{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:26:40Z","timestamp":1725708400094},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T00:00:00Z","timestamp":1417996800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000141210165"],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Secure Business Austria"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,12,8]]},"DOI":"10.1145\/2664243.2664279","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T16:30:28Z","timestamp":1418056228000},"page":"456-465","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["TrueClick"],"prefix":"10.1145","author":[{"given":"Sevtap","family":"Duman","sequence":"first","affiliation":[{"name":"Northeastern University Boston, MA"}]},{"given":"Kaan","family":"Onarlioglu","sequence":"additional","affiliation":[{"name":"Northeastern University Boston, MA"}]},{"given":"Ali Osman","family":"Ulusoy","sequence":"additional","affiliation":[{"name":"Brown University Providence, RI"}]},{"given":"William","family":"Robertson","sequence":"additional","affiliation":[{"name":"Northeastern University Boston, MA"}]},{"given":"Engin","family":"Kirda","sequence":"additional","affiliation":[{"name":"Northeastern University Boston, MA"}]}],"member":"320","published-online":{"date-parts":[[2014,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Adblock Plus. https:\/\/adblockplus.org. Adblock Plus. https:\/\/adblockplus.org."},{"key":"e_1_3_2_1_2_1","unstructured":"ADSafe. http:\/\/www.adsafe.org. ADSafe. http:\/\/www.adsafe.org."},{"key":"e_1_3_2_1_3_1","unstructured":"Privoxy. http:\/\/www.privoxy.org. Privoxy. http:\/\/www.privoxy.org."},{"key":"e_1_3_2_1_4_1","unstructured":"Squid. http:\/\/www.squid-cache.org. Squid. http:\/\/www.squid-cache.org."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466246"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"volume-title":"Online Consumer Psychology: Understanding and Influencing Consumer Behavior in the Virtual World","year":"2005","author":"Chandon J.","key":"e_1_3_2_1_8_1","unstructured":"J. Chandon and M. S. Chtourou . Factors Affecting Click-Through Rate . In C. P. Haugtvedt, K. A. Machleit, and R. Yalch, editors, Online Consumer Psychology: Understanding and Influencing Consumer Behavior in the Virtual World , chapter 6. Psychology Press , Jan. 2005 . J. Chandon and M. S. Chtourou. Factors Affecting Click-Through Rate. In C. P. Haugtvedt, K. A. Machleit, and R. Yalch, editors, Online Consumer Psychology: Understanding and Influencing Consumer Behavior in the Virtual World, chapter 6. Psychology Press, Jan. 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754394"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772719"},{"volume-title":"NDSS","year":"2010","author":"Finifter M.","key":"e_1_3_2_1_11_1","unstructured":"M. Finifter , J. Weinberger , and A. Barth . Preventing Capability Leaks in Secure JavaScript Subsets . In NDSS , 2010 . M. Finifter, J. Weinberger, and A. Barth. Preventing Capability Leaks in Secure JavaScript Subsets. In NDSS, 2010."},{"volume-title":"HICSS","year":"1997","author":"Gallagher K.","key":"e_1_3_2_1_12_1","unstructured":"K. Gallagher and J. Parsons . A Framework for Targeting Banner Advertising on the Internet . In HICSS , 1997 . K. Gallagher and J. Parsons. A Framework for Targeting Banner Advertising on the Internet. In HICSS, 1997."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761828"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/559707"},{"key":"e_1_3_2_1_15_1","unstructured":"Google. Google Caja. https:\/\/developers.google.com\/caja. Google. Google Caja. https:\/\/developers.google.com\/caja."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.19"},{"volume-title":"Black Hat USA","year":"2013","author":"Grossman J.","key":"e_1_3_2_1_18_1","unstructured":"J. Grossman and M. Johansen . Million Browser Botnet . Black Hat USA , 2013 . J. Grossman and M. Johansen. Million Browser Botnet. Black Hat USA, 2013."