe-Power, Samuel T. King, Zubair Shafiq

    Abstract: Fingerprinters leverage the heterogeneity in hardware and software configurations to extract a device fingerprint. Fingerprinting countermeasures attempt to normalize these attributes such that they present a uniform fingerprint across different devices or present different fingerprints for the same device each time. We present Centauri, a Rowhammer fingerprinting approach that can build a unique… ▽ More

    Submitted 30 June, 2023; originally announced July 2023.

  10. arXiv:2302.01182  [pdf, other

    cs.CR cs.SE

    Blocking JavaScript without Breaking the Web: An Empirical Investigation

    Authors: Abdul Haddi Amjad, Zubair Shafiq, Muhammad Ali Gulzar

    Abstract: Modern websites heavily rely on JavaScript (JS) to implement legitimate functionality as well as privacy-invasive advertising and tracking. Browser extensions such as NoScript block any script not loaded by a trusted list of endpoints, thus hoping to block privacy-invasive scripts while avoiding breaking legitimate website functionality. In this paper, we investigate whether blocking JS on the web… ▽ More

    Submitted 23 March, 2023; v1 submitted 2 February, 2023; originally announced February 2023.

    Journal ref: petsymposium 2023

  11. arXiv:2210.08136  [pdf, other

    cs.CR

    A Utility-Preserving Obfuscation Approach for YouTube Recommendations

    Authors: Jiang Zhang, Hadi Askari, Konstantinos Psounis, Zubair Shafiq

    Abstract: Online content platforms optimize engagement by providing personalized recommendations to their users. These recommendation systems track and profile users to predict relevant content a user is likely interested in. While the personalized recommendations provide utility to users, the tracking and profiling that enables them poses a privacy issue because the platform might infer potentially sensiti… ▽ More

    Submitted 16 June, 2023; v1 submitted 14 October, 2022; originally announced October 2022.

  12. arXiv:2210.06654  [pdf, other

    cs.CR cs.CY cs.NI cs.SI

    The Inventory is Dark and Full of Misinformation: Understanding the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain

    Authors: Yash Vekaria, Rishab Nithyanand, Zubair Shafiq

    Abstract: Ad-tech enables publishers to programmatically sell their ad inventory to millions of demand partners through a complex supply chain. Bogus or low quality publishers can exploit the opaque nature of the ad-tech to deceptively monetize their ad inventory. In this paper, we investigate for the first time how misinformation sites subvert the ad-tech transparency standards and pool their ad inventory… ▽ More

    Submitted 14 October, 2023; v1 submitted 12 October, 2022; originally announced October 2022.

    Comments: To appear at IEEE Symposium on Security & Privacy (Oakland) 2024

  13. arXiv:2208.12370  [pdf, other

    cs.CR

    COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies

    Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso

    Abstract: As third-party cookie blocking is becoming the norm in browsers, advertisers and trackers have started to use first-party cookies for tracking. We conduct a differential measurement study on 10K websites with third-party cookies allowed and blocked. This study reveals that first-party cookies are used to store and exfiltrate identifiers to known trackers even when third-party cookies are blocked.… ▽ More

    Submitted 27 November, 2023; v1 submitted 25 August, 2022; originally announced August 2022.

  14. arXiv:2206.13599  [pdf, other

    cs.CR

    Nowhere to Hide: Detecting Obfuscated Fingerprinting Scripts

    Authors: Ray Ngan, Surya Konkimalla, Zubair Shafiq

    Abstract: As the web moves away from stateful tracking, browser fingerprinting is becoming more prevalent. Unfortunately, existing approaches to detect browser fingerprinting do not take into account potential evasion tactics such as code obfuscation. To address this gap, we investigate the robustness of a state-of-the-art fingerprinting detection approach against various off-the-shelf obfuscation tools. Ov… ▽ More

    Submitted 27 June, 2022; originally announced June 2022.

  15. arXiv:2206.04803  [pdf, other

    cs.CR cs.DC cs.LG

    Detecting Anomalous Cryptocurrency Transactions: an AML/CFT Application of Machine Learning-based Forensics

    Authors: Nadia Pocher, Mirko Zichichi, Fabio Merizzi, Muhammad Zohaib Shafiq, Stefano Ferretti

    Abstract: In shaping the Internet of Money, the application of blockchain and distributed ledger technologies (DLTs) to the financial sector triggered regulatory concerns. Notably, while the user anonymity enabled in this field may safeguard privacy and data protection, the lack of identifiability hinders accountability and challenges the fight against money laundering and the financing of terrorism and pro… ▽ More

    Submitted 18 March, 2023; v1 submitted 7 June, 2022; originally announced June 2022.

  16. Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker Ecosystem

    Authors: Umar Iqbal, Pouneh Nikkhah Bahrami, Rahmadi Trimananda, Hao Cui, Alexander Gamero-Garrido, Daniel Dubois, David Choffnes, Athina Markopoulou, Franziska Roesner, Zubair Shafiq

    Abstract: Smart speakers collect voice commands, which can be used to infer sensitive information about users. Given the potential for privacy harms, there is a need for greater transparency and control over the data collected, used, and shared by smart speaker platforms as well as third party skills supported on them. To bridge this gap, we build a framework to measure data collection, usage, and sharing b… ▽ More

    Submitted 13 October, 2023; v1 submitted 22 April, 2022; originally announced April 2022.

    Comments: Published at the ACM Internet Measurement Conference 2023

  17. arXiv:2203.11849  [pdf, other

    cs.CL cs.CR cs.LG

    A Girl Has A Name, And It's ... Adversarial Authorship Attribution for Deobfuscation

    Authors: Wanyue Zhai, Jonathan Rusert, Zubair Shafiq, Padmini Srinivasan

    Abstract: Recent advances in natural language processing have enabled powerful privacy-invasive authorship attribution. To counter authorship attribution, researchers have proposed a variety of rule-based and learning-based text obfuscation approaches. However, existing authorship obfuscation approaches do not consider the adversarial threat model. Specifically, they are not evaluated against adversarially… ▽ More

    Submitted 22 March, 2022; originally announced March 2022.

    Comments: 9 pages, 7 figures, 3 tables, ACL 2022

  18. arXiv:2203.11331  [pdf, other

    cs.CL cs.LG

    On The Robustness of Offensive Language Classifiers

    Authors: Jonathan Rusert, Zubair Shafiq, Padmini Srinivasan

    Abstract: Social media platforms are deploying machine learning based offensive language classification systems to combat hateful, racist, and other forms of offensive speech at scale. However, despite their real-world deployment, we do not yet comprehensively understand the extent to which offensive language classifiers are robust against adversarial attacks. Prior work in this space is limited to studying… ▽ More

    Submitted 21 March, 2022; originally announced March 2022.

    Comments: 9 pages, 2 figures, Accepted at ACL 2022

    ACM Class: I.2.7

  19. arXiv:2203.10666  [pdf, other

    cs.CY

    YouTube, The Great Radicalizer? Auditing and Mitigating Ideological Biases in YouTube Recommendations

    Authors: Muhammad Haroon, Anshuman Chhabra, Xin Liu, Prasant Mohapatra, Zubair Shafiq, Magdalena Wojcieszak

    Abstract: Recommendations algorithms of social media platforms are often criticized for placing users in "rabbit holes" of (increasingly) ideologically biased content. Despite these concerns, prior evidence on this algorithmic radicalization is inconsistent. Furthermore, prior work lacks systematic interventions that reduce the potential ideological bias in recommendation algorithms. We conduct a systematic… ▽ More

    Submitted 24 March, 2022; v1 submitted 20 March, 2022; originally announced March 2022.

  20. arXiv:2202.12872  [pdf, other

    cs.LG cs.NI

    AutoFR: Automated Filter Rule Generation for Adblocking

    Authors: Hieu Le, Salma Elmalaki, Athina Markopoulou, Zubair Shafiq

    Abstract: Adblocking relies on filter lists, which are manually curated and maintained by a community of filter list authors. Filter list curation is a laborious process that does not scale well to a large number of sites or over time. In this paper, we introduce AutoFR, a reinforcement learning framework to fully automate the process of filter rule creation and evaluation for sites of interest. We design a… ▽ More

    Submitted 7 March, 2023; v1 submitted 25 February, 2022; originally announced February 2022.

