Privacy Challenges in Online Targeted Advertising Minh-Dung Tran

Total Page:16

File Type:pdf, Size:1020Kb

Privacy Challenges in Online Targeted Advertising Minh-Dung Tran Privacy Challenges in Online Targeted Advertising Minh-Dung Tran To cite this version: Minh-Dung Tran. Privacy Challenges in Online Targeted Advertising. Computers and Society [cs.CY]. Université de Grenoble, 2014. English. NNT : 2014GRENM053. tel-01555362 HAL Id: tel-01555362 https://tel.archives-ouvertes.fr/tel-01555362 Submitted on 4 Jul 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE Pour obtenir le grade de DOCTEUR DE L’UNIVERSITÉ DE GRENOBLE Spécialité : Informatique Arrêté ministérial : 7 août 2006 Présentée par Minh-Dung Tran Thèse dirigée par Dr. Claude Castelluccia et codirigée par Dr. Mohamed-Ali Kaafar préparée au sein de l’INRIA Rhônes-Alpes, équipe Privatics et de l’École Doctorale Mathématiques, Sciences et Technologies de l’Information, Informatique Privacy Challenges in Online Tar- geted Advertising. Thèse soutenue publiquement le 13 Novembre 2014, devant le jury composé de : Pr. Martin Heusse Grenoble INP - Ensimag, Président Dr. Paul Francis Max Planck Institute for Software Systems, Rapporteur Dr. Marc-Olivier Killijian CNRS, Rapporteur Dr. Vincent Toubiana CNIL, Examinateur Dr. Claude Castelluccia Inria, Directeur de thèse Dr. Mohamed-Ali Kaafar Inria, Co-Directeur de thèse Abstract In modern online advertising, advertisers tend to track Internet users’ activities and use these tracking data to personalize ads. Even though this practice - known as targeted advertising - brings economic benefits to advertising companies, it raises serious concerns about potential abuses of users’ sensitive data. While such privacy violations, if performed by trackers, are subject to be regulated by laws and audited by privacy watchdogs, the consequences of data leakage from these trackers to other entities are much more difficult to detect and control. Protecting user privacy is not easy since preventing tracking undermines the benefits of targeted advertising and consequently impedes the growth of free content and services on the Internet, which are mainly fostered by advertising revenue. While short-term measures, such as detecting and fixing privacy leakages in current systems, are necessary, there needs to be a long-term approach, such as privacy-by-design ad model, to protect user privacy by prevention rather than cure. In the first part of this thesis, we study several vulnerabilities in current advertising systems that leak user data from advertising companies to external entities. First, since targeted ads are personalized to each user, we present an attack exploiting these ads on the fly to infer user private information that have been used to select ads. Second, we investigate common ad exchange protocols, which allow companies to cooperate in serving ads to users, and show that advertising companies are leaking user private information, such as web browsing history, to multiple parties participating in the protocols. These web browsing histories are given to these entities at surprisingly low prices, reflecting the fact that user privacy is extremely underestimated by the advertising industry. In the second part of the thesis, we propose a privacy-by-design targeted advertising model which allows personalizing ads to users without the necessity of tracking. This model is specifically aimed for the two newly emerging ad technologies - retargeting advertising and ad exchange. We show that this model provides strong protection for user privacy while still ensuring ad targeting performance and being practically deployable. i ii I dedicate this thesis to my wife, Minh Trang, and my little son, Minh Anh. iii iv Acknowledgments First and foremost, I would like to thank my family for their unconditional love and support. They have been always beside me to share and to help me overcome the most difficult moments in this journey. Second, I would like to express my sincere appreciation to my advisor Claude Castel- luccia, who gave