{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:30:25Z","timestamp":1765888225166,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1750101, CNS-1717028, CNS- 1618684, CNS-1718459"],"award-info":[{"award-number":["CNS-1750101, CNS-1717028, CNS- 1618684, CNS-1718459"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3355369.3355588","type":"proceedings-article","created":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T12:57:15Z","timestamp":1571403435000},"page":"230-244","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Errors, Misunderstandings, and Attacks"],"prefix":"10.1145","author":[{"given":"Mshabab","family":"Alrizah","sequence":"first","affiliation":[{"name":"The Pennsylvania State University"}]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University"}]},{"given":"Xinyu","family":"Xing","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University"}]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. About \/robots.txt. http:\/\/www.robotstxt.org\/robotstxt.html  2017. About \/robots.txt. http:\/\/www.robotstxt.org\/robotstxt.html"},{"key":"e_1_3_2_1_2_1","unstructured":"AdGuard. 2019. AdGuard Ad Filters. https:\/\/kb.adguard.com\/en\/general\/adguard-ad-filters  AdGuard. 2019. AdGuard Ad Filters. https:\/\/kb.adguard.com\/en\/general\/adguard-ad-filters"},{"key":"e_1_3_2_1_3_1","unstructured":"Aexa. 2016. Drive More Website Traffic with Competitive Analysis. https:\/\/www.alexa.com\/siteinfo  Aexa. 2016. Drive More Website Traffic with Competitive Analysis. https:\/\/www.alexa.com\/siteinfo"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 2012 International Conference on Language Resources and Evaluation (LREC).","author":"Aker Ahmet","year":"2012","unstructured":"Ahmet Aker , Mahmoud El-Haj , M- Dyaa Albakour , Udo Kruschwitz , 2012 . Assessing Crowdsourcing Quality through Objective Tasks .. In Proceedings of the 2012 International Conference on Language Resources and Evaluation (LREC). Ahmet Aker, Mahmoud El-Haj, M-Dyaa Albakour, Udo Kruschwitz, et al. 2012. Assessing Crowdsourcing Quality through Objective Tasks.. In Proceedings of the 2012 International Conference on Language Resources and Evaluation (LREC)."},{"key":"e_1_3_2_1_5_1","unstructured":"Alexa. 2019. Alexa Web Information Service. https:\/\/awis.alexa.com\/  Alexa. 2019. Alexa Web Information Service. https:\/\/awis.alexa.com\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Altice. 2019. Optimum by Altice. https:\/\/www.optimum.com\/alticeone  Altice. 2019. Optimum by Altice. https:\/\/www.optimum.com\/alticeone"},{"key":"e_1_3_2_1_7_1","unstructured":"Internet Archive. 2019. Wayback Machine. https:\/\/archive.org\/web\/  Internet Archive. 2019. Wayback Machine. https:\/\/archive.org\/web\/"},{"key":"e_1_3_2_1_8_1","volume-title":"Distilling the wisdom of crowds: Prediction markets vs. prediction polls. Management science","author":"Atanasov Pavel","year":"2016","unstructured":"Pavel Atanasov , Phillip Rescober , Eric Stone , Samuel A Swift , Emile Servan-Schreiber , Philip Tetlock , Lyle Ungar , and Barbara Mellers . 2016. Distilling the wisdom of crowds: Prediction markets vs. prediction polls. Management science ( 2016 ). Pavel Atanasov, Phillip Rescober, Eric Stone, Samuel A Swift, Emile Servan-Schreiber, Philip Tetlock, Lyle Ungar, and Barbara Mellers. 2016. Distilling the wisdom of crowds: Prediction markets vs. prediction polls. Management science (2016)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288829"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024591"},{"key":"e_1_3_2_1_11_1","unstructured":"David Barton. 2017. The Rules of Adblocking: How block list work. http:\/\/pagefair.com\/blog\/2016\/behind-the-scenes-adblocking-lists-and-countermeasures.  David Barton. 2017. The Rules of Adblocking: How block list work. http:\/\/pagefair.com\/blog\/2016\/behind-the-scenes-adblocking-lists-and-countermeasures."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278573"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666652.2666662"},{"key":"e_1_3_2_1_14_1","unstructured":"Chromium blog. 2018. Under the hood: How Chrome's ad filtering works. blog. chromium.org\/2018\/02\/how-chromes-ad-filtering-works.html  Chromium blog. 2018. Under the hood: How Chrome's ad filtering works. blog. chromium.org\/2018\/02\/how-chromes-ad-filtering-works.html"},{"key":"e_1_3_2_1_15_1","unstructured":"Ryan Brown. 2019. Fanboy Filter Lists. https:\/\/www.fanboy.co.nz\/  Ryan Brown. 2019. Fanboy Filter Lists. https:\/\/www.fanboy.co.nz\/"},{"key":"e_1_3_2_1_16_1","unstructured":"Adam Carasso. 2015. Systems and methods to bypass online advertisement blockers. US Patent 9 177 335.  Adam Carasso. 2015. Systems and methods to bypass online advertisement blockers. US Patent 9 177 335."},{"key":"e_1_3_2_1_17_1","unstructured":"Google Chrome. 2019. Chrome Web Store-Extensions. https:\/\/chrome.google.com\/webstore\/category\/extensions  Google Chrome. 2019. Chrome Web Store-Extensions. https:\/\/chrome.google.com\/webstore\/category\/extensions"},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/HTTP\/_301 [Online","author":"Wikipedia","year":"2019","unstructured":"Wikipedia contributors. 2019. HTTP\/ 301. https:\/\/en.wikipedia.org\/wiki\/HTTP\/_301 [Online ; accessed 13- May - 2019 ]. Wikipedia contributors. 2019. HTTP\/ 301. https:\/\/en.wikipedia.org\/wiki\/HTTP\/_301 [Online; accessed 13-May-2019]."},{"key":"e_1_3_2_1_19_1","unstructured":"Matthew Cortland. 2017. PageFair adblock report: The state of the blocked web presents a combined picture of desktop and mobile adblock usage for the first time. https:\/\/pagefair.com\/blog\/2017\/adblockreport\/  Matthew Cortland. 2017. PageFair adblock report: The state of the blocked web presents a combined picture of desktop and mobile adblock usage for the first time. https:\/\/pagefair.com\/blog\/2017\/adblockreport\/"},{"key":"e_1_3_2_1_20_1","unstructured":"EasyList. 2019. Automated Adserver Update. https:\/\/github.com\/easylist\/easylist\/commit\/f3la2d3800547615b82cb89333586828749a7e88  EasyList. 2019. Automated Adserver Update. https:\/\/github.com\/easylist\/easylist\/commit\/f3la2d3800547615b82cb89333586828749a7e88"},{"key":"e_1_3_2_1_21_1","unstructured":"EasyList. 2019. Overview of EasyList. https:\/\/easylist.to  EasyList. 2019. Overview of EasyList. https:\/\/easylist.to"},{"key":"e_1_3_2_1_22_1","unstructured":"Fanboy. 2019. Create a tool\/script to pickup revolving adservers. https:\/\/issues.adblockplus.org\/ticket\/5323  Fanboy. 2019. Create a tool\/script to pickup revolving adservers. https:\/\/issues.adblockplus.org\/ticket\/5323"},{"key":"e_1_3_2_1_23_1","volume-title":"Christoph Perger, Christian Schill, and Doreen S Boyd.","author":"Fritz Steffen","year":"2013","unstructured":"Giles M Foody, L See, Steffen Fritz , Marijn Van der Velde , Christoph Perger, Christian Schill, and Doreen S Boyd. 2013 . Assessing the accuracy of volunteered geographic information arising from multiple contributors to an internet based collaborative project. Transactions in GIS ( 2013). Giles M Foody, L See, Steffen Fritz, Marijn Van der Velde, Christoph Perger, Christian Schill, and Doreen S Boyd. 2013. Assessing the accuracy of volunteered geographic information arising from multiple contributors to an internet based collaborative project. Transactions in GIS (2013)."