Investigating User Profiling and Privacy Leaks in Mobile Ad Networks
نویسندگان
چکیده
Mobile advertising networks seek to reach their audience by displaying targeted in-app ads to users. This requires user profiling, which is done by collecting information through ad and analytics libraries embedded in apps. The profile information may include demographic data, such as age and gender, as well as behavioral data, such as recent app use. A profile is linked to a device with a unique identifier – Android uses the advertising ID for this purpose. Because targeted ads reflect a user’s profile, ads leaking to a third party could reveal privacy sensitive information about the user. Our objectives are to 1) analyze how different ad networks (AdMob, Flurry, InMobi, and Millennial Media) target users and 2) investigate the extent to which an attacker is able to request and receive ads targeted at a specific user. Before the introduction of the Android advertising ID, privacy leaks allowed an attacker to infer user profiles created by analytics services by spoofing identifiers, such as the Android ID [1]. Unlike the Android ID, the advertising ID can be reset by the user. It is therefore more difficult for an attacker to track a user, but the extent to which attackers are able to exploit the advertising ID is currently unknown. We explore whether user profiling and ad targeting pose privacy risks in the current Android environment. BODYUser-based targeting in mobile ads is scarce & we explore if attackers can tracka user by spoofing the user’s identifiers in ad requests. REFERENCES[1] T. Chen, I. Ullah, M. A. Kaafar, and R. Boreli. Information leakage through mobile analyticsservices. In Proceedings of the 15th Workshop on Mobile Computing Systems and Applications,HotMobile ’14, 2014. Volume 4 of Tiny Transactions on Computer ScienceThis content is released under the Creative Commons Attribution-NonCommercial ShareAlike License. Permission tomake digital or hard copies of all or part of this work is granted without fee provided that copies are not made ordistributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page.CC BY-NC-SA 3.0: http://creativecommons.org/licenses/by-nc-sa/3.0/.
منابع مشابه
The Long-Standing Privacy Debate: Mobile Websites vs Mobile Apps
The vast majority of online services nowadays, provide both a mobile-friendly website and a mobile application to their users. Both of these choices are usually released for free, with their developers, usually gaining revenue by allowing advertisements from ad networks to be embedded into their content. In order to provide more personalized and thus more effective advertisements, ad networks u...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملIntuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks
In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...
متن کاملDesign and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- TinyToCS
دوره 4 شماره
صفحات -
تاریخ انتشار 2016