- Complete title: Measuring and disrupting anti-adblockers using differential execution analysis
- PDF: 789c9d4895d5a3be757d2dc1344f71f28f628acb_adblock-ndss2018.pdf
and ternaries are instrumented, because an other paper from 2016 (A First
Look at Ad-block Detection – A New Arms Race on the
Web) found that there were the main
ones used to detect adblockers. This lead, in this paper, to several
Detection bypasses (found by manually reviewing a large number of sites, kudos!) were either:
- Using non-instrumented conditions, or non-control-flow-based methods, like array-based ones.
- Content randomization, that could, according to the paper, be addressed by analysing the same page several times, instead of reloading it. I don't think that this will work for pages with a significant amount of different randomized states.
- Putting the anti-adblock message as a placeholder for the ad.
The paper suggests two methods to bypass anti-adblocking:
- Use a proxy rewrite the detection conditions.
Those two solutions would need to rely on lists, since the condition-detection process takes a bit more than 14 hours on a 32 cores machine for 10,000 websites.
No code is released with the paper, making this work unreproducible, and thus shouldn't be treated as science, as it might be completely made up.