    Comments: 16 pages with 13 figures, 3 tables, 1 algorithm. 3.5 pages of references. Appendices include 10 pages of appendices with 11 figures and 3 tables

  21. arXiv:2112.01662  [pdf, other

    cs.CR

    FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting

    Authors: Pouneh Nikkhah Bahrami, Umar Iqbal, Zubair Shafiq

    Abstract: Browser fingerprinting is a stateless tracking technique that attempts to combine information exposed by multiple different web APIs to create a unique identifier for tracking users across the web. Over the last decade, trackers have abused several existing and newly proposed web APIs to further enhance the browser fingerprint. Existing approaches are limited to detecting a specific fingerprinting… ▽ More

    Submitted 14 December, 2021; v1 submitted 2 December, 2021; originally announced December 2021.

    Journal ref: Proceedings on Privacy Enhancing Technologies (2022)

  22. HARPO: Learning to Subvert Online Behavioral Advertising

    Authors: Jiang Zhang, Konstantinos Psounis, Muhammad Haroon, Zubair Shafiq

    Abstract: Online behavioral advertising, and the associated tracking paraphernalia, poses a real privacy threat. Unfortunately, existing privacy-enhancing tools are not always effective against online advertising and tracking. We propose Harpo, a principled learning-based approach to subvert online behavioral advertising through obfuscation. Harpo uses reinforcement learning to adaptively interleave real pa… ▽ More

    Submitted 23 November, 2021; v1 submitted 8 November, 2021; originally announced November 2021.

    Comments: Accepted at NDSS'22

  23. arXiv:2109.07028  [pdf, other

    cs.LG cs.CR

    Avengers Ensemble! Improving Transferability of Authorship Obfuscation

    Authors: Muhammad Haroon, Fareed Zaffar, Padmini Srinivasan, Zubair Shafiq

    Abstract: Stylometric approaches have been shown to be quite effective for real-world authorship attribution. To mitigate the privacy threat posed by authorship attribution, researchers have proposed automated authorship obfuscation approaches that aim to conceal the stylometric artefacts that give away the identity of an anonymous document's author. Recent work has focused on authorship obfuscation approac… ▽ More

    Submitted 8 October, 2021; v1 submitted 14 September, 2021; originally announced September 2021.

    Comments: Submitted to PETS 2021

  24. arXiv:2108.13923  [pdf, other

    cs.NI

    TrackerSift: Untangling Mixed Tracking and Functional Web Resources

    Authors: Abdul Haddi Amjad, Danial Saleem, Fareed Zaffar, Muhammad Ali Gulzar, Zubair Shafiq

    Abstract: Trackers have recently started to mix tracking and functional resources to circumvent privacy-enhancing content blocking tools. Such mixed web resources put content blockers in a bind: risk breaking legitimate functionality if they act and risk missing privacy-invasive advertising and tracking if they do not. In this paper, we propose TrackerSift to progressively classify and untangle mixed web re… ▽ More

    Submitted 29 September, 2021; v1 submitted 28 August, 2021; originally announced August 2021.

  25. arXiv:2107.11309  [pdf, other

    cs.CR

    WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking

    Authors: Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso

    Abstract: Millions of web users directly depend on ad and tracker blocking tools to protect their privacy. However, existing ad and tracker blockers fall short because of their reliance on trivially susceptible advertising and tracking content. In this paper, we first demonstrate that the state-of-the-art machine learning based ad and tracker blockers, such as AdGraph, are susceptible to adversarial evasion… ▽ More

    Submitted 17 August, 2021; v1 submitted 23 July, 2021; originally announced July 2021.

  26. arXiv:2106.01703  [pdf, other

    cs.CL cs.AI cs.LG

    Fingerprinting Fine-tuned Language Models in the Wild

    Authors: Nirav Diwan, Tanmoy Chakravorty, Zubair Shafiq

    Abstract: There are concerns that the ability of language models (LMs) to generate high quality synthetic text can be misused to launch spam, disinformation, or propaganda. Therefore, the research community is actively working on developing approaches to detect whether a given text is organic or synthetic. While this is a useful first step, it is important to be able to further fingerprint the author LM to… ▽ More

    Submitted 3 June, 2021; originally announced June 2021.

  27. Accuracy-Privacy Trade-off in Deep Ensemble: A Membership Inference Perspective

    Authors: Shahbaz Rezaei, Zubair Shafiq, Xin Liu

    Abstract: Deep ensemble learning has been shown to improve accuracy by training multiple neural networks and averaging their outputs. Ensemble learning has also been suggested to defend against membership inference attacks that undermine privacy. In this paper, we empirically demonstrate a trade-off between these two goals, namely accuracy and privacy (in terms of membership inference attacks), in deep ense… ▽ More

    Submitted 5 December, 2022; v1 submitted 11 May, 2021; originally announced May 2021.

  28. arXiv:2102.04217  [pdf, other

    cs.CY

    Understanding Underground Incentivized Review Services

    Authors: Rajvardhan Oak, Zubair Shafiq

    Abstract: While human factors in fraud have been studied by the HCI and security communities, most research has been directed to understanding either the victims' perspectives or prevention strategies, and not on fraudsters, their motivations and operation techniques. Additionally, the focus has been on a narrow set of problems: phishing, spam and bullying. In this work, we seek to understand review fraud o… ▽ More

    Submitted 14 February, 2024; v1 submitted 20 January, 2021; originally announced February 2021.

    Comments: This work has been accepted for presentation at CHI 2024

    ACM Class: K.4.4

  29. Understanding Incentivized Mobile App Installs on Google Play Store

    Authors: Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez

    Abstract: "Incentivized" advertising platforms allow mobile app developers to acquire new users by directly paying users to install and engage with mobile apps (e.g., create an account, make in-app purchases). Incentivized installs are banned by the Apple App Store and discouraged by the Google Play Store because they can manipulate app store metrics (e.g., install counts, appearance in top charts). Yet, ma… ▽ More

    Submitted 4 October, 2020; originally announced October 2020.

    Journal ref: ACM Internet Measurement Conference (2020)

  30. arXiv:2008.04480  [pdf, other

    cs.CR

    Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors

    Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq

    Abstract: Browser fingerprinting is an invasive and opaque stateless tracking technique. Browser vendors, academics, and standards bodies have long struggled to provide meaningful protections against browser fingerprinting that are both accurate and do not degrade user experience. We propose FP-Inspector, a machine learning based syntactic-semantic approach to accurately detect browser fingerprinting. We sh… ▽ More

    Submitted 10 August, 2020; originally announced August 2020.

    Comments: To appear in the Proceedings of the IEEE Symposium on Security & Privacy 2021

  31. arXiv:2006.15794  [pdf, other

    cs.CY cs.SI

    CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks

    Authors: Shehroze Farooqi, Maaz Musa, Zubair Shafiq, Fareed Zaffar

    Abstract: Online social networks support a vibrant ecosystem of third-party apps that get access to personal information of a large number of users. Despite several recent high-profile incidents, methods to systematically detect data misuse by third-party apps on online social networks are lacking. We propose CanaryTrap to detect misuse of data shared with third-party apps. CanaryTrap associates a honeytoke… ▽ More

    Submitted 28 June, 2020; originally announced June 2020.

  32. arXiv:2005.00702  [pdf, other

    cs.CL cs.IR cs.LG

    A Girl Has A Name: Detecting Authorship Obfuscation

    Authors: Asad Mahmood, Zubair Shafiq, Padmini Srinivasan

    Abstract: Authorship attribution aims to identify the author of a text based on the stylometric analysis. Authorship obfuscation, on the other hand, aims to protect against authorship attribution by modifying a text's style. In this paper, we evaluate the stealthiness of state-of-the-art authorship obfuscation methods under an adversarial threat model. An obfuscator is stealthy to the extent an adversary fi… ▽ More

    Submitted 2 May, 2020; originally announced May 2020.

    Comments: 9 pages, 4 figures, 2 tables, ACL 2020

  33. arXiv:2001.10999  [pdf, other

    cs.CR cs.LG

    A4 : Evading Learning-based Adblockers

    Authors: Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq

    Abstract: Efforts by online ad publishers to circumvent traditional ad blockers towards regaining fiduciary benefits, have been demonstrably successful. As a result, there have recently emerged a set of adblockers that apply machine learning instead of manually curated rules and have been shown to be more robust in blocking ads on websites including social media sites such as Facebook. Among these, AdGraph… ▽ More

    Submitted 29 January, 2020; originally announced January 2020.

    Comments: 10 pages, 7 figures

  34. arXiv:2001.08288  [pdf, ps, other

    cs.NI

    Characterizing Smart Home IoT Traffic in the Wild

    Authors: M. Hammad Mazhar, Zubair Shafiq

    Abstract: As the smart home IoT ecosystem flourishes, it is imperative to gain a better understanding of the unique challenges it poses in terms of management, security, and privacy. Prior studies are limited because they examine smart home IoT devices in testbed environments or at a small scale. To address this gap, we present a measurement study of smart home IoT devices in the wild by instrumenting home… ▽ More

    Submitted 30 March, 2020; v1 submitted 22 January, 2020; originally announced January 2020.

    Comments: 13 pages, to be published in IoTDI 2020

  35. arXiv:1911.03447  [pdf, other

    cs.NI

    The TV is Smart and Full of Trackers: Towards Understanding the Smart TV Advertising and Tracking Ecosystem

    Authors: Janus Varmarken, Hieu Le, Anastasia Shuba, Zubair Shafiq, Athina Markopoulou

    Abstract: Motivated by the growing popularity of smart TVs, we present a large-scale measurement study of smart TVs by collecting and analyzing their network traffic from two different vantage points. First, we analyze aggregate network traffic of smart TVs in-the-wild, collected from residential gateways of tens of homes and several different smart TV platforms, including Apple, Samsung, Roku, and Chromeca… ▽ More

    Submitted 8 November, 2019; originally announced November 2019.

  36. Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding

    Authors: John Cook, Rishab Nithyanand, Zubair Shafiq

    Abstract: Online advertising relies on trackers and data brokers to show targeted ads to users. To improve targeting, different entities in the intricately interwoven online advertising and tracking ecosystems are incentivized to share information with each other through client-side or server-side mechanisms. Inferring data sharing between entities, especially when it happens at the server-side, is an impor… ▽ More

    Submitted 20 September, 2019; v1 submitted 16 July, 2019; originally announced July 2019.

    Comments: 18 pages, 2 figures, Privacy Enhancing Technologies Symposium (2020)

    ACM Class: H.3.5

  37. arXiv:1805.09155  [pdf, other

    cs.CY cs.LG

    AdGraph: A Graph-Based Approach to Ad and Tracker Blocking

    Authors: Umar Iqbal, Peter Snyder, Shitong Zhu, Benjamin Livshits, Zhiyun Qian, Zubair Shafiq

    Abstract: User demand for blocking advertising and tracking online is large and growing. Existing tools, both deployed and described in research, have proven useful, but lack either the completeness or robustness needed for a general solution. Existing detection approaches generally focus on only one aspect of advertising or tracking (e.g. URL patterns, code structure), making existing approaches susceptibl… ▽ More

    Submitted 30 May, 2019; v1 submitted 21 May, 2018; originally announced May 2018.