},{"key":"e_1_3_2_1_24_1","unstructured":"EasyList Forum. 2019. EasyList Forum:The Easy Subscriptions for Adblock Adblock Plus and uBlock Origin. https:\/\/forums.lanik.us\/  EasyList Forum. 2019. EasyList Forum:The Easy Subscriptions for Adblock Adblock Plus and uBlock Origin. https:\/\/forums.lanik.us\/"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_2"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0018"},{"key":"e_1_3_2_1_27_1","unstructured":"HosterStats. 2019. About HosterStats.com. http:\/\/www.hosterstats.com\/AboutHosterStats.php  HosterStats. 2019. About HosterStats.com. http:\/\/www.hosterstats.com\/AboutHosterStats.php"},{"key":"e_1_3_2_1_28_1","unstructured":"Dan Hubbard. 2016. Cisco Umbrella 1 Million. https:\/\/umbrella.cisco.com\/blog\/2016\/12\/14\/cisco-umbrella-1-million\/  Dan Hubbard. 2016. Cisco Umbrella 1 Million. https:\/\/umbrella.cisco.com\/blog\/2016\/12\/14\/cisco-umbrella-1-million\/"},{"key":"e_1_3_2_1_29_1","unstructured":"Gargoyle Software Inc. 2018. HtmlUnit. http:\/\/htmlunit.sourceforge.net  Gargoyle Software Inc. 2018. HtmlUnit. http:\/\/htmlunit.sourceforge.net"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131387"},{"key":"e_1_3_2_1_31_1","volume-title":"Adgraph: A machine learning approach to automatic and effective adblocking. arXiv preprint arXiv:1805.09155","author":"Iqbal Umar","year":"2018","unstructured":"Umar Iqbal , Zubair Shafiq , Peter Snyder , Shitong Zhu , Zhiyun Qian , and Benjamin Livshits . 2018 . Adgraph: A machine learning approach to automatic and effective adblocking. arXiv preprint arXiv:1805.09155 (2018). Umar Iqbal, Zubair Shafiq, Peter Snyder, Shitong Zhu, Zhiyun Qian, and Benjamin Livshits. 2018. Adgraph: A machine learning approach to automatic and effective adblocking. arXiv preprint arXiv:1805.09155 (2018)."},{"key":"e_1_3_2_1_32_1","volume-title":"Script-templates for the content security policy. Journal of Information Security and Applications (JISA)","author":"Johns Martin","year":"2014","unstructured":"Martin Johns . 2014. Script-templates for the content security policy. Journal of Information Security and Applications (JISA) ( 2014 ). Martin Johns. 2014. Script-templates for the content security policy. Journal of Information Security and Applications (JISA) (2014)."},{"key":"e_1_3_2_1_33_1","unstructured":"Dixon Jones. 2012. Majestic Million CSV now free for all daily. https:\/\/blog.majestic.com\/development\/majestic-million-csv-daily\/  Dixon Jones. 2012. Majestic Million CSV now free for all daily. https:\/\/blog.majestic.com\/development\/majestic-million-csv-daily\/"},{"key":"e_1_3_2_1_34_1","unstructured":"jQuery. 2019.: contains() Selector. https:\/\/api.jquery.com\/contains-selector\/  jQuery. 2019.: contains() Selector. https:\/\/api.jquery.com\/contains-selector\/"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2009947"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005650100150025"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460572"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441923"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 2010 ACM SIGIR Workshop on Crowdsourcing for Search Evaluation (CSE).","author":"Le John","year":"2010","unstructured":"John Le , Andy Edmonds , Vaughn Hester , and Lukas Biewald . 2010 . Ensuring quality in crowdsourced search relevance evaluation: The effects of training question distribution . In Proceedings of the 2010 ACM SIGIR Workshop on Crowdsourcing for Search Evaluation (CSE). John Le, Andy Edmonds, Vaughn Hester, and Lukas Biewald. 2010. Ensuring quality in crowdsourced search relevance evaluation: The effects of training question distribution. In Proceedings of the 2010 ACM SIGIR Workshop on Crowdsourcing for Search Evaluation (CSE)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134042"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 2016 USENIX Security Symposium (USENIX Security).","author":"Lerner Adam","year":"2016","unstructured":"Adam Lerner , Anna Kornfeld Simpson , Tadayoshi Kohno , and Franziska Roesner . 2016 . Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 . In Proceedings of the 2016 USENIX Security Symposium (USENIX Security). Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner. 2016. Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. In Proceedings of the 2016 USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 2013 International Conference on Machine Learning Workshop: Machine Learning Meets Crowdsourcing (ICML Workshop).","author":"Li Hongwei","year":"2013","unstructured":"Hongwei Li , Bin Yu , and Dengyong Zhou . 2013 . Error rate analysis of labeling by crowdsourcing . In Proceedings of the 2013 International Conference on Machine Learning Workshop: Machine Learning Meets Crowdsourcing (ICML Workshop). Hongwei Li, Bin Yu, and Dengyong Zhou. 2013. Error rate analysis of labeling by crowdsourcing. In Proceedings of the 2013 International Conference on Machine Learning Workshop: Machine Learning Meets Crowdsourcing (ICML Workshop)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1600150.1600175"},{"volume-title":"Mercurial: Changeset. https:\/\/www.mercurial-scm.org\/wiki\/ChangeSet","year":"2019","key":"e_1_3_2_1_44_1","unstructured":"Mercurial. 2019 . Mercurial: Changeset. https:\/\/www.mercurial-scm.org\/wiki\/ChangeSet Mercurial. 2019. Mercurial: Changeset. https:\/\/www.mercurial-scm.org\/wiki\/ChangeSet"},{"key":"e_1_3_2_1_45_1","unstructured":"Mercurial. 2019. Mercurial source control management: Adblock Plus. https:\/\/hg.adblockplus.org\/  Mercurial. 2019. Mercurial source control management: Adblock Plus. https:\/\/hg.adblockplus.org\/"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.26"},{"volume-title":"EasyList Statistics","year":"2011","key":"e_1_3_2_1_47_1","unstructured":"Michael. 2011. EasyList Statistics : August 2011 . https:\/\/easylist.to\/2011\/09\/01\/easylist-statistics:-august-2011.html Michael. 2011. EasyList Statistics: August 2011. https:\/\/easylist.to\/2011\/09\/01\/easylist-statistics:-august-2011.html"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186162"},{"key":"e_1_3_2_1_49_1","unstructured":"Mozilla. 2018. Add-ons for Firefox. https:\/\/addons.mozilla.org\/en-US\/firefox\/  Mozilla. 2018. Add-ons for Firefox. https:\/\/addons.mozilla.org\/en-US\/firefox\/"},{"key":"e_1_3_2_1_50_1","unstructured":"Mozilla. 2019. Content Security Policy (CSP). https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/CSP  Mozilla. 2019. Content Security Policy (CSP). https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/CSP"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0032"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the 2016 USENIX Security Symposium (USENIX Security).","author":"Nakibly Gabi","year":"2016","unstructured":"Gabi Nakibly , Jaime Schcolnik , and Yossi Rubin . 2016 . Website-targeted false content injection by network operators . In Proceedings of the 2016 USENIX Security Symposium (USENIX Security). Gabi Nakibly, Jaime Schcolnik, and Yossi Rubin. 2016. Website-targeted false content injection by network operators. In Proceedings of the 2016 USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings of the 2016 USENIX Workshop on Free and Open Communications on the Internet (FOCI).","author":"Nithyanand Rishab","year":"2016","unstructured":"Rishab Nithyanand , Sheharbano Khattak , Mobin Javed , Narseo Vallina-Rodriguez , Marjan Falahrastegar , Julia E Powles , ED Cristofaro , Hamed Haddadi , and Steven J Murdoch . 