Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Understanding iOS-based Crowdturfing Through Hidden UI Analysis

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Yeonjoon-
dc.contributor.authorWang, Xueqiang-
dc.contributor.authorLee, Kwangwuk-
dc.contributor.authorLiao, Xiaojing-
dc.contributor.authorWang, Xiaofeng-
dc.contributor.authorLi, Tongxin-
dc.contributor.authorMi, Xianghang-
dc.date.accessioned2021-06-22T09:42:52Z-
dc.date.available2021-06-22T09:42:52Z-
dc.date.created2021-02-18-
dc.date.issued2019-08-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/2393-
dc.description.abstractA new type of malicious crowdsourcing (a.k.a., crowdturfing) clients, mobile apps with hidden crowdturfing user interface (UI), is increasingly being utilized by miscreants to coordinate crowdturfing workers and publish mobile-based crowdturfing tasks (e.g., app ranking manipulation) even on the strictly controlled Apple App Store. These apps hide their crowdturfing content behind innocent-looking UIs to bypass app vetting and infiltrate the app store. To the best of our knowledge, little has been done so far to understand this new abusive service, in terms of its scope, impact and techniques, not to mention any effort to identify such stealthy crowdturfing apps on a large scale, particularly on the Apple platform. In this paper, we report the first measurement study on iOS apps with hidden crowdturfing UIs. Our findings bring to light the mobile-based crowdturfing ecosystem (e.g., app promotion for worker recruitment, campaign identification) and the underground developer’s tricks (e.g., scheme, logic bomb) for evading app vetting.-
dc.language영어-
dc.language.isoen-
dc.publisherUSENIX-
dc.titleUnderstanding iOS-based Crowdturfing Through Hidden UI Analysis-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Yeonjoon-
dc.identifier.scopusid2-s2.0-85076343363-
dc.identifier.bibliographicCitationUSENIX Security Symposium, pp.765 - 781-
dc.relation.isPartOfUSENIX Security Symposium-
dc.citation.titleUSENIX Security Symposium-
dc.citation.startPage765-
dc.citation.endPage781-
dc.type.rimsART-
dc.description.journalClass3-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassother-
dc.subject.keywordPlusFruits-
dc.subject.keywordPlusUser interfaces-
Files in This Item
There are no files associated with this item.
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Yeon joon photo

Lee, Yeon joon
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE