In this study of 100,000 websites, we document how Advertising and Analytics (A&A) companies have used WebSockets to bypass ad blocking, exfiltrate user tracking data, and deliver advertisements. Specifically, our measurements investigate how a long-standing bug in Chrome's (the world's most popular browser) chrome.webRequest API prevented blocking extensions from being able to interpose on WebSocket connections. We conducted large-scale crawls of top publishers before and after this bug was patched in April 2017 to examine which A&A companies were using WebSockets, what information was being transferred, and whether companies altered their behavior after the patch. We find that a small but persistent group of A&A companies use WebSockets, and that several of them engaged in troubling behavior, such as browser fingerprinting, exfiltrating the DOM, and serving advertisements, that would have circumvented blocking due to the Chrome bug.
CITATION STYLE
Bashir, M. A., Arshad, S., Kirda, E., Robertson, W., & Wilson, C. (2018). How tracking companies circumvented ad blockers using websockets. In Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC (pp. 471–477). Association for Computing Machinery. https://doi.org/10.1145/3278532.3278573
Mendeley helps you to discover research relevant for your work.