Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking

Published: 12 June 2020 Publication History

Abstract

Ad and tracking blocking extensions are popular tools for improving web performance, privacy and aesthetics. Content blocking extensions generally rely on filter lists to decide whether a web request is associated with tracking or advertising, and so should be blocked. Millions of web users rely on filter lists to protect their privacy and improve their browsing experience. Despite their importance, the growth and health of filter lists are poorly understood. Filter lists are maintained by a small number of contributors who use undocumented heuristics and intuitions to determine what rules should be included. Lists quickly accumulate rules, and rules are rarely removed. As a result, users' browsing experiences are degraded as the number of stale, dead or otherwise not useful rules increasingly dwarf the number of useful rules, with no attenuating benefit. An accumulation of "dead weight" rules also makes it difficult to apply filter lists on resource-limited mobile devices. This paper improves the understanding of crowdsourced filter lists by studying EasyList, the most popular filter list. We measure how EasyList affects web browsing by applying EasyList to a sam- ple of 10,000 websites. We find that 90.16% of the resource blocking rules in EasyList provide no benefit to users in common browsing scenarios. We use our measurements of rule application rates to taxonomies ways advertisers evade EasyList rules. Finally, we propose optimizations for popular ad-blocking tools that (i) allow EasyList to be applied on performance constrained mobile devices and (ii) improve desktop performance by 62.5%, while preserving over 99% of blocking coverage. We expect these optimizations to be most useful for users in non-English locals, who rely on supplemental filter lists for effective blocking and protections.

References

[1]
Mshabab Alrizah, Sencun Zhu, Xinyu Xing, and Gang Wang. Errors, misunderstandings, and attacks: Analyzing the crowdsourcing process of ad-blocking systems. 2019.
[2]
Steven Englehardt and Arvind Narayanan. Online Tracking: A 1-million-site Measurement and Analysis Steven. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, (1):1388--1401, 2016.
[3]
Kiran Garimella, Orestis Kostakis, and Michael Mathioudakis. Ad-blocking: A study on performance, privacy and counter-measures. In Proceedings of the 2017 ACM on Web Science Conference, pages 259--262. ACM, 2017.
[4]
Arthur Gervais, Alexandros Filios, Vincent Lenders, and Srdjan Capkun. Quantifying web adblocker privacy. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10493 LNCS:21--42, 2017.
[5]
David Gugelmann, Markus Happe, Bernhard Ager, and Vincent Lenders. An Automated Approach for Complementing Ad Blockers' Blacklists. Proceedings on Privacy Enhancing Technologies, 2015(2):282--298, 2015.
[6]
Luca Invernizzi, Kurt Thomas, Alexandros Kapravelos, Oxana Comanescu, Jean-Michel Picod, and Elie Bursztein. Cloak of visibility: detecting when machines browse a different web. In Security and Privacy (SP), 2016 IEEE Symposium on, pages 743--758. IEEE, 2016.
[7]
Umar Iqbal, Zubair Shafiq, and Zhiyun Qian. The Ad Wars: Retrospective Measurement and Analysis of Anti-Adblock Filter Lists. ACM SIGCOMM Conference on Internet Measurement Conference (IMC), 13, 2017.
[8]
Umar Iqbal, Zubair Shafiq, Peter Snyder, Shitong Zhu, Zhiyun Qian, and Benjamin Livshits. AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking. 2018.
[9]
Omer Katz and Benjamin Livshits. Toward an evidence-based design for reactive security policies and mechanisms. arXiv preprint arXiv:1802.08915, 2018.
[10]
Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner. Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. Usenix Security, 2016.
[11]
Zhou Li, Kehuan Zhang, Yinglian Xie, Fang Yu, and XiaoFeng Wang. Knowing your enemy: understanding and detecting malicious web advertising. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 674--686. ACM, 2012.
[12]
Timothy Libert. Exposing the hidden web: An analysis of third-party HTTP requests on 1 million websites. International Journal of Communication, 9(1):3544--3561, 2015.
[13]
M Malloy, M McNamara, A Cahn, and P Barford. Ad blockers: Global prevalence and impact. Imc'16, 14--16-Nove:119--125, 2016.
[14]
Arunesh Mathur, Jessica Vitak, Arvind Narayanan, and Marshini Chetty. Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking. Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 2018.
[15]
Georg Merzdovnik, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, and Edgar Weippl. Block Me if You Can: A Large-Scale Study of Tracker-Blocking Tools. Proceedings - 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017, pages 319--333, 2017.
[16]
Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, and Steven J. Murdoch. Ad-blocking and counter blocking: A slice of the arms race. CoRR, abs/1605.05077, 2016.
[17]
Enric Pujol, Oliver Hohlfeld, and Anja Feldmann. Annoyed users: Ads and ad-block usage in the wild. In Proceedings of the 2015 Internet Measurement Conference, pages 93--106. ACM, 2015.
[18]
Quirin Scheitle, Oliver Hohlfeld, Julien Gamba, Jonas Jelten, Torsten Zimmermann, Stephen D Strowes, and Narseo Vallina-Rodriguez. A long way to the top: Significance, structure, and stability of internet top lists. arXiv preprint arXiv:1805.11506, 2018.
[19]
Alexander Sjosten, Peter Snyder, Antonio Pastor, Panagiotis Papadopoulos, and Benjamin Livshits. Generation of filter lists for regions that are underserved. WWW, 2020.
[20]
Peter Snyder, Cynthia Taylor, and Chris Kanich. Most websites don't need to vibrate: A cost-benefit approach to improving browser security. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 179--194. ACM, 2017.
[21]
Grant Storey, Dillon Reisman, Jonathan Mayer, and Arvind Narayanan. The Future of Ad Blocking: An Analytical Framework and New Techniques. 2017.
[22]
Weihang Wang, Yunhui Zheng, Xinyu Xing, Yonghwi Kwon, Xiangyu Zhang, and Patrick Eugster. WebRanz: web page randomization for better advertisement delivery and web-bot prevention. Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2016, pages 205--216, 2016.
[23]
Zhonghao Yu, Sam Macbeth, Konark Modi, and Josep M. Pujol. Tracking the Trackers. Proceedings of the 25th International Conference on World Wide Web - WWW '16, pages 121--132, 2016.
[24]
Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna. The dark alleys of madison avenue: Understanding malicious advertisements. In Proceedings of the 2014 Conference on Internet Measurement Conference, pages 373--380. ACM, 2014.
[25]
Shitong Zhu, Xunchao Hu, Zhiyun Qian, Zubair Shafiq, and Heng Yin. Measuring and disrupting anti-adblockers using differential execution analysis. In The Network and Distributed System Security Symposium (NDSS), 2018.