2016 . Adblocking and counter blocking: A slice of the arms race . In Proceedings of the 2016 USENIX Workshop on Free and Open Communications on the Internet (FOCI). Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E Powles, ED Cristofaro, Hamed Haddadi, and Steven J Murdoch. 2016. Adblocking and counter blocking: A slice of the arms race. In Proceedings of the 2016 USENIX Workshop on Free and Open Communications on the Internet (FOCI)."},{"key":"e_1_3_2_1_54_1","unstructured":"Adblock Plus. 2017. Source: synchronizer.js. https:\/\/adblockplus.org\/jsdoc\/adblockpluscore\/synchronizer.js.html  Adblock Plus. 2017. Source: synchronizer.js. https:\/\/adblockplus.org\/jsdoc\/adblockpluscore\/synchronizer.js.html"},{"key":"e_1_3_2_1_55_1","unstructured":"Adblock plus. 2019. Adblock plus Reports. https:\/\/issues.adblockplus.org\/report  Adblock plus. 2019. Adblock plus Reports. https:\/\/issues.adblockplus.org\/report"},{"key":"e_1_3_2_1_56_1","unstructured":"Adblock Plus. 2019. EasyList of Adblock Plus. https:\/\/easylist-downloads.adblockplus.org\/easylist.txt  Adblock Plus. 2019. EasyList of Adblock Plus. https:\/\/easylist-downloads.adblockplus.org\/easylist.txt"},{"key":"e_1_3_2_1_57_1","unstructured":"Adblock Plus. 2019. EasyPrivacy of Adblock Plus. https:\/\/easylist-downloads.adblockplus.org\/easyprivacy.tpl  Adblock Plus. 2019. EasyPrivacy of Adblock Plus. https:\/\/easylist-downloads.adblockplus.org\/easyprivacy.tpl"},{"key":"e_1_3_2_1_58_1","volume-title":"Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen.","author":"Pochat Victor Le","year":"2018","unstructured":"Victor Le Pochat , Tom Van Goethem , Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen. 2018 . Tranco : A research-oriented top sites ranking hardened against manipulation. arXiv preprint arXiv:1806.01156 (2018). Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen. 2018. Tranco: A research-oriented top sites ranking hardened against manipulation. arXiv preprint arXiv:1806.01156 (2018)."},{"key":"e_1_3_2_1_59_1","unstructured":"PropellerAds. 2019. PropellerAds: AdTech that helps affiliates succeed. https:\/\/propellerads.com\/about-us\/  PropellerAds. 2019. PropellerAds: AdTech that helps affiliates succeed. https:\/\/propellerads.com\/about-us\/"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815705"},{"key":"e_1_3_2_1_61_1","unstructured":"PureVPN. 2018. How to Disable WebRTC in Firefox and Chrome Browsers. https:\/\/www.purevpn.com\/blog\/disable-webrtc-in-chrome-and-firefox\/  PureVPN. 2018. How to Disable WebRTC in Firefox and Chrome Browsers. https:\/\/www.purevpn.com\/blog\/disable-webrtc-in-chrome-and-firefox\/"},{"key":"e_1_3_2_1_62_1","unstructured":"PUREVPN. 2018. WebRTC Leaks Vulnerability-SOLVED (For all Browsers). https:\/\/restoreprivacy.com\/webrtc-leaks\/  PUREVPN. 2018. WebRTC Leaks Vulnerability-SOLVED (For all Browsers). https:\/\/restoreprivacy.com\/webrtc-leaks\/"},{"key":"e_1_3_2_1_63_1","unstructured":"Quantcast. 2018. Top Websites. https:\/\/www.quantcast.com\/top-sites\/US\/1  Quantcast. 2018. Top Websites. https:\/\/www.quantcast.com\/top-sites\/US\/1"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593743.2593749"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278574"},{"key":"e_1_3_2_1_66_1","unstructured":"Wayback CDX Server. 2018. Wayback CDX Server API. https:\/\/github.com\/internetarchive\/wayback\/tree\/master\/wayback-cdx-server  Wayback CDX Server. 