skip to main content
research-article

Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking

Published:12 June 2020Publication History
Skip Abstract Section

Abstract

Ad and tracking blocking extensions are popular tools for improving web performance, privacy and aesthetics. Content blocking extensions generally rely on filter lists to decide whether a web request is associated with tracking or advertising, and so should be blocked. Millions of web users rely on filter lists to protect their privacy and improve their browsing experience. Despite their importance, the growth and health of filter lists are poorly understood. Filter lists are maintained by a small number of contributors who use undocumented heuristics and intuitions to determine what rules should be included. Lists quickly accumulate rules, and rules are rarely removed. As a result, users' browsing experiences are degraded as the number of stale, dead or otherwise not useful rules increasingly dwarf the number of useful rules, with no attenuating benefit. An accumulation of "dead weight" rules also makes it difficult to apply filter lists on resource-limited mobile devices. This paper improves the understanding of crowdsourced filter lists by studying EasyList, the most popular filter list. We measure how EasyList affects web browsing by applying EasyList to a sam- ple of 10,000 websites. We find that 90.16% of the resource blocking rules in EasyList provide no benefit to users in common browsing scenarios. We use our measurements of rule application rates to taxonomies ways advertisers evade EasyList rules. Finally, we propose optimizations for popular ad-blocking tools that (i) allow EasyList to be applied on performance constrained mobile devices and (ii) improve desktop performance by 62.5%, while preserving over 99% of blocking coverage. We expect these optimizations to be most useful for users in non-English locals, who rely on supplemental filter lists for effective blocking and protections.

References

  1. Mshabab Alrizah, Sencun Zhu, Xinyu Xing, and Gang Wang. Errors, misunderstandings, and attacks: Analyzing the crowdsourcing process of ad-blocking systems. 2019.Google ScholarGoogle Scholar
  2. Steven Englehardt and Arvind Narayanan. Online Tracking: A 1-million-site Measurement and Analysis Steven. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, (1):1388--1401, 2016.Google ScholarGoogle Scholar
  3. Kiran Garimella, Orestis Kostakis, and Michael Mathioudakis. Ad-blocking: A study on performance, privacy and counter-measures. In Proceedings of the 2017 ACM on Web Science Conference, pages 259--262. ACM, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Arthur Gervais, Alexandros Filios, Vincent Lenders, and Srdjan Capkun. Quantifying web adblocker privacy. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10493 LNCS:21--42, 2017.Google ScholarGoogle Scholar
  5. David Gugelmann, Markus Happe, Bernhard Ager, and Vincent Lenders. An Automated Approach for Complementing Ad Blockers' Blacklists. Proceedings on Privacy Enhancing Technologies, 2015(2):282--298, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  6. Luca Invernizzi, Kurt Thomas, Alexandros Kapravelos, Oxana Comanescu, Jean-Michel Picod, and Elie Bursztein. Cloak of visibility: detecting when machines browse a different web. In Security and Privacy (SP), 2016 IEEE Symposium on, pages 743--758. IEEE, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  7. Umar Iqbal, Zubair Shafiq, and Zhiyun Qian. The Ad Wars: Retrospective Measurement and Analysis of Anti-Adblock Filter Lists. ACM SIGCOMM Conference on Internet Measurement Conference (IMC), 13, 2017.Google ScholarGoogle Scholar
  8. Umar Iqbal, Zubair Shafiq, Peter Snyder, Shitong Zhu, Zhiyun Qian, and Benjamin Livshits. AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking. 2018.Google ScholarGoogle Scholar
  9. Omer Katz and Benjamin Livshits. Toward an evidence-based design for reactive security policies and mechanisms. arXiv preprint arXiv:1802.08915, 2018.Google ScholarGoogle Scholar
  10. Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner. Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. Usenix Security, 2016.Google ScholarGoogle Scholar
  11. Zhou Li, Kehuan Zhang, Yinglian Xie, Fang Yu, and XiaoFeng Wang. Knowing your enemy: understanding and detecting malicious web advertising. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 674--686. ACM, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Timothy Libert. Exposing the hidden web: An analysis of third-party HTTP requests on 1 million websites. International Journal of Communication, 9(1):3544--3561, 2015.Google ScholarGoogle Scholar
  13. M Malloy, M McNamara, A Cahn, and P Barford. Ad blockers: Global prevalence and impact. Imc'16, 14--16-Nove:119--125, 2016.Google ScholarGoogle Scholar
  14. Arunesh Mathur, Jessica Vitak, Arvind Narayanan, and Marshini Chetty. Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking. Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 2018.Google ScholarGoogle Scholar
  15. Georg Merzdovnik, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, and Edgar Weippl. Block Me if You Can: A Large-Scale Study of Tracker-Blocking Tools. Proceedings - 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017, pages 319--333, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  16. Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, and Steven J. Murdoch. Ad-blocking and counter blocking: A slice of the arms race. CoRR, abs/1605.05077, 2016.Google ScholarGoogle Scholar
  17. Enric Pujol, Oliver Hohlfeld, and Anja Feldmann. Annoyed users: Ads and ad-block usage in the wild. In Proceedings of the 2015 Internet Measurement Conference, pages 93--106. ACM, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Quirin Scheitle, Oliver Hohlfeld, Julien Gamba, Jonas Jelten, Torsten Zimmermann, Stephen D Strowes, and Narseo Vallina-Rodriguez. A long way to the top: Significance, structure, and stability of internet top lists. arXiv preprint arXiv:1805.11506, 2018.Google ScholarGoogle Scholar
  19. Alexander Sjosten, Peter Snyder, Antonio Pastor, Panagiotis Papadopoulos, and Benjamin Livshits. Generation of filter lists for regions that are underserved. WWW, 2020.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Peter Snyder, Cynthia Taylor, and Chris Kanich. Most websites don't need to vibrate: A cost-benefit approach to improving browser security. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 179--194. ACM, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Grant Storey, Dillon Reisman, Jonathan Mayer, and Arvind Narayanan. The Future of Ad Blocking: An Analytical Framework and New Techniques. 2017.Google ScholarGoogle Scholar
  22. Weihang Wang, Yunhui Zheng, Xinyu Xing, Yonghwi Kwon, Xiangyu Zhang, and Patrick Eugster. WebRanz: web page randomization for better advertisement delivery and web-bot prevention. Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2016, pages 205--216, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Zhonghao Yu, Sam Macbeth, Konark Modi, and Josep M. Pujol. Tracking the Trackers. Proceedings of the 25th International Conference on World Wide Web - WWW '16, pages 121--132, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna. The dark alleys of madison avenue: Understanding malicious advertisements. In Proceedings of the 2014 Conference on Internet Measurement Conference, pages 373--380. ACM, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Shitong Zhu, Xunchao Hu, Zhiyun Qian, Zubair Shafiq, and Heng Yin. Measuring and disrupting anti-adblockers using differential execution analysis. In The Network and Distributed System Security Symposium (NDSS), 2018.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!