5 research outputs found
Beyond the Front Page: Measuring Third Party Dynamics in the Field
In the modern Web, service providers often rely heavily on third parties to
run their services. For example, they make use of ad networks to finance their
services, externally hosted libraries to develop features quickly, and
analytics providers to gain insights into visitor behavior.
For security and privacy, website owners need to be aware of the content they
provide their users. However, in reality, they often do not know which third
parties are embedded, for example, when these third parties request additional
content as it is common in real-time ad auctions.
In this paper, we present a large-scale measurement study to analyze the
magnitude of these new challenges. To better reflect the connectedness of third
parties, we measured their relations in a model we call third party trees,
which reflects an approximation of the loading dependencies of all third
parties embedded into a given website. Using this concept, we show that
including a single third party can lead to subsequent requests from up to eight
additional services. Furthermore, our findings indicate that the third parties
embedded on a page load are not always deterministic, as 50% of the branches in
the third party trees change between repeated visits. In addition, we found
that 93% of the analyzed websites embedded third parties that are located in
regions that might not be in line with the current legal framework. Our study
also replicates previous work that mostly focused on landing pages of websites.
We show that this method is only able to measure a lower bound as subsites show
a significant increase of privacy-invasive techniques. For example, our results
show an increase of used cookies by about 36% when crawling websites more
deeply
Lightweight Address Hopping for Defending the IPv6 IoT
The rapid deployment of IoT systems on the public Internet is not
without concerns for the security and privacy of consumers. Security
in IoT systems is often poorly engineered and engineering for
privacy does not seem to be a concern for vendors at all. The combination
of poor security hygiene and access to valuable knowledge
renders IoT systems a much-sought target for attacks.
IoT systems are not only Internet-accessible but also play the
role of servers according to the established client-server communication
model and are thus configured with static and/or easily
predictable IPv6 addresses, rendering them an easy target for attacks.
We present 6HOP, a novel addressing scheme for IoT devices.
Our proposal is lightweight in operation, requires minimal administration
overhead, and defends against reconnaissance attacks, address
based correlation as well as denial-of-service attacks. 6HOP
therefore exploits the ample address space available in IPv6 networks
and provides effective protection this way