Cited By

View all
  • (2024)Detecting Web Tracking at the Network LayerICT Systems Security and Privacy Protection10.1007/978-3-031-56326-3_10(131-148)Online publication date: 24-Apr-2024
  • (2023)Breaking Bad: Quantifying the Addiction of Web Elements to JavaScriptACM Transactions on Internet Technology10.1145/357984623:1(1-28)Online publication date: 12-Jan-2023
  • (2023)A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber SecurityComputers & Security10.1016/j.cose.2023.103123128(103123)Online publication date: May-2023
  • Show More Cited By

Index Terms

  1. Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Proceedings of the ACM on Measurement and Analysis of Computing Systems
        Proceedings of the ACM on Measurement and Analysis of Computing Systems  Volume 4, Issue 2
        SIGMETRICS
        June 2020
        623 pages
        EISSN:2476-1249
        DOI:10.1145/3405833
        Issue’s Table of Contents
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 12 June 2020
        Published in POMACS Volume 4, Issue 2

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. easylist
        2. filter lists
        3. web measurement
        4. web privacy

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)78
        • Downloads (Last 6 weeks)7
        Reflects downloads up to 30 Aug 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Detecting Web Tracking at the Network LayerICT Systems Security and Privacy Protection10.1007/978-3-031-56326-3_10(131-148)Online publication date: 24-Apr-2024
        • (2023)Breaking Bad: Quantifying the Addiction of Web Elements to JavaScriptACM Transactions on Internet Technology10.1145/357984623:1(1-28)Online publication date: 12-Jan-2023
        • (2023)A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber SecurityComputers & Security10.1016/j.cose.2023.103123128(103123)Online publication date: May-2023
        • (2022)WTAGRAPH: Web Tracking and Advertising Detection using Graph Neural Networks2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833670(1540-1557)Online publication date: May-2022
        • (2021)SugarCoat: Programmatically Generating Privacy-Preserving, Web-Compatible Resource Replacements for Content BlockingProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484578(2844-2857)Online publication date: 12-Nov-2021
        • (2021)Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain GraphProceedings of the 13th ACM Web Science Conference 202110.1145/3447535.3462549(253-261)Online publication date: 21-Jun-2021
        • (2021)Exploring Ecosystem of Free Illegal Live Streaming Services and Its Price on Legitimate Services2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)10.1109/ICMNWC52512.2021.9688551(1-8)Online publication date: 3-Dec-2021

        View Options

        Get Access

        Login options

        Full Access

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media