},{"volume-title":"USENIX Security","year":"2009","author":"Guarnieri S.","key":"e_1_3_2_1_19_1","unstructured":"S. Guarnieri and B. Livshits . Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for Javascript Code . In USENIX Security , 2009 . S. Guarnieri and B. Livshits. Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for Javascript Code. In USENIX Security, 2009."},{"volume-title":"USENIX NSDI","year":"2011","author":"Guha S.","key":"e_1_3_2_1_20_1","unstructured":"S. Guha , B. Cheng , and P. Francis . Privad: Practical Privacy in Online Advertising . In USENIX NSDI , 2011 . S. Guha, B. Cheng, and P. Francis. Privad: Practical Privacy in Online Advertising. In USENIX NSDI, 2011."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859983.1859993"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7"},{"key":"e_1_3_2_1_23_1","unstructured":"D. Hopwood. Jacaranda. http:\/\/www.jacaranda.org. D. Hopwood. Jacaranda. http:\/\/www.jacaranda.org."},{"volume-title":"USENIX Security","year":"2012","author":"Huang L.","key":"e_1_3_2_1_24_1","unstructured":"L. Huang , A. Moshchuk , H. J. Wang , S. Schechter , and C. Jackson . Clickjacking: Attacks and defenses . In USENIX Security , 2012 . L. Huang, A. Moshchuk, H. J. Wang, S. Schechter, and C. Jackson. Clickjacking: Attacks and defenses. In USENIX Security, 2012."},{"key":"e_1_3_2_1_25_1","unstructured":"InformAction. NoScript. http:\/\/noscript.net. InformAction. NoScript. http:\/\/noscript.net."},{"key":"e_1_3_2_1_26_1","unstructured":"Interactive Advertising Bureau. Ad Unit Guidelines. http:\/\/www.iab.net\/standards\/adunits.asp. Interactive Advertising Bureau. Ad Unit Guidelines. http:\/\/www.iab.net\/standards\/adunits.asp."},{"key":"e_1_3_2_1_27_1","unstructured":"Interactive Advertising Bureau. IAB Internet Advertising Revenue Report. 2012 Full Year Results. http:\/\/www.iab.net\/media\/file\/IAB_Internet_Advertising_Revenue_Report_FY_2012_rev.pdf. Interactive Advertising Bureau. IAB Internet Advertising Revenue Report. 2012 Full Year Results. http:\/\/www.iab.net\/media\/file\/IAB_Internet_Advertising_Revenue_Report_FY_2012_rev.pdf."},{"volume-title":"Topics in Cryptology","year":"2001","author":"Juels A.","key":"e_1_3_2_1_28_1","unstructured":"A. Juels . Targeted Advertising ... And Privacy Too . In Topics in Cryptology : CT-RSA. Springer-Verlag , 2001 . A. Juels. Targeted Advertising... And Privacy Too. In Topics in Cryptology: CT-RSA. Springer-Verlag, 2001."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162084"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382267"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.11"},{"key":"e_1_3_2_1_32_1","unstructured":"Marketing Terms. Trick banner definition. http:\/\/www.marketingterms.com\/dictionary\/trick_banner\/. Marketing Terms. Trick banner definition. http:\/\/www.marketingterms.com\/dictionary\/trick_banner\/."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2223683"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460905"},{"key":"e_1_3_2_1_35_1","unstructured":"Microsoft. Microsoft Web Sandbox. http:\/\/www.websandbox.org. Microsoft. Microsoft Web Sandbox. http:\/\/www.websandbox.org."},{"key":"e_1_3_2_1_36_1","unstructured":"M. Mimoso. Malware Campaign Leverages Ad Networks Sends Victims to Blackhole. http:\/\/threatpost.com\/malware-campaign-leverages-ad-networks-sends-victims-to-blackhole Sept. 2013. M. Mimoso. Malware Campaign Leverages Ad Networks Sends Victims to Blackhole. http:\/\/threatpost.com\/malware-campaign-leverages-ad-networks-sends-victims-to-blackhole Sept. 2013."},{"volume-title":"NDSS","year":"2012","author":"Onarlioglu K.","key":"e_1_3_2_1_37_1","unstructured":"K. Onarlioglu , U. O. Yilmaz , E. Kirda , and D. Balzarotti . Insights into User Behavior in Dealing with Internet Attacks . In NDSS , 2012 . K. Onarlioglu, U. O. Yilmaz, E. Kirda, and D. Balzarotti. Insights into User Behavior in Dealing with Internet Attacks. In NDSS, 2012."