Eluding ML-based Adblockers With Actionable Adversarial Examples

被引:3
作者
Zhu, Shitong [1 ]
Wang, Zhongjie [1 ]
Chen, Xun [2 ]
Li, Shasha [1 ]
Man, Keyu [1 ]
Iqbal, Umar [3 ]
Qian, Zhiyun [1 ]
Chan, Kevin S. [4 ]
Krishnamurthy, Srikanth V. [1 ]
Shafiq, Zubair [5 ]
Hao, Yu [1 ]
Li, Guoren [1 ]
Zhang, Zheng [1 ]
Zou, Xiaochen [1 ]
机构
[1] Univ Calif Riverside, Riverside, CA 92521 USA
[2] Samsung Res Amer, Mountain View, CA 94043 USA
[3] Univ Iowa, Iowa City, IA 52242 USA
[4] US Army Res Lab, Adelphi, MD USA
[5] Univ Calif Davis, Davis, CA 95616 USA
来源
37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021 | 2021年
关键词
adversarial examples; machine learning; adblockers;
D O I
10.1145/3485832.3488008
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Online advertisers have been quite successful in circumventing traditional adblockers that rely on manually curated rules to detect ads. As a result, adblockers have started to use machine learning (ML) classifiers for more robust detection and blocking of ads. Among these, AdGraph which leverages rich contextual information to classify ads, is arguably, the state of the art ML-based adblocker. In this paper, we present A(4), a tool that intelligently crafts adversarial ads to evade AdGraph. Unlike traditional adversarial examples in the computer vision domain that can perturb any pixels (i.e., unconstrained), adversarial ads generated by A(4) are actionable in the sense that they preserve the application semantics of the web page. Through a series of experiments we show that A(4) can bypass AdGraph about 81% of the time, which surpasses the state-of-theart attack by a significant margin of 145.5%, with an overhead of <20% and perturbations that are visually imperceptible in the rendered webpage. We envision that A(4)'s framework can be used to potentially launch adversarial attacks against other ML-based web applications.
引用
收藏
页码:541 / 553
页数:13
相关论文
共 34 条
[1]   How Tracking Companies Circumvented Ad Blockers Using WebSockets [J].
Bashir, Muhammad Ahmad ;
Arshad, Sajjad ;
Kirda, Engin ;
Robertson, William ;
Wilson, Christo .
IMC'18: PROCEEDINGS OF THE INTERNET MEASUREMENT CONFERENCE, 2018, :471-477
[2]  
Bhagavatula S., 2014, P 2014 WORKSH ART IN, P95
[3]  
Chollet F., 2015, Keras
[4]  
Cimpanu C., AD NETWORK USES DGA
[5]  
Din ZA, 2020, PROCEEDINGS OF THE 2020 USENIX ANNUAL TECHNICAL CONFERENCE, P387
[6]   Boosting Adversarial Attacks with Momentum [J].
Dong, Yinpeng ;
Liao, Fangzhou ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun ;
Hu, Xiaolin ;
Li, Jianguo .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :9185-9193
[7]  
Ford N, 2019, PR MACH LEARN RES, V97
[8]  
Hendrycks D., 2019, INT C LEARN REPR
[9]   ADGRAPH: A Graph-Based Approach to Ad and Tracker Blocking [J].
Iqbal, Umar ;
Snyder, Peter ;
Zhu, Shitong ;
Livshits, Benjamin ;
Qian, Zhiyun ;
Shafiq, Zubair .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :763-776
[10]   The Ad Wars: Retrospective Measurement and Analysis of Anti-Adblock Filter Lists [J].
Iqbal, Umar ;
Shafiq, Zubair ;
Qian, Zhiyun .
PROCEEDINGS OF THE 2017 INTERNET MEASUREMENT CONFERENCE (IMC'17), 2017, :171-183