Understanding iOS-based Crowdturfing Through Hidden UI Analysis
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Yeonjoon | - |
dc.contributor.author | Wang, Xueqiang | - |
dc.contributor.author | Lee, Kwangwuk | - |
dc.contributor.author | Liao, Xiaojing | - |
dc.contributor.author | Wang, Xiaofeng | - |
dc.contributor.author | Li, Tongxin | - |
dc.contributor.author | Mi, Xianghang | - |
dc.date.accessioned | 2021-06-22T09:42:52Z | - |
dc.date.available | 2021-06-22T09:42:52Z | - |
dc.date.created | 2021-02-18 | - |
dc.date.issued | 2019-08 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/2393 | - |
dc.description.abstract | A new type of malicious crowdsourcing (a.k.a., crowdturfing) clients, mobile apps with hidden crowdturfing user interface (UI), is increasingly being utilized by miscreants to coordinate crowdturfing workers and publish mobile-based crowdturfing tasks (e.g., app ranking manipulation) even on the strictly controlled Apple App Store. These apps hide their crowdturfing content behind innocent-looking UIs to bypass app vetting and infiltrate the app store. To the best of our knowledge, little has been done so far to understand this new abusive service, in terms of its scope, impact and techniques, not to mention any effort to identify such stealthy crowdturfing apps on a large scale, particularly on the Apple platform. In this paper, we report the first measurement study on iOS apps with hidden crowdturfing UIs. Our findings bring to light the mobile-based crowdturfing ecosystem (e.g., app promotion for worker recruitment, campaign identification) and the underground developer’s tricks (e.g., scheme, logic bomb) for evading app vetting. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | USENIX | - |
dc.title | Understanding iOS-based Crowdturfing Through Hidden UI Analysis | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Yeonjoon | - |
dc.identifier.scopusid | 2-s2.0-85076343363 | - |
dc.identifier.bibliographicCitation | USENIX Security Symposium, pp.765 - 781 | - |
dc.relation.isPartOf | USENIX Security Symposium | - |
dc.citation.title | USENIX Security Symposium | - |
dc.citation.startPage | 765 | - |
dc.citation.endPage | 781 | - |
dc.type.rims | ART | - |
dc.description.journalClass | 3 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | other | - |
dc.subject.keywordPlus | Fruits | - |
dc.subject.keywordPlus | User interfaces | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.