TY - GEN
T1 - Eluding ML-based Adblockers with Actionable Adversarial Examples
AU - Zhu, Shitong
AU - Wang, Zhongjie
AU - Chen, Xun
AU - Li, Shasha
AU - Man, Keyu
AU - Iqbal, Umar
AU - Qian, Zhiyun
AU - Chan, Kevin S.
AU - Krishnamurthy, Srikanth V.
AU - Shafiq, Zubair
AU - Hao, Yu
AU - Li, Guoren
AU - Zhang, Zheng
AU - Zou, Xiaochen
N1 - Publisher Copyright:
© 2021 Copyright held by the owner/author(s).
PY - 2021/12/6
Y1 - 2021/12/6
N2 - Online advertisers have been quite successful in circumventing traditional adblockers that rely on manually curated rules to detect ads. As a result, adblockers have started to use machine learning (ML) classifiers for more robust detection and blocking of ads. Among these, AdGraph which leverages rich contextual information to classify ads, is arguably, the state of the art ML-based adblocker. In this paper, we present a4, a tool that intelligently crafts adversarial ads to evade AdGraph. Unlike traditional adversarial examples in the computer vision domain that can perturb any pixels (i.e., unconstrained), adversarial ads generated by a4 are actionable in the sense that they preserve the application semantics of the web page. Through a series of experiments we show that a4 can bypass AdGraph about 81% of the time, which surpasses the state-of-the-art attack by a significant margin of 145.5%, with an overhead of <20% and perturbations that are visually imperceptible in the rendered webpage. We envision that a4's framework can be used to potentially launch adversarial attacks against other ML-based web applications.
AB - Online advertisers have been quite successful in circumventing traditional adblockers that rely on manually curated rules to detect ads. As a result, adblockers have started to use machine learning (ML) classifiers for more robust detection and blocking of ads. Among these, AdGraph which leverages rich contextual information to classify ads, is arguably, the state of the art ML-based adblocker. In this paper, we present a4, a tool that intelligently crafts adversarial ads to evade AdGraph. Unlike traditional adversarial examples in the computer vision domain that can perturb any pixels (i.e., unconstrained), adversarial ads generated by a4 are actionable in the sense that they preserve the application semantics of the web page. Through a series of experiments we show that a4 can bypass AdGraph about 81% of the time, which surpasses the state-of-the-art attack by a significant margin of 145.5%, with an overhead of <20% and perturbations that are visually imperceptible in the rendered webpage. We envision that a4's framework can be used to potentially launch adversarial attacks against other ML-based web applications.
KW - Adblockers
KW - Adversarial examples
KW - Machine learning
UR - https://www.scopus.com/pages/publications/85121653881
U2 - 10.1145/3485832.3488008
DO - 10.1145/3485832.3488008
M3 - Conference contribution
AN - SCOPUS:85121653881
T3 - ACM International Conference Proceeding Series
SP - 541
EP - 553
BT - Proceedings - 37th Annual Computer Security Applications Conference, ACSAC 2021
PB - Association for Computing Machinery
T2 - 37th Annual Computer Security Applications Conference, ACSAC 2021
Y2 - 6 December 2021 through 10 December 2021
ER -