me the opportunity to work in this interesting topic, for his great guidance and help during my PhD. I would also like to thank my co-advisor, Mohamed-Ali Kaafar for his help and advice, especially at the beginning of my PhD life. I would like to thank Gergely Acs for the invaluable discussions we had which helped me significantly advance in my work. I am very thankful to all my colleagues at INRIA in general, and in Privatics team in particular, for their collaboration and for making my time at INRIA enjoyable. I extend many thanks also to all my friends for their support and the great moments we have shared in life. I would like to express my gratitude to my doctoral committee for their helpful com- ments and discussions. Finally, I gratefully acknowledge the financial support of my studies by the French Ministry of National Education. v vi Contents 1 Introduction 1 1.1 Privacy Challenges in Targeted Advertising . 1 1.2 Identifying Trackers . 3 1.3 Privacy Leaks . 4 1.4 Privacy-Enhancing Initiatives . 6 1.4.1 Regulation and Self-Regulation . 6 1.4.2 Blocking . 7 1.4.3 Privacy Preserving Targeted Advertising . 8 1.5 Contributions . 8 1.6 Organization . 10 2 Background: Online Tracking and Privacy 11 2.1 Tracking Technologies . 11 2.1.1 Collection Techniques . 12 2.1.2 Identifiers . 12 2.1.3 Behavioral Information . 15 2.2 What They Know . 16 2.3 Identifiability . 17 2.3.1 Pseudonymous Identity Can Be Linked with Real Identity . 18 2.3.2 Data De-anonymization . 19 2.4 Why We Should Care about Online Privacy . 19 2.4.1 Counter Arguments . 19 2.4.2 Potential Risks of Privacy Violation . 20 2.5 Conclusion . 23 3 Related Work 25 3.1 Tracking the Trackers . 25 3.1.1 Prevalence of Tracking . 26 3.1.2 Tracking Techniques . 26 3.2 Tracking Protection Techniques . 27 vii 3.3 Privacy Leakage . 29 3.4 Privacy-Preserving Targeted Advertising . 30 3.5 Economics of Privacy . 31 3.5.1 Value of User Privacy . 31 3.5.2 User Privacy as A Commodity . 33 I Privacy Leaks in Targeted Advertising 35 4 Privacy Leaks in Targeted Ads Delivery 37 4.1 Motivation . 37 4.2 Targeted Advertising: The Case of Google . 38 4.3 Reconstructing User Profiles from Targeted Ads . 39 4.3.1 Building Blocks . 40 4.3.2 Extracting Targeted Ads . 43 4.3.3 User-Profile Reconstruction . 43 4.4 Evaluation . 44 4.4.1 Experiment Setup . 44 4.4.2 Evaluation Methodology . 46 4.4.3 Result Analysis . 48 4.5 Discussion . 51 4.6 Summary . 54 5 Privacy Leaks in Ad Exchange 55 5.1 Introduction . 55 5.2 Background information . 57 5.2.1 Cookie Matching . 57 5.2.2 Real-Time Bidding . 58 5.2.3 The Economics of Real-Time Bidding . 59 5.3 Cookie Matching and RTB Detection . 60 5.3.1 Request Hierarchy Detection . 60 5.3.2 Cookie Matching Detection . 61 5.3.3 Real-Time Bidding Detection . 61 5.4 Cookie Matching and RTB Analysis . 64 5.4.1 The RTBAnalyser Plugin . 64 5.4.2 Dataset . 65 5.4.3 Cookie Matching Privacy Analysis . 65 5.4.4 Real-Time Bidding Privacy Analysis . 69 5.5 Value of User Privacy . 73 viii 5.5.1 Considerations . 74 5.5.2 Methodology . 75 5.5.3 Dataset . 75 5.5.4 Experiment Description . 75 5.5.5 Results . 76 5.5.6 Real Profile Analysis . 78 5.6 Discussion . 79 5.6.1 Data Exchange between Companies . 79 5.6.2 Privacy-Preserving Targeted Advertising . 79 5.6.3 The Economics of Private Data . 80 5.7 Summary . 81 II Privacy-Enhancing Solutions 83 6 A Practical Solution: Retargeting Without Tracking 85 6.1 Introduction . 85 6.1.1 Context and Motivation . 85 6.1.2 Our Proposal . 87 6.2 Background: Retargeting and Privacy . 87 6.2.1 Retargeting Mechanism . 88 6.2.2 Privacy Concerns . 89 6.3 Goals and Assumptions . 89 6.3.1 Goals . 89 6.3.2 Security Assumption . 90 6.4 System Overview . 91 6.5 System Details . 93 6.5.1 Product Score Evaluation . 93 6.5.2 Product Ranking . 95 6.5.3 Ad Serving . 96 6.5.4 Other Features . 97 6.6 Privacy Analysis . 97 6.6.1 Retargeter . 97 6.6.2 Ad Exchange . 98 6.6.3 Advertiser . 99 6.6.4 User . 99 6.7 Implementation and Evaluation . 100 6.7.1 Implementation . 100 6.7.2 Evaluation . 100 ix 6.8 Discussion . 102 6.8.1 Compatibility . ..
