{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:02:00Z","timestamp":1775815320526,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004801","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1916500"],"award-info":[{"award-number":["1916500"]}],"id":[{"id":"10.13039\/501100004801","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423631","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"724-737","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["When Push Comes to Ads"],"prefix":"10.1145","author":[{"given":"Karthika","family":"Subramani","sequence":"first","affiliation":[{"name":"University of Georgia"}]},{"given":"Xingzi","family":"Yuan","sequence":"additional","affiliation":[{"name":"University of Georgia"}]},{"given":"Omid","family":"Setayeshfar","sequence":"additional","affiliation":[{"name":"University of Georgia"}]},{"given":"Phani","family":"Vadrevu","sequence":"additional","affiliation":[{"name":"University of New Orleans"}]},{"given":"Kyu Hyung","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Georgia"}]},{"given":"Roberto","family":"Perdisci","sequence":"additional","affiliation":[{"name":"University of Georgia Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Ad Block Plus. https:\/\/adblockplus.org. (Last accessed Sep.17","year":"2020","unstructured":"2020. Ad Block Plus. https:\/\/adblockplus.org. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_2_1","unstructured":"2020. AdBlaster Adblocker. https:\/\/www.adblaster.org\/."},{"key":"e_1_3_2_2_3_1","volume-title":"Bing Ad Content Policies. https:\/\/about.ads.microsoft.com\/en-us\/resources\/policies\/ad-content-policies. (Last accessed Sep.17","year":"2020","unstructured":"2020. Bing Ad Content Policies. https:\/\/about.ads.microsoft.com\/en-us\/resources\/policies\/ad-content-policies. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_4_1","volume-title":"Brave Ad Block. https:\/\/brave.com. (Last accessed Sep.17","year":"2020","unstructured":"2020. Brave Ad Block. https:\/\/brave.com. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_5_1","volume-title":"Cost per mille. https:\/\/en.wikipedia.org\/wiki\/Cost_per_mille. (Last accessed Sep.17","year":"2020","unstructured":"2020. Cost per mille. https:\/\/en.wikipedia.org\/wiki\/Cost_per_mille. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_6_1","volume-title":"https:\/\/easylist.to\/. (Last accessed Sep.17","year":"2020","unstructured":"2020. Easylist. https:\/\/easylist.to\/. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_7_1","volume-title":"Extensions visibility into Service Worker. https:\/\/groups.google.com\/a\/chromium.org\/g\/chromium-extensions\/c\/K-XAwApkyN0\/m\/gX9cA4ZCAgAJ?pli=1. (Last accessed Sep.17","year":"2020","unstructured":"2020. Extensions visibility into Service Worker. https:\/\/groups.google.com\/a\/chromium.org\/g\/chromium-extensions\/c\/K-XAwApkyN0\/m\/gX9cA4ZCAgAJ?pli=1. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_8_1","unstructured":"2020. Gensim Word2Vec Model. https:\/\/radimrehurek.com\/gensim\/models\/word2vec.html."},{"key":"e_1_3_2_2_9_1","volume-title":"Google Ads Policies. https:\/\/support.google.com\/adspolicy\/answer\/6020954?hl=en. (Last accessed Sep.17","year":"2020","unstructured":"2020. Google Ads Policies. https:\/\/support.google.com\/adspolicy\/answer\/6020954?hl=en. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_10_1","volume-title":"Google Quiet UI for Notifications. https:\/\/blog.chromium.org\/2020\/01\/introducing-quieter-permission-ui-for.html. (Last accessed Sep.17","year":"2020","unstructured":"2020. Google Quiet UI for Notifications. https:\/\/blog.chromium.org\/2020\/01\/introducing-quieter-permission-ui-for.html. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_11_1","unstructured":"2020. Google Safe Browsing: Blocklisting Platform. https:\/\/safebrowsing.google.com\/."},{"key":"e_1_3_2_2_12_1","volume-title":"Introduction to Push Notifications. https:\/\/developers.google.com\/web\/ilt\/pwa\/introduction-to-push-notifications. (Last accessed Sep.17","year":"2020","unstructured":"2020. Introduction to Push Notifications. https:\/\/developers.google.com\/web\/ilt\/pwa\/introduction-to-push-notifications. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_13_1","volume-title":"Introduction to Service Worker. https:\/\/developers.google.com\/web\/ilt\/pwa\/introduction-to-service-worker. (Last accessed Sep.17","year":"2020","unstructured":"2020. Introduction to Service Worker. https:\/\/developers.google.com\/web\/ilt\/pwa\/introduction-to-service-worker. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_14_1","volume-title":"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Notifications_API. (Last accessed Sep.17","author":"Notifications","year":"2020","unstructured":"2020. Notifications API. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Notifications_API. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_15_1","volume-title":"Public WWW Usage Examples. https:\/\/publicwww.com\/examples\/ads.html. (Last accessed Sep.17","year":"2020","unstructured":"2020. Public WWW Usage Examples. https:\/\/publicwww.com\/examples\/ads.html. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_16_1","volume-title":"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Push_API. (Last accessed Sep.17","author":"Push","year":"2020","unstructured":"2020. Push API. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Push_API. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_17_1","volume-title":"Richpush Ad Network. https:\/\/richpush.co. (Last accessed Sep.17","year":"2020","unstructured":"2020. Richpush Ad Network. https:\/\/richpush.co. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_18_1","volume-title":"The State of Push Notification Advertising. https:\/\/www.izooto.com\/hubfs\/TheStateofPushNotificationAds-iZootoreport.pdf. (Last accessed Sep.17","year":"2020","unstructured":"2020. The State of Push Notification Advertising. https:\/\/www.izooto.com\/hubfs\/TheStateofPushNotificationAds-iZootoreport.pdf. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_19_1","volume-title":"Using Application Cache. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTML\/Using_the_application_cache. (Last accessed Sep.17","year":"2020","unstructured":"2020. Using Application Cache. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTML\/Using_the_application_cache. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_20_1","volume-title":"Using Service Workers. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Service_Worker_API\/Using_Service_Workers. (Last accessed Sep.17","year":"2020","unstructured":"2020. Using Service Workers. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Service_Worker_API\/Using_Service_Workers. (Last accessed Sep.17, 2020)."},{"key":"e_1_3_2_2_21_1","unstructured":"2020. Virus Total: Blocklisting Platform. https:\/\/www.virustotal.com\/."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567992"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278573"},{"key":"e_1_3_2_2_24_1","volume-title":"25th {USENIX} Security Symposium ({USENIX} Security 16).481--496.","author":"Bashir Muhammad Ahmad","unstructured":"Muhammad Ahmad Bashir, Sajjad Arshad, William Robertson, and Christo Wilson. 2016. Tracing information flows between ad exchanges using retargeted ads. In 25th {USENIX} Security Symposium ({USENIX} Security 16).481--496."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","unstructured":"Andreas Bi\u00c3\u00ffrn-Hansen Tim A. Majchrzak and Tor-Morten Gr\u00c3\u00ffnli. 2017. Progressive Web Apps: The Possible Web-native Unifier for Mobile Development.344--351. https:\/\/doi.org\/10.5220\/0006353703440351","DOI":"10.5220\/0006353703440351"},{"key":"e_1_3_2_2_26_1","volume-title":"Revisiting Mobile Advertising Threats with MAdLife. In The World Wide Web Conference. ACM, 207--217","author":"Chen Gong","year":"2019","unstructured":"Gong Chen, Wei Meng, and John Copeland. 2019. Revisiting Mobile Advertising Threats with MAdLife. In The World Wide Web Conference. ACM, 207--217."},{"key":"e_1_3_2_2_27_1","volume-title":"Clark and Damon McCoy","author":"Jason","year":"2013","unstructured":"Jason W. Clark and Damon McCoy. 2013. There Are No Free iPads: An Analysis of Survey Scams as a Business. In Presented as part of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats. USENIX, Washington, D.C. https:\/\/www.usenix.org\/conference\/leet13\/workshop-program\/presentation\/Clark"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594391"},{"key":"e_1_3_2_2_29_1","volume-title":"Docker: Enterprise Container Platform. https:\/\/www.docker.com\/. (Last accessed Nov.1","year":"2019","unstructured":"Docker. 2019. Docker: Enterprise Container Platform. https:\/\/www.docker.com\/. (Last accessed Nov.1, 2019)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091514"},{"key":"e_1_3_2_2_31_1","volume-title":"Documentation on Similarity Computation in Gensim Library. https:\/\/radimrehurek.com\/gensim\/similarities\/docsim.html (Last accessed Nov.11","year":"2019","unstructured":"Gensim. 2019. Documentation on Similarity Computation in Gensim Library. https:\/\/radimrehurek.com\/gensim\/similarities\/docsim.html (Last accessed Nov.11, 2019)."},{"key":"e_1_3_2_2_32_1","volume-title":"Puppeteer: Chormium Browser Automation Tool","year":"2019","unstructured":"Google. 2019. Puppeteer: Chormium Browser Automation Tool. http:\/\/liwc.wpengine.com\/compare-dictionaries\/. (Last accessed Nov.11, 2019)."},{"key":"e_1_3_2_2_33_1","volume-title":"Set up a JavaScript Firebase Cloud Messaging client app. https:\/\/firebase.google.com\/docs\/cloud-messaging\/js\/client. (Last accessed Nov.1","year":"2019","unstructured":"Google. 2019. Set up a JavaScript Firebase Cloud Messaging client app. https:\/\/firebase.google.com\/docs\/cloud-messaging\/js\/client. (Last accessed Nov.1, 2019)."},{"key":"e_1_3_2_2_34_1","volume-title":"Charles Kamhoua, Kevin A Kwiat, and Laurent Njilla.","author":"Huang Chin-Tser","year":"2018","unstructured":"Chin-Tser Huang, Muhammad Nazmus Sakib, Charles Kamhoua, Kevin A Kwiat, and Laurent Njilla. 2018. A Bayesian Game Theoretic Approach for Inspecting Web-based Malvertising. IEEE Transactions on Dependable and Secure Computing (2018)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00005"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355599"},{"key":"e_1_3_2_2_37_1","volume-title":"Surveylance: Auto-matically Detecting Online Survey Scams. In 2018 IEEE Symposium on Security and Privacy, SP 2018","author":"Kharraz Amin","year":"2018","unstructured":"Amin Kharraz, William K. Robertson, and Engin Kirda. 2018. Surveylance: Auto-matically Detecting Online Survey Scams. In 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA.70--86."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243867"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23319"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382267"},{"key":"e_1_3_2_2_41_1","volume-title":"11th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 14).57--70.","author":"Liu Bin","unstructured":"Bin Liu, Suman Nath, Ramesh Govindan, and Jie Liu. 2014. {DECAF}: Detecting and Characterizing Ad Fraud in Mobile Apps. In 11th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 14).57--70."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"Tim A. Majchrzak Andreas Bi\u00f8rn-Hansen and Tor-Morten Gr\u00f8nli. 2018. Progressive Web Apps: the Definite Approach to Cross-Platform Development?. In HICSS.","DOI":"10.24251\/HICSS.2018.718"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.7"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2017.7921994"},{"key":"e_1_3_2_2_45_1","volume-title":"Web Push Notifications: Timely, Relevant, and Precise. https:\/\/developers.google.com\/web\/fundamentals\/push-notifications. (Last accessed Nov.1","author":"Medley Joseph","year":"2019","unstructured":"Joseph Medley. 2019. Web Push Notifications: Timely, Relevant, and Precise. https:\/\/developers.google.com\/web\/fundamentals\/push-notifications. (Last accessed Nov.1, 2019)."},{"key":"e_1_3_2_2_46_1","volume-title":"Dial One for Scam: A Large-Scale Analysis of Technical Support Scams. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Miramirkhani Najmeh","year":"2017","unstructured":"Najmeh Miramirkhani, Oleksii Starov, and Nick Nikiforakis. 2017. Dial One for Scam: A Large-Scale Analysis of Technical Support Scams. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860498"},{"key":"e_1_3_2_2_48_1","volume-title":"Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019","author":"Papadopoulos Panagiotis","year":"2019","unstructured":"Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis, and Giorgos Vasiliadis. 2019. Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23030"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"crossref","unstructured":"Vaibhav Rastogi Rui Shao Yan Chen Xiang Pan Shihong Zou and Ryan Riley. 2016. Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.. In NDSS.","DOI":"10.14722\/ndss.2016.23234"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46598-2_14"},{"key":"e_1_3_2_2_52_1","volume-title":"Documentation on Silhoutte Score metric to compute distance between clusters. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.metrics.silhouette_score.html (Last accessed Nov.11","year":"2019","unstructured":"Scikit-Learn. 2019. Documentation on Silhoutte Score metric to compute distance between clusters. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.metrics.silhouette_score.html (Last accessed Nov.11, 2019)."},{"key":"e_1_3_2_2_53_1","volume-title":"Selenium: Web Browser Automation Tool. https:\/\/www.seleniumhq.org\/. (Last accessed Nov.11","year":"2019","unstructured":"Selenium. 2019. Selenium: Web Browser Automation Tool. https:\/\/www.seleniumhq.org\/. (Last accessed Nov.11, 2019)."},{"key":"e_1_3_2_2_54_1","volume-title":"Soft similarity and soft cosine measure: Similarity of features in vector space model. Computaci\u00f3n y Sistemas 18, 3","author":"Sidorov Grigori","year":"2014","unstructured":"Grigori Sidorov, Alexander Gelbukh, Helena G\u00f3mez-Adorno, and David Pinto. 2014. Soft similarity and soft cosine measure: Similarity of features in vector space model. Computaci\u00f3n y Sistemas 18, 3 (2014), 491--504."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(11)70041-0"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186089"},{"key":"e_1_3_2_2_57_1","unstructured":"LBE Tech. 2019. Parallel Space - Multiple accounts and Two face. http:\/\/parallel-app.com\/. (Last accessed Nov.1 2019)."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355600"},{"key":"e_1_3_2_2_59_1","volume-title":"Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking. CoRR abs\/1810.09160","author":"Vastel Antoine","year":"2018","unstructured":"Antoine Vastel, Peter Snyder, and Benjamin Livshits. 2018. Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking. CoRR abs\/1810.09160 (2018)."},{"key":"e_1_3_2_2_60_1","volume-title":"What is Banner Blindness? https:\/\/en.wikipedia.org\/wiki\/Banner_blindness. (Last accessed Nov.11","year":"2019","unstructured":"Wikipedia. 2019. What is Banner Blindness? https:\/\/en.wikipedia.org\/wiki\/Banner_blindness. (Last accessed Nov.11, 2019)."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663719"}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","location":"Virtual Event USA","acronym":"IMC '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423631","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:38:48Z","timestamp":1765841928000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423631"}},"subtitle":["Measuring the Rise of (Malicious) Push Advertising"],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":61,"alternative-id":["10.1145\/3419394.3423631","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423631","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}