Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cloak of Visibility - Detecting When Machines Browse a Different Web

IEEE via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a comprehensive analysis of web cloaking techniques used by malicious actors to evade detection in this 14-minute IEEE conference talk. Delve into the sophisticated methods employed to hide harmful content from security crawlers while exposing regular users to potential threats. Examine the capabilities of ten prominent underground cloaking services, including extensive IP blacklists targeting search engines and security crawlers. Learn about the development of an anti-cloaking system with high accuracy in detecting split-view content. Gain insights into the prevalence of cloaking threats in search and advertisement URLs, and understand the variations in techniques across different traffic sources. Discover the minimum capabilities required for security crawlers to bypass state-of-the-art mobile, rDNS, and IP cloaking methods. Covering topics such as responsive design, IP blacklisting, DNS cloaking, and browsing pattern cloaking, this talk provides a broad perspective on the impact of cloaking on Google Search and Google Ads.

Syllabus

Web cloaking
Responsive design vs cloaking
Research goals
$3500+ cloaking software
Admin interface
Technique: IP blacklisting
Crowdsourced blacklist
Technique: DNS cloaking
Technique browsing pattern cloaking
Browser farm
Classification
Delivery same page cloaking
Future client side detection
Takeaways

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of Cloak of Visibility - Detecting When Machines Browse a Different Web

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.