A system for detecting third-party tracking through the combination of dynamic analysis and static analysis

被引:1
作者
Sun, Jingxue [1 ,2 ]
Huang, Zhiqiu [2 ]
Yang, Ting [2 ]
Wang, Wengjie [2 ]
Zhang, Yuqing [1 ,2 ,3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[2] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Beijing, Peoples R China
[3] Hainan Univ, Sch Comp Sci & Cyberspace Secur, Haikou, Hainan, Peoples R China
来源
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021) | 2021年
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Web Security; Privacy; !text type='Java']Java[!/text]Script; Flash; Third-Party Tracking; Machine Learning;
D O I
10.1109/INFOCOMWKSHPS51825.2021.9484564
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the continuous development of Internet technology, people pay more and more attention to private security. In particular, third-party tracking is a major factor affecting privacy security. So far, the most effective way to prevent third-party tracking is to create a blacklist. However, blacklist generation and maintenance need to be carried out manually which is inefficient and difficult to maintain. In order to generate blacklists more quickly and accurately in this era of big data, this paper proposes a machine learning system MFTrackerDetector against third-party tracking. The system is based on the theory of structural hole and only detects thirdparty trackers. The system consists of two subsystems, DMTrackerDetector and DFTrackerDetector. DMTrackerDetector is a JavaScript-based subsystem and DFTrackerDetector is a Flashbased subsystem. Because tracking code and non-tracking code often call different APIs, DMTrackerDetector builds a classifier using all the APIs in JavaScript as features and extracts the API features in JavaScript through dynamic analysis. Unlike static analysis method, the dynamic analysis method can effectively avoid code obfuscation. DMTrackerDetector eventually generates a JavaScript-based third-party tracker list named Jlist. DFTrackerDetector constructs a classifier using all the APIs in ActionScript as features and extracts the API features in the flash script through static analysis. DFTrackerDetector finally generates a Flash-based third-party tracker list named Flist. DFTrackerDetector achieved 92.98% accuracy in the Flash test set and DMTrackerDetector achieved 90.79% accuracy in the JavaScript test set. MFTrackerDetector eventually generates a list of third-party trackers, which is a combination of Jlist and Flist.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Integrated static and dynamic analysis for malware detection
    Shijo, P. V.
    Salim, A.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 804 - 811
  • [22] Doctors Routinely Share Health Data Electronically Under HIPAA, and Sharing With Patients and Patients' Third-Party Health Apps is Consistent: Interoperability and Privacy Analysis
    Savage, Mark
    Savage, Lucia Clara
    [J]. JOURNAL OF MEDICAL INTERNET RESEARCH, 2020, 22 (09)
  • [23] Privacy-Preserving Data Analysis without Trusted Third Party
    Miyaji, Atsuko
    Takahashi, Tomoka
    Wang, Ping-Lun
    Yamatsuki, Tatsuhiro
    Mimoto, Tomoaki
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 710 - 717
  • [24] Static and dynamic analysis for web security in industry applications
    Wu, Raymond
    Hisada, Masayuki
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2010, 3 (02) : 138 - 150
  • [25] Static and Dynamic Analysis for Web Security in Generic Format
    Wu, Raymond
    Hisada, Masayuki
    Ranaweera, Rasika
    [J]. GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, PROCEEDINGS, 2009, 45 : 233 - +
  • [26] Static and Dynamic Malware Analysis Using Machine Learning
    Raghuraman, Chandni
    Suresh, Sandhya
    Shivshankar, Suraj
    Chapaneri, Radhika
    [J]. FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 793 - 806
  • [27] Static and Dynamic Malware Analysis Using Machine Learning
    Ijaz, Muhammad
    Durad, Muhammad Hanif
    Ismail, Maliha
    [J]. PROCEEDINGS OF 2019 16TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2019, : 687 - 691
  • [28] The Architectural Review of Web Security in Static and Dynamic Analysis
    Wu, Raymond
    Hisada, Masayuki
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08): : 277 - 286
  • [29] Comprehensive Android Malware Detection: Leveraging Machine Learning and Sandboxing Techniques through Static and Dynamic Analysis
    Bhooshan, Prashant
    Darshan, Shiva S. L.
    Sonkar, Nidhi
    [J]. 2024 IEEE 21ST INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SMART SYSTEMS, MASS 2024, 2024, : 580 - 585
  • [30] Detecting personally identifiable information transmission in android applications using light-weight static analysis
    Wongwiwatchai, Nattanon
    Pongkham, Phannawhat
    Sripanidkulchai, Kunwadee
    [J]. COMPUTERS & SECURITY, 2020, 99