He Shuang (University of Toronto), Lianying Zhao (Carleton University and University of Toronto), David Lie (University of Toronto)

Web tracking harms user privacy. As a result, the
use of tracker detection and blocking tools is a common practice
among Internet users. However, no such tool can be perfect,
and thus there is a trade-off between avoiding breakage (caused
by unintentionally blocking some required functionality) and ne-
glecting to block some trackers. State-of-the-art tools usually rely
on user reports and developer effort to detect breakages, which
can be broadly categorized into two causes: 1) misidentifying
non-trackers as trackers, and 2) blocking mixed trackers which
blend tracking with functional components.

We propose incorporating a machine learning-based break-
age detector into the tracker detection pipeline to automatically
avoid misidentification of functional resources. For both tracker
detection and breakage detection, we propose using differential
features that can more clearly elucidate the differences caused by
blocking a request. We designed and implemented a prototype of
our proposed approach, Duumviri, for non-mixed trackers. We
then adopt it to automatically identify mixed trackers, drawing
differential features at partial-request granularity.

In the case of non-mixed trackers, evaluating Duumviri on 15K
pages shows its ability to replicate the labels of human-generated
filter lists, EasyPrivacy, with an accuracy of 97.44%. Through a
manual analysis, we find that Duumviri can identify previously
unreported trackers and its breakage detector can identify overly
strict EasyPrivacy rules that cause breakage. In the case of mixed
trackers, Duumviri is the first automated mixed tracker detector,
and achieves a lower bound accuracy of 74.19%. Duumviri has
enabled us to detect and confirm 22 previously unreported unique
trackers and 26 unique mixed trackers.

View More Papers

TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based...

Zelun Kong (University of Texas at Dallas), Minkyung Park (University of Texas at Dallas), Le Guan (University of Georgia), Ning Zhang (Washington University in St. Louis), Chung Hwan Kim (University of Texas at Dallas)

Read More

Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing

Ruyi Ding (Northeastern University), Tong Zhou (Northeastern University), Lili Su (Northeastern University), Aidong Adam Ding (Northeastern University), Xiaolin Xu (Northeastern University), Yunsi Fei (Northeastern University)

Read More

ERW-Radar: An Adaptive Detection System against Evasive Ransomware by...

Lingbo Zhao (Institute of Information Engineering,Chinese Academy of Sciences), Yuhui Zhang (Institute of Information Engineering,Chinese Academy of Sciences), Zhilu Wang (Institute of Information Engineering,Chinese Academy of Sciences), Fengkai Yuan (Institute of Information Engineering,CAS), Rui Hou (Institute of Information Engineering, Chinese Academy of Sciences)

Read More

A Comprehensive Memory Safety Analysis of Bootloaders

Jianqiang Wang (CISPA Helmholtz Center for Information Security), Meng Wang (CISPA Helmholtz Center for Information Security), Qinying Wang (Zhejiang University), Nils Langius (Leibniz Universität Hannover), Li Shi (ETH Zurich), Ali Abbasi (CISPA Helmholtz Center for Information Security), Thorsten Holz (CISPA Helmholtz Center for Information Security)

Read More