Turning the Tide on Dark Pools? Towards Multi-Stakeholder Vulnerability Notifications in the Ad-Tech Supply Chain
- URL: http://arxiv.org/abs/2406.06958v1
- Date: Tue, 11 Jun 2024 05:31:29 GMT
- Title: Turning the Tide on Dark Pools? Towards Multi-Stakeholder Vulnerability Notifications in the Ad-Tech Supply Chain
- Authors: Yash Vekaria, Rishab Nithyanand, Zubair Shafiq,
- Abstract summary: We investigate the effectiveness of vulnerability notification campaigns aimed at mitigating dark pooling.
Our nine-month long multi-stakeholder notification study shows that notifications are an effective method for reducing dark pooling vulnerabilities.
In addition to being the first notification study targeting the online advertising ecosystem, we are also the first to study multi-stakeholder context in vulnerability notifications.
- Score: 12.425164873579574
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Online advertising relies on a complex and opaque supply chain that involves multiple stakeholders, including advertisers, publishers, and ad-networks, each with distinct and sometimes conflicting incentives. Recent research has demonstrated the existence of ad-tech supply chain vulnerabilities such as dark pooling, where low-quality publishers bundle their ad inventory with higher-quality ones to mislead advertisers. We investigate the effectiveness of vulnerability notification campaigns aimed at mitigating dark pooling. Prior research on vulnerability notifications has primarily focused on single-stakeholder scenarios, and it is unclear whether vulnerability notifications can be effective in the multi-stakeholder ad-tech supply chain. We implement an automated vulnerability notification pipeline to systematically evaluate the responsiveness of various stakeholders, including publishers, ad-networks, and advertisers to vulnerability notifications by academics and activists. Our nine-month long multi-stakeholder notification study shows that notifications are an effective method for reducing dark pooling vulnerabilities in the online advertising ecosystem, especially when targeted towards ad-networks. Further, the sender reputation does not impact responses to notifications from activists and academics in a statistically different way. In addition to being the first notification study targeting the online advertising ecosystem, we are also the first to study multi-stakeholder context in vulnerability notifications.
Related papers
- TabSec: A Collaborative Framework for Novel Insider Threat Detection [8.27921273043059]
In the era of the Internet of Things (IoT) and data sharing, users frequently upload their personal information to enterprise databases to enjoy enhanced service experiences.
However, the widespread presence of system vulnerabilities, remote network intrusions, and insider threats significantly increases the exposure of private enterprise data on the internet.
This paper proposes a novel threat detection framework, TabITD, to address these challenges.
arXiv Detail & Related papers (2024-11-04T04:07:16Z) - Why am I Still Seeing This: Measuring the Effectiveness Of Ad Controls and Explanations in AI-Mediated Ad Targeting Systems [55.02903075972816]
We evaluate the effectiveness of Meta's "See less" ad control and the actionability of ad targeting explanations following the shift to AI-mediated targeting.
We find that utilizing the "See less" ad control for the topics we study does not significantly reduce the number of ads shown by Meta on these topics.
We find that the majority of ad targeting explanations for local ads made no reference to location-specific targeting criteria.
arXiv Detail & Related papers (2024-08-21T18:03:11Z) - A Multimodal Analysis of Influencer Content on Twitter [40.41635575764701]
Line between personal opinions and commercial content promotion is frequently blurred.
This makes automatic detection of regulatory compliance breaches related to influencer advertising difficult.
We introduce a new Twitter (now X) dataset consisting of 15,998 influencer posts mapped into commercial and non-commercial categories.
arXiv Detail & Related papers (2023-09-06T15:07:23Z) - The Devil is in the Details: Analyzing the Lucrative Ad Fraud Patterns of the Online Ad Ecosystem [2.1456348289599134]
Bad actors have found ways to circumvent restrictions, and generate substantial revenue that can support websites with objectionable or even illegal content.
We show how identifier pooling can redirect ad revenues from reputable domains to notorious domains serving objectionable content.
We publish a Web monitoring service that enhances the transparency of supply chains and business relationships between publishers and ad networks.
arXiv Detail & Related papers (2023-06-14T10:28:07Z) - The Inventory is Dark and Full of Misinformation: Understanding the
Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain [1.0573120858963332]
Ad-tech enables publishers to sell their ad inventory to millions of demand partners through a complex supply chain.
We investigate for the first time how ad-tech sites subvert transparency standards and pool their ad inventory with unrelated sites to circumvent brand safety protections.
arXiv Detail & Related papers (2022-10-13T01:24:19Z) - Snail Mail Beats Email Any Day: On Effective Operator Security
Notifications in the Internet [8.820810614202374]
We investigate two methods to increase notification success: the use of letters as an alternative delivery medium, and the description of attack scenarios.
We find that manually collected addresses lead to large increases in delivery rates compared to previous work, and letters were markedly more effective than emails.
arXiv Detail & Related papers (2021-06-15T10:17:59Z) - Auditing for Discrimination in Algorithms Delivering Job Ads [70.02478301291264]
We develop a new methodology for black-box auditing of algorithms for discrimination in the delivery of job advertisements.
Our first contribution is to identify the distinction between skew in ad delivery due to protected categories such as gender or race.
Second, we develop an auditing methodology that distinguishes between skew explainable by differences in qualifications from other factors.
Third, we apply our proposed methodology to two prominent targeted advertising platforms for job ads: Facebook and LinkedIn.
arXiv Detail & Related papers (2021-04-09T17:38:36Z) - Adversarial Attacks On Multi-Agent Communication [80.4392160849506]
Modern autonomous systems will soon be deployed at scale, opening up the possibility for cooperative multi-agent systems.
Such advantages rely heavily on communication channels which have been shown to be vulnerable to security breaches.
In this paper, we explore such adversarial attacks in a novel multi-agent setting where agents communicate by sharing learned intermediate representations.
arXiv Detail & Related papers (2021-01-17T00:35:26Z) - An Empirical Study of In-App Advertising Issues Based on Large Scale App
Review Analysis [67.58267006314415]
We present a large-scale analysis on ad-related user feedback from App Store and Google Play.
From a statistical analysis of 36,309 ad-related reviews, we find that users care most about the number of unique ads and ad display frequency during usage.
Some ad issue types are addressed more quickly by developers than other ad issues.
arXiv Detail & Related papers (2020-08-22T05:38:24Z) - Do Interruptions Pay Off? Effects of Interruptive Ads on Consumers
Willingness to Pay [79.9312329825761]
We present the results of a study designed to measure the impact of interruptive advertising on consumers willingness to pay for products bearing the advertiser's brand.
Our results contribute to the research on the economic impact of advertising, and introduce a method of measuring actual (as opposed to self-reported) willingness to pay in experimental marketing research.
arXiv Detail & Related papers (2020-05-14T09:26:57Z) - Leveraging Multi-Source Weak Social Supervision for Early Detection of
Fake News [67.53424807783414]
Social media has greatly enabled people to participate in online activities at an unprecedented rate.
This unrestricted access also exacerbates the spread of misinformation and fake news online which might cause confusion and chaos unless being detected early for its mitigation.
We jointly leverage the limited amount of clean data along with weak signals from social engagements to train deep neural networks in a meta-learning framework to estimate the quality of different weak instances.
Experiments on realworld datasets demonstrate that the proposed framework outperforms state-of-the-art baselines for early detection of fake news without using any user engagements at prediction time.
arXiv Detail & Related papers (2020-04-03T18:26:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.