Recommended publications
  • A Brief Primer on the Economics of Targeted Advertising
    ECONOMIC ISSUES A Brief Primer on the Economics of Targeted Advertising by Yan Lau Bureau of Economics Federal Trade Commission January 2020 Federal Trade Commission Joseph J. Simons Chairman Noah Joshua Phillips Commissioner Rohit Chopra Commissioner Rebecca Kelly Slaughter Commissioner Christine S. Wilson Commissioner Bureau of Economics Andrew Sweeting Director Andrew E. Stivers Deputy Director for Consumer Protection Alison Oldale Deputy Director for Antitrust Michael G. Vita Deputy Director for Research and Management Janis K. Pappalardo Assistant Director for Consumer Protection David R. Schmidt Assistant Director, Oÿce of Applied Research and Outreach Louis Silva, Jr. Assistant Director for Antitrust Aileen J. Thompson Assistant Director for Antitrust Yan Lau is an economist in the Division of Consumer Protection of the Bureau of Economics at the Federal Trade Commission. The views expressed are those of the author and do not necessarily refect those of the Federal Trade Commission or any individual Commissioner. ii Acknowledgments I would like to thank AndrewStivers and Jan Pappalardo for invaluable feedback on numerous revisions of the text, and the BE economists who contributed their thoughts and citations to this paper. iii Table of Contents 1 Introduction 1 2 Search Costs and Match Quality 5 3 Marketing Costs and Ad Volume 6 4 Price Discrimination in Uncompetitive Settings 7 5 Market Segmentation in Competitive Setting 9 6 Consumer Concerns about Data Use 9 7 Conclusion 11 References 13 Appendix 16 iv 1 Introduction The internet has grown to touch a large part of our economic and social lives. This growth has transformed it into an important medium for marketers to serve advertising.
    [Show full text]
  • The Web Never Forgets: Persistent Tracking Mechanisms in the Wild
    The Web Never Forgets: Persistent Tracking Mechanisms in the Wild Gunes Acar1, Christian Eubank2, Steven Englehardt2, Marc Juarez1 Arvind Narayanan2, Claudia Diaz1 1KU Leuven, ESAT/COSIC and iMinds, Leuven, Belgium {name.surname}@esat.kuleuven.be 2Princeton University {cge,ste,arvindn}@cs.princeton.edu ABSTRACT 1. INTRODUCTION We present the first large-scale studies of three advanced web tracking mechanisms — canvas fingerprinting, evercookies A 1999 New York Times article called cookies compre­ and use of “cookie syncing” in conjunction with evercookies. hensive privacy invaders and described them as “surveillance Canvas fingerprinting, a recently developed form of browser files that many marketers implant in the personal computers fingerprinting, has not previously been reported in the wild; of people.” Ten years later, the stealth and sophistication of our results show that over 5% of the top 100,000 websites tracking techniques had advanced to the point that Edward employ it. We then present the first automated study of Felten wrote “If You’re Going to Track Me, Please Use Cook­ evercookies and respawning and the discovery of a new ev­ ies” [18]. Indeed, online tracking has often been described ercookie vector, IndexedDB. Turning to cookie syncing, we as an “arms race” [47], and in this work we study the latest present novel techniques for detection and analysing ID flows advances in that race. and we quantify the amplification of privacy-intrusive track­ The tracking mechanisms we study are advanced in that ing practices due to cookie syncing. they are hard to control, hard to detect and resilient Our evaluation of the defensive techniques used by to blocking or removing.
    [Show full text]
  • The Internet and Web Tracking
    Grand Valley State University ScholarWorks@GVSU Technical Library School of Computing and Information Systems 2020 The Internet and Web Tracking Tim Zabawa Grand Valley State University Follow this and additional works at: https://scholarworks.gvsu.edu/cistechlib ScholarWorks Citation Zabawa, Tim, "The Internet and Web Tracking" (2020). Technical Library. 355. https://scholarworks.gvsu.edu/cistechlib/355 This Project is brought to you for free and open access by the School of Computing and Information Systems at ScholarWorks@GVSU. It has been accepted for inclusion in Technical Library by an authorized administrator of ScholarWorks@GVSU. For more information, please contact [email protected]. Tim Zabawa 12/17/20 Capstone Project Cover Page: 1. Introduction 2 2. How we are tracked online 2 2.1 Cookies 3 2.2 Browser Fingerprinting 4 2.3 Web Beacons 6 3. Defenses Against Web Tracking 6 3.1 Cookies 7 3.2 Browser Fingerprinting 8 3.3 Web Beacons 9 4. Technological Examples 10 5. Why consumer data is sought after 27 6. Conclusion 28 7. References 30 2 1. Introduction: Can you remember the last time you didn’t visit at least one website throughout your day? For most people, the common response might be “I cannot”. Surfing the web has become such a mainstay in our day to day lives that a lot of us have a hard time imagining a world without it. What seems like an endless trove of data is right at our fingertips. On the surface, using the Internet seems to be a one-sided exchange of information. We, as users, request data from companies and use it as we deem fit.
    [Show full text]
  • Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook
    University of Pennsylvania ScholarlyCommons Marketing Papers Wharton Faculty Research 1-2018 Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook Dokyun Lee Kartik Hosanagar University of Pennsylvania Harikesh Nair Follow this and additional works at: https://repository.upenn.edu/marketing_papers Part of the Advertising and Promotion Management Commons, Business Administration, Management, and Operations Commons, Business Analytics Commons, Business and Corporate Communications Commons, Communication Technology and New Media Commons, Marketing Commons, Mass Communication Commons, Social Media Commons, and the Technology and Innovation Commons Recommended Citation Lee, D., Hosanagar, K., & Nair, H. (2018). Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook. Management Science, http://dx.doi.org/10.1287/mnsc.2017.2902 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/marketing_papers/339 For more information, please contact [email protected]. Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook Abstract We describe the effect of social media advertising content on customer engagement using data from Facebook. We content-code 106,316 Facebook messages across 782 companies, using a combination of Amazon Mechanical Turk and natural language processing algorithms. We use this data set to study the association of various kinds of social media marketing content with user engagement—defined as Likes, comments, shares, and click-throughs—with the messages. We find that inclusion of widely used content related to brand personality—like humor and emotion—is associated with higher levels of consumer engagement (Likes, comments, shares) with a message. We find that directly informative content—like mentions of price and deals—is associated with lower levels of engagement when included in messages in isolation, but higher engagement levels when provided in combination with brand personality–related attributes.
