The chain of implicit trust: An analysis of the web third-party resources loading

M Ikram, R Masood, G Tyson, MA Kaafar… - The World Wide Web …, 2019 - dl.acm.org
The Web is a tangled mass of interconnected services, where websites import a range of
external resources from various third-party domains. The latter can also load resources …

Casino royale: a deep exploration of illegal online gambling

H Yang, K Du, Y Zhang, S Hao, Z Li, M Liu… - Proceedings of the 35th …, 2019 - dl.acm.org
The popularity of online gambling could bring negative social impact, and many countries
ban or restrict online gambling. Taking China for example, online gambling violates Chinese …

Pythia: a framework for the automated analysis of web hosting environments

S Matic, G Tyson, G Stringhini - The World Wide Web Conference, 2019 - dl.acm.org
A common approach when setting up a website is to utilize third party Web hosting and
content delivery networks. Without taking this trend into account, any measurement study …

Where are you taking me? understanding abusive traffic distribution systems

J Szurdi, M Luo, B Kondracki, N Nikiforakis… - Proceedings of the Web …, 2021 - dl.acm.org
Illicit website owners frequently rely on traffic distribution systems (TDSs) operated by less-
than-scrupulous advertising networks to acquire user traffic. While researchers have …

An empirical measurement study of free live streaming services

S Keshvadi, C Williamson - … Conference, PAM 2021, Virtual Event, March …, 2021 - Springer
Live streaming is one of the most popular Internet activities. Nowadays, there has been an
increase in free live streaming (FLS) services that provide unauthorized broadcasting of live …

Who watches the watchmen: Exploring complaints on the web

D Ibosiola, I Castro, G Stringhini, S Uhlig… - The World Wide Web …, 2019 - dl.acm.org
Under increasing scrutiny, many web companies now offer bespoke mechanisms allowing
any third party to file complaints (eg, requesting the de-listing of a URL from a search …

Freqywm: Frequency watermarking for the new data economy

D İşler, E Cabana, A Garcia–Recuero… - 2024 IEEE 40th …, 2024 - ieeexplore.ieee.org
We present a novel technique for modulating the appearance frequency of a few tokens
within a dataset for encoding an invisible watermark that can be used to protect ownership …

Under the concealing surface: Detecting and understanding live webcams in the wild

JK Song, Q Li, H Wang, L Sun - … of the ACM on Measurement and …, 2020 - dl.acm.org
Given the central role of webcams in monitoring physical surroundings, it behooves the
research community to understand the characteristics of webcams' distribution and their …

Node-imbalance learning on heterogeneous graph for pirated video website detection

S Zhang, J Yin, Z Li, R Yang, M Du… - 2022 IEEE 25th …, 2022 - ieeexplore.ieee.org
With the rapid development of video streaming, the problem of copyright infringement has
become increasingly severe. Despite its explicit illegality in many countries, a large variety of …

Decoding the Kodi Ecosystem

Y Xiao, M Varvello, M Warrior… - ACM Transactions on the …, 2023 - dl.acm.org
Free and open-source media centers are experiencing a boom in popularity for the
convenience they offer users seeking to remotely consume digital content. Kodi is today's …