2018. Wayback CDX Server API. https:\/\/github.com\/internetarchive\/wayback\/tree\/master\/wayback-cdx-server"},{"key":"e_1_3_2_1_67_1","volume-title":"Proceedings of the Sixth Conference on Email and Anti-Spam (CEAS).","author":"Sheng Steve","year":"2009","unstructured":"Steve Sheng , Brad Wardman , Gary Warner , Lorrie Faith Cranor , Jason Hong , and Chengshan Zhang . 2009 . An empirical analysis of phishing blacklists . In Proceedings of the Sixth Conference on Email and Anti-Spam (CEAS). Steve Sheng, Brad Wardman, Gary Warner, Lorrie Faith Cranor, Jason Hong, and Chengshan Zhang. 2009. An empirical analysis of phishing blacklists. In Proceedings of the Sixth Conference on Email and Anti-Spam (CEAS)."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401965"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690858"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.3115\/1613715.1613751"},{"key":"e_1_3_2_1_71_1","volume-title":"The future of ad blocking: An analytical framework and new techniques. arXiv preprint arXiv:1705.08568","author":"Storey Grant","year":"2017","unstructured":"Grant Storey , Dillon Reisman , Jonathan Mayer , and Arvind Narayanan . 2017. The future of ad blocking: An analytical framework and new techniques. arXiv preprint arXiv:1705.08568 ( 2017 ). Grant Storey, Dillon Reisman, Jonathan Mayer, and Arvind Narayanan. 2017. The future of ad blocking: An analytical framework and new techniques. arXiv preprint arXiv:1705.08568 (2017)."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.17"},{"key":"e_1_3_2_1_73_1","unstructured":"uAssets. 2019. uAssets: resources for uBlock Origin (uBO) uMatrix: static filter lists ready-to-use rulesets etc. https:\/\/github.com\/uBlockOrigin\/uAssets  uAssets. 2019. uAssets: resources for uBlock Origin (uBO) uMatrix: static filter lists ready-to-use rulesets etc. https:\/\/github.com\/uBlockOrigin\/uAssets"},{"key":"e_1_3_2_1_74_1","unstructured":"uBlock. 2019. uBlock-issues. https:\/\/github.com\/uBlockOrigin\/uBlock-issues  uBlock. 2019. uBlock-issues. https:\/\/github.com\/uBlockOrigin\/uBlock-issues"},{"key":"e_1_3_2_1_75_1","unstructured":"uBlockOrigin. 2019. Adblock Plus filters explained. https:\/\/www.chromestat.us.com\/feature\/5675755719622656  uBlockOrigin. 2019. Adblock Plus filters explained. https:\/\/www.chromestat.us.com\/feature\/5675755719622656"},{"key":"e_1_3_2_1_76_1","unstructured":"upOnit. 2019. UPONIT:Who We Are. https:\/\/uponit.com\/who-we-are\/  upOnit. 2019. UPONIT:Who We Are. https:\/\/uponit.com\/who-we-are\/"},{"key":"e_1_3_2_1_77_1","volume-title":"Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking. arXiv preprint arXiv:1810.09160","author":"Vastel Antoine","year":"2018","unstructured":"Antoine Vastel , Peter Snyder , and Benjamin Livshits . 2018. Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking. arXiv preprint arXiv:1810.09160 ( 2018 ). Antoine Vastel, Peter Snyder, and Benjamin Livshits. 2018. Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking. arXiv preprint arXiv:1810.09160 (2018)."},{"key":"e_1_3_2_1_78_1","volume-title":"Jens Grossklags, and Jean-Pierre Hubaux.","author":"Vratonjic Nevena","year":"2013","unstructured":"Nevena Vratonjic , Mohammad Hossein Manshaei , Jens Grossklags, and Jean-Pierre Hubaux. 2013 . Ad-blocking games: Monetizing online content under the threat of ad avoidance. In The Economics of Information Security and Privacy . Nevena Vratonjic, Mohammad Hossein Manshaei, Jens Grossklags, and Jean-Pierre Hubaux. 2013. Ad-blocking games: Monetizing online content under the threat of ad avoidance. In The Economics of Information Security and Privacy."