Show simple item record

dc.contributor.authorIkram, M
dc.contributor.authorMasood, R
dc.contributor.authorTyson, G
dc.contributor.authorKafaar, M
dc.contributor.authorLoizon, N
dc.contributor.authorEnsafi, R
dc.date.accessioned2020-05-13T15:17:07Z
dc.date.available2020-02-06
dc.date.available2020-05-13T15:17:07Z
dc.date.issued2020
dc.identifier.citationIkram, Muhammad et al. "Measuring And Analysing The Chain Of Implicit Trust". ACM Transactions On Privacy And Security, vol 23, no. 2, 2020, pp. 1-27. Association For Computing Machinery (ACM), doi:10.1145/3380466. Accessed 13 May 2020.en_US
dc.identifier.urihttps://qmro.qmul.ac.uk/xmlui/handle/123456789/64073
dc.description.abstractThe web is a tangled mass of interconnected services, whereby websites import a range of external resources from various third-party domains. The latter can also load further resources hosted on other domains. For each website, this creates a dependency chain underpinned by a form of implicit trust between the first-party and transitively connected third parties. The chain can only be loosely controlled as first-party websites often have little, if any, visibility on where these resources are loaded from. This article performs a large-scale study of dependency chains in the web to find that around 50% of first-party websites render content that they do not directly load. Although the majority (84.91%) of websites have short dependency chains (below three levels), we find websites with dependency chains exceeding 30. Using VirusTotal, we show that 1.2% of these third parties are classified as suspicious—although seemingly small, this limited set of suspicious third parties have remarkable reach into the wider ecosystem. We find that 73% of websites under-study load resources from suspicious third parties, and 24.8% of first-party webpages contain at least three third parties classified as suspicious in their dependency chain. By running sandboxed experiments, we observe a range of activities with the majority of suspicious JavaScript codes downloading malware.en_US
dc.publisherACMen_US
dc.relation.ispartofACM Transactions on Privacy and Security
dc.rightsThis is a pre-copyedited, author-produced version of an article accepted for publication in ACM Transactions on Privacy and Security following peer review. The version of record is available https://dl.acm.org/doi/10.1145/3380466
dc.titleMeasuring and Analysing the Chain of Implicit Trust: AStudy of Third-party Resources Loadingen_US
dc.typeArticleen_US
dc.rights.holder© 2020 ACM, Inc.
pubs.notesNot knownen_US
pubs.publication-statusAccepteden_US
dcterms.dateAccepted2020-02-06
rioxxterms.funderDefault funderen_US
rioxxterms.identifier.projectDefault projecten_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record