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519090"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046782"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026543900054"},{"volume-title":"June","year":"2007","author":"Salusky W.","key":"e_1_3_2_1_42_1","unstructured":"W. Salusky . Malvertising. http:\/\/isc.sans.edu\/diary\/Malvertising\/3727 , June 2007 . W. Salusky. Malvertising. http:\/\/isc.sans.edu\/diary\/Malvertising\/3727, June 2007."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180426"},{"volume-title":"USENIX Security","year":"2012","author":"Shekhar S.","key":"e_1_3_2_1_44_1","unstructured":"S. Shekhar , M. Dietz , and D. S. Wallach . AdSplit: Separating Smartphone Advertising from Applications . In USENIX Security , 2012 . S. Shekhar, M. Dietz, and D. S. Wallach. AdSplit: Separating Smartphone Advertising from Applications. In USENIX Security, 2012."},{"volume-title":"Malware Security Report: Protecting Your Business, Customers, and the Bottom Line. www.verisign.com\/verisigntransition101\/files\/MalwareSecurityReport.pdf","year":"2011","key":"e_1_3_2_1_45_1","unstructured":"Symantec. Malware Security Report: Protecting Your Business, Customers, and the Bottom Line. www.verisign.com\/verisigntransition101\/files\/MalwareSecurityReport.pdf , 2011 . Symantec. Malware Security Report: Protecting Your Business, Customers, and the Bottom Line. www.verisign.com\/verisigntransition101\/files\/MalwareSecurityReport.pdf, 2011."},{"volume-title":"USENIX Security","year":"2010","author":"Louw M. Ter","key":"e_1_3_2_1_46_1","unstructured":"M. Ter Louw , K. T. Ganesh , and V. N. Venkatakrishnan . AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements . In USENIX Security , 2010 . M. Ter Louw, K. T. Ganesh, and V. N. Venkatakrishnan. AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements. In USENIX Security, 2010."},{"volume-title":"NDSS","year":"2010","author":"Toubiana V.","key":"e_1_3_2_1_47_1","unstructured":"V. Toubiana , A. Narayanan , D. Boneh , H. Nissenbaum , and S. Barocas . Adnostic: Privacy Preserving Targeted Advertising . In NDSS , 2010 . V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. Barocas. Adnostic: Privacy Preserving Targeted Advertising. In NDSS, 2010."},{"volume-title":"USENIX Security","year":"2009","author":"Wang H. J.","key":"e_1_3_2_1_48_1","unstructured":"H. J. Wang , C. Grier , A. Moshchuk , S. T. King , P. Choudhury , and H. Venter . The Multi-Principal OS Construction of the Gazelle Web Browser . In USENIX Security , 2009 . H. J. Wang, C. Grier, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter. The Multi-Principal OS Construction of the Gazelle Web Browser. In USENIX Security, 2009."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062745.1062868"},{"key":"e_1_3_2_1_50_1","unstructured":"L. Zeltser. Malvertising: Some Examples of Malicious Ad Campaigns. http:\/\/blog.zeltser.com\/post\/6247850496\/malvertising-malicious-ad-campaigns June 2011. L. Zeltser. Malvertising: Some Examples of Malicious Ad Campaigns. http:\/\/blog.zeltser.com\/post\/6247850496\/malvertising-malicious-ad-campaigns June 2011."}],"event":{"name":"ACSAC '14: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"New Orleans Louisiana USA","acronym":"ACSAC '14"},"container-title":["Proceedings of the 30th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2664243.2664279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T17:36:48Z","timestamp":1673545008000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2664243.2664279"}},"subtitle":["automatically distinguishing trick banners from genuine download links"],"short-title":[],"issued":{"date-parts":[[2014,12,8]]},"references-count":50,"alternative-id":["10.1145\/2664243.2664279","10.1145\/2664243"],"URL":"https:\/\/doi.org\/10.1145\/2664243.2664279","relation":{},"subject":[],"published":{"date-parts":[[2014,12,8]]},"assertion":[{"value":"2014-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}