1 Introduction |
|
1 | (8) |
|
1.1 Definitions and History |
|
|
1 | (3) |
|
|
4 | (5) |
2 Getting There |
|
9 | (20) |
|
|
9 | (11) |
|
2.1.1 Explicit, Voluntary Installation |
|
|
9 | (1) |
|
2.1.2 Drive-by Downloads, User Involvement |
|
|
10 | (6) |
|
2.1.3 Drive-by Downloads, No User Involvement |
|
|
16 | (3) |
|
2.1.4 Installation via Malware |
|
|
19 | (1) |
|
|
20 | (9) |
|
2.2.1 Application-Specific Startup |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (6) |
3 Staying There |
|
29 | (16) |
|
|
29 | (8) |
|
3.1.1 Basic Detection Avoidance |
|
|
29 | (3) |
|
|
32 | (1) |
|
3.1.3 Advanced Detection Avoidance: Rootkits |
|
|
33 | (4) |
|
|
37 | (8) |
|
|
37 | (1) |
|
|
38 | (7) |
4 Keylogging |
|
45 | (14) |
|
4.1 User Space Keylogging |
|
|
47 | (2) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
4.2 User Space Keylogging Defenses |
|
|
49 | (4) |
|
|
53 | (6) |
5 Phoning Home |
|
59 | (12) |
|
|
59 | (2) |
|
|
61 | (2) |
|
|
63 | (3) |
|
5.4 Information Leaking Defenses |
|
|
66 | (5) |
6 Advertising |
|
71 | (20) |
|
6.1 Types of Advertisement |
|
|
71 | (12) |
|
6.1.1 Banner Advertisement |
|
|
74 | (1) |
|
6.1.2 Banner Advertisement with Pull-down Menu |
|
|
75 | (1) |
|
6.1.3 Expandable Banner Advertisement |
|
|
76 | (1) |
|
6.1.4 Pushdown Banner Advertisement |
|
|
77 | (1) |
|
6.1.5 Pop-up Advertisement |
|
|
77 | (1) |
|
6.1.6 Pop-under Advertisement |
|
|
78 | (1) |
|
6.1.7 Floating Advertisement |
|
|
79 | (1) |
|
6.1.8 Tear-back Advertisement |
|
|
79 | (1) |
|
6.1.9 In-text Advertisement |
|
|
80 | (1) |
|
6.1.10 Transition Advertisement |
|
|
81 | (1) |
|
6.1.11 Video Advertisements |
|
|
82 | (1) |
|
|
83 | (8) |
7 Advertisement Implementation |
|
91 | (20) |
|
7.1 Implementation Location |
|
|
92 | (7) |
|
7.1.1 Implementation on the User Machine |
|
|
92 | (4) |
|
7.1.2 Implementation in the Network |
|
|
96 | (1) |
|
7.1.3 Implementation near the User Machine |
|
|
97 | (1) |
|
7.1.4 Implementation on the Server |
|
|
98 | (1) |
|
|
99 | (2) |
|
7.3 Blocking Advertisements |
|
|
101 | (10) |
|
|
101 | (1) |
|
7.3.2 General Advertisement Blocking |
|
|
102 | (1) |
|
7.3.3 Blocker Evasion and Blocker Blocking |
|
|
103 | (8) |
8 Tracking Users |
|
111 | (16) |
|
|
111 | (7) |
|
|
116 | (1) |
|
8.1.2 Other Browser-Related Tracking Methods |
|
|
117 | (1) |
|
|
118 | (9) |
|
8.2.1 Cognitive Styles, Mood, and Personality |
|
|
119 | (1) |
|
|
119 | (1) |
|
8.2.3 Demographic Information |
|
|
120 | (1) |
|
|
120 | (1) |
|
8.2.5 Real World Activities |
|
|
121 | (1) |
|
|
121 | (1) |
|
8.2.7 Search Terms and Keywords |
|
|
122 | (1) |
|
|
122 | (5) |
9 Conclusion |
|
127 | (2) |
References |
|
129 | (14) |
Index |
|
143 | |