    Comments: To appear in the Proceedings of the IEEE Symposium on Security & Privacy, May 2020

  38. arXiv:1707.00190  [pdf, other

    cs.CR cs.SI

    Measuring, Characterizing, and Detecting Facebook Like Farms

    Authors: Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Dali Kaafar, M. Zubair Shafiq

    Abstract: Social networks offer convenient ways to seamlessly reach out to large audiences. In particular, Facebook pages are increasingly used by businesses, brands, and organizations to connect with multitudes of users worldwide. As the number of likes of a page has become a de-facto measure of its popularity and profitability, an underground market of services artificially inflating page likes, aka like… ▽ More

    Submitted 4 July, 2017; v1 submitted 1 July, 2017; originally announced July 2017.

    Comments: To appear in ACM Transactions on Privacy and Security (TOPS)

  39. arXiv:1605.05841  [pdf, other

    cs.CR cs.CY

    A First Look at Ad-block Detection: A New Arms Race on the Web

    Authors: Muhammad Haris Mughees, Zhiyun Qian, Zubair Shafiq, Karishma Dash, Pan Hui

    Abstract: The rise of ad-blockers is viewed as an economic threat by online publishers, especially those who primarily rely on ad- vertising to support their services. To address this threat, publishers have started retaliating by employing ad-block detectors, which scout for ad-blocker users and react to them by restricting their content access and pushing them to whitelist the website or disabling ad-bloc… ▽ More

    Submitted 19 May, 2016; originally announced May 2016.

    Comments: 12 pages, 12 figures

  40. arXiv:1506.00506  [pdf, other

    cs.SI cs.CR

    Combating Fraud in Online Social Networks: Detecting Stealthy Facebook Like Farms

    Authors: Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohammad Ali Kaafar, M. Zubair Shafiq

    Abstract: As businesses increasingly rely on social networking sites to engage with their customers, it is crucial to understand and counter reputation manipulation activities, including fraudulently boosting the number of Facebook page likes using like farms. To this end, several fraud detection algorithms have been proposed and some deployed by Facebook that use graph co-clustering to distinguish between… ▽ More

    Submitted 9 May, 2016; v1 submitted 1 June, 2015; originally announced June 2015.

  41. arXiv:1505.01637  [pdf, other

    cs.CY cs.CR

    Characterizing Key Stakeholders in an Online Black-Hat Marketplace

    Authors: Shehroze Farooqi, Muhammad Ikram, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, M. Zubair Shafiq, Fareed Zaffar

    Abstract: Over the past few years, many black-hat marketplaces have emerged that facilitate access to reputation manipulation services such as fake Facebook likes, fraudulent search engine optimization (SEO), or bogus Amazon reviews. In order to deploy effective technical and legal countermeasures, it is important to understand how these black-hat marketplaces operate, shedding light on the services they of… ▽ More

    Submitted 4 April, 2017; v1 submitted 7 May, 2015; originally announced May 2015.

    Comments: 12th IEEE/APWG Symposium on Electronic Crime Research (eCrime 2017)

  42. arXiv:1409.2097  [pdf, other

    cs.SI cs.CR physics.soc-ph

    Paying for Likes? Understanding Facebook Like Fraud Using Honeypots

    Authors: Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, M. Zubair Shafiq

    Abstract: Facebook pages offer an easy way to reach out to a very large audience as they can easily be promoted using Facebook's advertising platform. Recently, the number of likes of a Facebook page has become a measure of its popularity and profitability, and an underground market of services boosting page likes, aka like farms, has emerged. Some reports have suggested that like farms use a network of pro… ▽ More

    Submitted 4 October, 2014; v1 submitted 7 September, 2014; originally announced September 2014.

    Comments: To appear in IMC 2014

  43. arXiv:1302.2376  [pdf, other

    cs.SI physics.soc-ph

    Modeling Morphology of Social Network Cascades

    Authors: M. Zubair Shafiq, Alex X. Liu

    Abstract: Cascades represent an important phenomenon across various disciplines such as sociology, economy, psychology, political science, marketing, and epidemiology. An important property of cascades is their morphology, which encompasses the structure, shape, and size. However, cascade morphology has not been rigorously characterized and modeled in prior literature. In this paper, we propose a Multi-orde… ▽ More

    Submitted 10 February, 2013; originally announced February 2013.

    Comments: 12 pages, technical report