The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad Fraud

5Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.

Abstract

Mobile ad fraud is a significant threat that victimizes app publishers and their users, thereby undermining the ecosystem of app markets. Prior works on detecting mobile ad fraud have focused on constructing predefined test scenarios that preclude user involvement in identifying ad fraud. However, due to their dependence on contextual testing environments, these works have neglected to track which app modules and which user interactions are responsible for observed ad fraud. To address these shortcomings, this paper presents the design and implementation of FraudDetective, a dynamic testing framework that identifies ad fraud activities. FraudDetective focuses on identifying fraudulent activities that originate without any user interactions. FraudDetective computes a full stack trace from an observed ad fraud activity to a user event by connecting fragmented multiple stack traces, thus generating the causal relationships between user inputs and the observed fraudulent activity. We revised an Android Open Source Project (AOSP) to emit detected ad fraud activities along with their full stack traces, which help pinpoint the app modules responsible for the observed fraud activities. We evaluate FraudDetective on 48, 172 apps from Google Play Store. FraudDetective reports that 74 apps are responsible for 34, 453 ad fraud activities and find that 98.6% of the fraudulent behaviors originate from embedded third-party ad libraries. Our evaluation demonstrates that FraudDetective is capable of accurately identifying ad fraud via reasoning based on observed suspicious behaviors without user interactions. The experimental results also yield the new insight that abusive ad service providers harness their ad libraries to actively engage in committing ad fraud.

References Powered by Scopus

Unsafe exposure analysis of mobile in-app advertisements

379Citations
N/AReaders
Get full text

A survey of botnet and botnet detection

313Citations
N/AReaders
Get full text

Reliable third-party library detection in Android and its security applications

266Citations
N/AReaders
Get full text

Cited by Powered by Scopus

F2DC: Android malware classification based on raw traffic and neural networks

5Citations
N/AReaders
Get full text

ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications

1Citations
N/AReaders
Get full text

Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Kim, J., Park, J. H., & Son, S. (2021). The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad Fraud. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021. The Internet Society. https://doi.org/10.14722/ndss.2021.23161

Readers over time

‘21‘22‘23‘24‘25036912

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 8

67%

Researcher 2

17%

Professor / Associate Prof. 1

8%

Lecturer / Post doc 1

8%

Readers' Discipline

Tooltip

Computer Science 15

94%

Engineering 1

6%

Save time finding and organizing research with Mendeley

Sign up for free
0