{"title":"通过定向广告监视Android用户","authors":"Eeva Terkki, Ashwin Rao, S. Tarkoma","doi":"10.1109/COMSNETS.2017.7945362","DOIUrl":null,"url":null,"abstract":"Targeted ads are a vital source of revenue for ad networks, and ad networks compile detailed profiles of users for targeting purposes. This wealth of private information can motivate an attacker to spy on a victim by sampling the victim's information available at the ad networks. In this paper, we explore the possibility to spy on an Android user by requesting ads targeted at that user. During our controlled experiments, an attacker was able to remotely request and receive mobile ads using a leaked identifier belonging to their victim. The lack of targeted ads from some of the studied ad networks, which we believe to be partly caused by our geographical location, restricts us from drawing strong conclusions on the success of such an attack. However, we believe that our methodology can be used to perform similar experiments to explore the success in spying on Android users through targeted ads.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Spying on Android users through targeted ads\",\"authors\":\"Eeva Terkki, Ashwin Rao, S. Tarkoma\",\"doi\":\"10.1109/COMSNETS.2017.7945362\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Targeted ads are a vital source of revenue for ad networks, and ad networks compile detailed profiles of users for targeting purposes. This wealth of private information can motivate an attacker to spy on a victim by sampling the victim's information available at the ad networks. In this paper, we explore the possibility to spy on an Android user by requesting ads targeted at that user. During our controlled experiments, an attacker was able to remotely request and receive mobile ads using a leaked identifier belonging to their victim. The lack of targeted ads from some of the studied ad networks, which we believe to be partly caused by our geographical location, restricts us from drawing strong conclusions on the success of such an attack. However, we believe that our methodology can be used to perform similar experiments to explore the success in spying on Android users through targeted ads.\",\"PeriodicalId\":168357,\"journal\":{\"name\":\"2017 9th International Conference on Communication Systems and Networks (COMSNETS)\",\"volume\":\"82 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 9th International Conference on Communication Systems and Networks (COMSNETS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMSNETS.2017.7945362\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSNETS.2017.7945362","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Targeted ads are a vital source of revenue for ad networks, and ad networks compile detailed profiles of users for targeting purposes. This wealth of private information can motivate an attacker to spy on a victim by sampling the victim's information available at the ad networks. In this paper, we explore the possibility to spy on an Android user by requesting ads targeted at that user. During our controlled experiments, an attacker was able to remotely request and receive mobile ads using a leaked identifier belonging to their victim. The lack of targeted ads from some of the studied ad networks, which we believe to be partly caused by our geographical location, restricts us from drawing strong conclusions on the success of such an attack. However, we believe that our methodology can be used to perform similar experiments to explore the success in spying on Android users through targeted ads.