},{"key":"e_1_3_2_1_79_1","unstructured":"W3C. 2018. HTML 5.2:W3C Recommendation. https:\/\/www.w3.org\/TR\/2017\/REC-html52--20171214\/  W3C. 2018. HTML 5.2:W3C Recommendation. https:\/\/www.w3.org\/TR\/2017\/REC-html52--20171214\/"},{"key":"e_1_3_2_1_80_1","unstructured":"W3C. 2019. The Relational Pseudo-class: ':has()'. https:\/\/drafts.csswg.org\/selectors-4\/#has-pseudo  W3C. 2019. The Relational Pseudo-class: ':has()'. https:\/\/drafts.csswg.org\/selectors-4\/#has-pseudo"},{"key":"e_1_3_2_1_81_1","unstructured":"W3C. 2019. The World Wide Web Consortium (W3C). https:\/\/www.w3.org\/  W3C. 2019. The World Wide Web Consortium (W3C). https:\/\/www.w3.org\/"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815703"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950352"},{"key":"e_1_3_2_1_84_1","unstructured":"Webrecorder. 2019. Webrecorder. https:\/\/webrecorder.io  Webrecorder. 2019. Webrecorder. https:\/\/webrecorder.io"},{"key":"e_1_3_2_1_85_1","unstructured":"WebRTC. 2019. Optimum by Altice. https:\/\/webrtc.org\/faq\/#what-is-webrtc  WebRTC. 2019. Optimum by Altice. https:\/\/webrtc.org\/faq\/#what-is-webrtc"},{"key":"e_1_3_2_1_86_1","unstructured":"Williams. 2018. Adblock Plus and (a little) more. https:\/\/adblockplus.org\/blog\/100-million-users-100-million-thank-yous  Williams. 2018. Adblock Plus and (a little) more. https:\/\/adblockplus.org\/blog\/100-million-users-100-million-thank-yous"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2016.21"},{"key":"e_1_3_2_1_88_1","volume-title":"Proceedings of the twelfth International AAAI Conference on Web and Social Media (ICWSM).","author":"Zannettou Savvas","year":"2018","unstructured":"Savvas Zannettou , Jeremy Blackburn , Emiliano De Cristofaro , Michael Sirivianos , and Gianluca Stringhini . 2018 . Understanding web archiving services and their (mis) use on social media . In Proceedings of the twelfth International AAAI Conference on Web and Social Media (ICWSM). Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, and Gianluca Stringhini. 2018. Understanding web archiving services and their (mis) use on social media. In Proceedings of the twelfth International AAAI Conference on Web and Social Media (ICWSM)."},{"key":"e_1_3_2_1_89_1","volume-title":"Proceedings of the 2017 Network and Distributed System Security Symposium(NDSS).","author":"Zhu Shitong","year":"2017","unstructured":"Shitong Zhu , Xunchao Hu , Zhiyun Qian , Zubair Shafiq , and Heng Yin . 2017 . Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis . In Proceedings of the 2017 Network and Distributed System Security Symposium(NDSS). Shitong Zhu, Xunchao Hu, Zhiyun Qian, Zubair Shafiq, and Heng Yin. 2017. Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis. In Proceedings of the 2017 Network and Distributed System Security Symposium(NDSS)."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313558"}],"event":{"name":"IMC '19: ACM Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Amsterdam Netherlands","acronym":"IMC '19"},"container-title":["Proceedings of the Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3355369.3355588","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3355369.3355588","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3355369.3355588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:33Z","timestamp":1750202613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3355369.3355588"}},"subtitle":["Analyzing the Crowdsourcing Process of Ad-blocking Systems"],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":90,"alternative-id":["10.1145\/3355369.3355588","10.1145\/3355369"],"URL":"https:\/\/doi.org\/10.1145\/3355369.3355588","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}