A system for detecting third-party tracking through the combination of dynamic analysis and static analysis

被引:1
|
作者
Sun, Jingxue [1 ,2 ]
Huang, Zhiqiu [2 ]
Yang, Ting [2 ]
Wang, Wengjie [2 ]
Zhang, Yuqing [1 ,2 ,3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[2] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Beijing, Peoples R China
[3] Hainan Univ, Sch Comp Sci & Cyberspace Secur, Haikou, Hainan, Peoples R China
来源
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021) | 2021年
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Web Security; Privacy; !text type='Java']Java[!/text]Script; Flash; Third-Party Tracking; Machine Learning;
D O I
10.1109/INFOCOMWKSHPS51825.2021.9484564
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the continuous development of Internet technology, people pay more and more attention to private security. In particular, third-party tracking is a major factor affecting privacy security. So far, the most effective way to prevent third-party tracking is to create a blacklist. However, blacklist generation and maintenance need to be carried out manually which is inefficient and difficult to maintain. In order to generate blacklists more quickly and accurately in this era of big data, this paper proposes a machine learning system MFTrackerDetector against third-party tracking. The system is based on the theory of structural hole and only detects thirdparty trackers. The system consists of two subsystems, DMTrackerDetector and DFTrackerDetector. DMTrackerDetector is a JavaScript-based subsystem and DFTrackerDetector is a Flashbased subsystem. Because tracking code and non-tracking code often call different APIs, DMTrackerDetector builds a classifier using all the APIs in JavaScript as features and extracts the API features in JavaScript through dynamic analysis. Unlike static analysis method, the dynamic analysis method can effectively avoid code obfuscation. DMTrackerDetector eventually generates a JavaScript-based third-party tracker list named Jlist. DFTrackerDetector constructs a classifier using all the APIs in ActionScript as features and extracts the API features in the flash script through static analysis. DFTrackerDetector finally generates a Flash-based third-party tracker list named Flist. DFTrackerDetector achieved 92.98% accuracy in the Flash test set and DMTrackerDetector achieved 90.79% accuracy in the JavaScript test set. MFTrackerDetector eventually generates a list of third-party trackers, which is a combination of Jlist and Flist.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A system for detecting third-party tracking through the combination of dynamic analysis and static analysis
    Xidian University, School of Cyber Engineering, Xi'an, China
    不详
    不详
    IEEE INFOCOM - IEEE Conf. Comput. Commun. Workshops, INFOCOM WKSHPS, 1600,
  • [2] Demo: Detecting Third-Party Library Problems with Combined Program Analysis
    Ntousakis, Grigoris
    Ioannidis, Sotiris
    Vasilakis, Nikos
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2429 - 2431
  • [3] Dynamic privacy leakage analysis of Android third-party libraries
    He, Yongzhong
    Yang, Xuejun
    Hu, Binghui
    Wang, Wei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 259 - 270
  • [4] Dynamic Privacy Leakage Analysis of Android Third-party Libraries
    He, Yongzhong
    Hu, Binghui
    Han, Zhen
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 275 - 280
  • [5] fMRI analysis of third-party punishment
    不详
    NEUROSCIENTIST, 2009, 15 (03): : 214 - 214
  • [6] Supplying Compiler's Static Compatibility Checks by the Analysis of Third-party Libraries
    Jezek, Kamil
    Holy, Lukas
    Brada, Premek
    PROCEEDINGS OF THE 17TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING (CSMR 2013), 2013, : 375 - 378
  • [7] Third-party Source Code Compliance using Early Static Code Analysis
    Takhma, Youness
    Rachid, Tajjeeddine
    Harroud, Hamid
    Abid, Mohamed Riduan
    Assem, Nasser
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS, 2015, : 132 - 139
  • [8] Design and analysis of a third-party security protocol for storage system
    Huang Jian-zhong
    Xie Chang-sheng
    Zhu Guang-xi
    Zhou Gang
    Wu Wei
    NAS: 2006 INTERNATIONAL WORKSHOP ON NETWORKING, ARCHITECTURE, AND STORAGES, PROCEEDINGS, 2006, : 177 - +
  • [9] The Evolution of Third-Party Web Tracking
    Wambach, Tim
    Braeunlich, Katharina
    INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP 2016), 2017, 691 : 130 - 147
  • [10] Analysis of third-party warehousing contracts with commitments
    Chen, FY
    Hum, SH
    Sun, J
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2001, 131 (03) : 603 - 610