{"id":"https://openalex.org/W3183363884","doi":"https://doi.org/10.1109/infocomwkshps51825.2021.9484564","title":"A system for detecting third-party tracking through the combination of dynamic analysis and static analysis","display_name":"A system for detecting third-party tracking through the combination of dynamic analysis and static analysis","publication_year":2021,"publication_date":"2021-05-10","ids":{"openalex":"https://openalex.org/W3183363884","doi":"https://doi.org/10.1109/infocomwkshps51825.2021.9484564","mag":"3183363884"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps51825.2021.9484564","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps51825.2021.9484564","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063979683","display_name":"Jingxue Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingxue Sun","raw_affiliation_strings":["National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","School of Cyber Engineering, Xidian University, Xi\u2019an, China","School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025184050","display_name":"Zhiqiu Huang","orcid":"https://orcid.org/0000-0001-6843-1892"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiu Huang","raw_affiliation_strings":["National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101473869","display_name":"Ting Yang","orcid":"https://orcid.org/0000-0002-5939-517X"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Yang","raw_affiliation_strings":["National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079084953","display_name":"Wengjie Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wengjie Wang","raw_affiliation_strings":["National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100401884","display_name":"Yuqing Zhang","orcid":"https://orcid.org/0000-0001-8306-7195"},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqing Zhang","raw_affiliation_strings":["National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","School of Computer Science and Cyberspace Security, Hainan University, Haikou, China","School of Cyber Engineering, Xidian University, Xi\u2019an, China","School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"School of Computer Science and Cyberspace Security, Hainan University, Haikou, China","institution_ids":["https://openalex.org/I20942203"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5063979683"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I4210108629","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.6094,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.663286,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blacklist","display_name":"Blacklist","score":0.9645751714706421},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.9146422147750854},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8321220874786377},{"id":"https://openalex.org/keywords/bittorrent-tracker","display_name":"BitTorrent tracker","score":0.7437903881072998},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.6219708323478699},{"id":"https://openalex.org/keywords/third-party","display_name":"Third party","score":0.5012302398681641},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.4978795051574707},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3875366151332855},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35671359300613403},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3403106927871704},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.22277593612670898},{"id":"https://openalex.org/keywords/eye-tracking","display_name":"Eye tracking","score":0.16616249084472656}],"concepts":[{"id":"https://openalex.org/C2781345505","wikidata":"https://www.wikidata.org/wiki/Q2535979","display_name":"Blacklist","level":2,"score":0.9645751714706421},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.9146422147750854},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8321220874786377},{"id":"https://openalex.org/C57501372","wikidata":"https://www.wikidata.org/wiki/Q2021268","display_name":"BitTorrent tracker","level":3,"score":0.7437903881072998},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.6219708323478699},{"id":"https://openalex.org/C2983583741","wikidata":"https://www.wikidata.org/wiki/Q16785388","display_name":"Third party","level":2,"score":0.5012302398681641},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.4978795051574707},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3875366151332855},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35671359300613403},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3403106927871704},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.22277593612670898},{"id":"https://openalex.org/C56461940","wikidata":"https://www.wikidata.org/wiki/Q970687","display_name":"Eye tracking","level":2,"score":0.16616249084472656},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps51825.2021.9484564","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps51825.2021.9484564","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5299999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W40617705","https://openalex.org/W1525967479","https://openalex.org/W1770989051","https://openalex.org/W1966175380","https://openalex.org/W1968417201","https://openalex.org/W2000137535","https://openalex.org/W2021408682","https://openalex.org/W2045726900","https://openalex.org/W2072909393","https://openalex.org/W2099474262","https://openalex.org/W2124436456","https://openalex.org/W2159764755","https://openalex.org/W2162763684","https://openalex.org/W2193112429","https://openalex.org/W2262076099","https://openalex.org/W2296313016","https://openalex.org/W2297075900","https://openalex.org/W2520877058","https://openalex.org/W2594545251","https://openalex.org/W2612608334","https://openalex.org/W2643441730","https://openalex.org/W2733782703","https://openalex.org/W3121347312","https://openalex.org/W4295023194","https://openalex.org/W6631337276","https://openalex.org/W6674986822","https://openalex.org/W6683957593","https://openalex.org/W6692952851"],"related_works":["https://openalex.org/W2520877058","https://openalex.org/W2249832986","https://openalex.org/W2193112429","https://openalex.org/W2892196156","https://openalex.org/W4387947354","https://openalex.org/W4237233976","https://openalex.org/W2797171593","https://openalex.org/W4225751402","https://openalex.org/W3037087970","https://openalex.org/W1200299632"],"abstract_inverted_index":{"With":[0],"the":[1,29,91,137,145,157,182,190,194,215,225],"continuous":[2],"development":[3],"of":[4,72,93,104,234,241],"Internet":[5],"technology,":[6],"people":[7],"pay":[8],"more":[9,11,65],"and":[10,45,56,67,96,108,115,124,143,188,219,243],"attention":[12],"to":[13,33,38,48,58,62],"private":[14],"security.":[15,26],"In":[16,60],"particular,":[17],"third-party":[18,35,84,99,171,205,235],"tracking":[19,36,122],"is":[20,37,54,88,111,117,238],"a":[21,40,78,112,118,133,169,178,203,232,239],"major":[22],"factor":[23],"affecting":[24],"privacy":[25],"So":[27],"far,":[28],"most":[30],"effective":[31],"way":[32],"prevent":[34],"create":[39],"blacklist.":[41],"However,":[42],"blacklist":[43],"generation":[44],"maintenance":[46],"need":[47],"be":[49],"carried":[50],"out":[51],"manually":[52],"which":[53,237],"inefficient":[55],"difficult":[57],"maintain.":[59],"order":[61],"generate":[63],"blacklists":[64],"quickly":[66],"accurately":[68],"in":[69,139,148,184,193,214,224],"this":[70,75],"era":[71],"big":[73],"data,":[74],"paper":[76],"proposes":[77],"machine":[79],"learning":[80],"system":[81,87,102],"MFTrackerDetector":[82,229],"against":[83],"tracking.":[85],"The":[86,101],"based":[89],"on":[90],"theory":[92],"structural":[94],"hole":[95],"only":[97],"detects":[98],"trackers.":[100],"consists":[103],"two":[105],"subsystems,":[106],"DMTrackerDetector":[107,110,131,166,220],"DFTrackerDetector.":[109],"JavaScript-based":[113,170],"subsystem":[114],"DFTrackerDetector":[116,176,200,210],"Flash-based":[119,204],"subsystem.":[120],"Because":[121],"code":[123,126,164],"non-tracking":[125],"often":[127],"call":[128],"different":[129],"APIs,":[130],"builds":[132],"classifier":[134,179],"using":[135,180],"all":[136,181],"APIs":[138,183],"JavaScript":[140,149,226],"as":[141,186],"features":[142,147,187,192],"extracts":[144,189],"API":[146,191],"through":[150,197],"dynamic":[151,158],"analysis.":[152,199],"Unlike":[153],"static":[154,198],"analysis":[155,159],"method,":[156],"method":[160],"can":[161],"effectively":[162],"avoid":[163],"obfuscation.":[165],"eventually":[167,230],"generates":[168,202,231],"tracker":[172,206],"list":[173,207,233],"named":[174,208],"Jlist.":[175],"constructs":[177],"ActionScript":[185],"flash":[195],"script":[196],"finally":[201],"Flist.":[209,244],"achieved":[211,221],"92.98%":[212],"accuracy":[213,223],"Flash":[216],"test":[217,227],"set":[218],"90.79%":[222],"set.":[228],"trackers,":[236],"combination":[240],"Jlist":[242]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