    [Show full text]
  • Zeszyty T 13 2018 Tytulowa I Redakcyjna
    POLITECHNIKA KOSZALIŃSKA Zeszyty Naukowe Wydziału Elektroniki i Informatyki Nr 13 KOSZALIN 2018 Zeszyty Naukowe Wydziału Elektroniki i Informatyki Nr 13 ISSN 1897-7421 ISBN 978-83-7365-501-0 Przewodniczący Uczelnianej Rady Wydawniczej Zbigniew Danielewicz Przewodniczący Komitetu Redakcyjnego Aleksy Patryn Komitet Redakcyjny Krzysztof Bzdyra Walery Susłow Wiesław Madej Józef Drabarek Adam Słowik Strona internetowa https://weii.tu.koszalin.pl/nauka/zeszyty-naukowe Projekt okładki Tadeusz Walczak Skład, łamanie Maciej Bączek © Copyright by Wydawnictwo Uczelniane Politechniki Koszalińskiej Koszalin 2018 Wydawnictwo Uczelniane Politechniki Koszalińskiej 75-620 Koszalin, ul. Racławicka 15-17 Koszalin 2018, wyd. I, ark. wyd. 5,72, format B-5, nakład 100 egz. Druk: INTRO-DRUK, Koszalin Spis treści Damian Giebas, Rafał Wojszczyk ..................................................................................................................................................... 5 Zastosowanie wybranych reprezentacji graficznych do analizy aplikacji wielowątkowych Grzegorz Górski, Paweł Koziołko ...................................................................................................................................................... 27 Semantyczne ataki na aplikacje internetowe wykorzystujące język HTML i arkusze CSS Grzegorz Górski, Paweł Koziołko ..................................................................................................................................................... 37 Analiza skuteczności wybranych metod
    [Show full text]
  • Improving Transparency Into Online Targeted Advertising
    AdReveal: Improving Transparency Into Online Targeted Advertising Bin Liu∗, Anmol Sheth‡, Udi Weinsberg‡, Jaideep Chandrashekar‡, Ramesh Govindan∗ ‡Technicolor ∗University of Southern California ABSTRACT tous and cover a large fraction of a user’s browsing behav- To address the pressing need to provide transparency into ior, enabling them to build comprehensive profiles of their the online targeted advertising ecosystem, we present AdRe- online interests. This widespread tracking of users and the veal, a practical measurement and analysis framework, that subsequent personalization of ads have received a great deal provides a first look at the prevalence of different ad target- of negative press; users associate adjectives such as creepy ing mechanisms. We design and implement a browser based and scary with the practice [18], primarily because they lack tool that provides detailed measurements of online display insight into how their data is being collected and used. ads, and develop analysis techniques to characterize the con- Our paper seeks to provide transparency into the targeted textual, behavioral and re-marketing based targeting mecha- advertising ecosystem, a capability that has not been ex- nisms used by advertisers. Our analysis is based on a large plored so far. We seek to enable end-users to reason about dataset consisting of measurements from 103K webpages why ads of a certain category are being displayed to them. and 139K display ads. Our results show that advertisers fre- Consider a user that repeatedly receives ads about cures for a quently target users based on their online interests; almost particularly private ailment. The user currently lacks a way half of the ad categories employ behavioral targeting.
    [Show full text]
  • Cookie Swap Party: Abusing First-Party Cookies for Web Tracking
    Cookie Swap Party: Abusing First-Party Cookies for Web Tracking Quan Chen Panagiotis Ilia [email protected] [email protected] North Carolina State University University of Illinois at Chicago Raleigh, USA Chicago, USA Michalis Polychronakis Alexandros Kapravelos [email protected] [email protected] Stony Brook University North Carolina State University Stony Brook, USA Raleigh, USA ABSTRACT 1 INTRODUCTION As a step towards protecting user privacy, most web browsers perform Most of the JavaScript (JS) [8] code on modern websites is provided some form of third-party HTTP cookie blocking or periodic deletion by external, third-party sources [18, 26, 31, 38]. Third-party JS li- by default, while users typically have the option to select even stricter braries execute in the context of the page that includes them and have blocking policies. As a result, web trackers have shifted their efforts access to the DOM interface of that page. In many scenarios it is to work around these restrictions and retain or even improve the extent preferable to allow third-party JS code to run in the context of the of their tracking capability. parent page. For example, in the case of analytics libraries, certain In this paper, we shed light into the increasingly used practice of re- user interaction metrics (e.g., mouse movements and clicks) cannot lying on first-party cookies that are set by third-party JavaScript code be obtained if JS code executes in a separate iframe. to implement user tracking and other potentially unwanted capabil- This cross-domain inclusion of third-party JS code poses security ities.
    [Show full text]
  • A Privacy-Aware Framework for Targeted Advertising
    Computer Networks 79 (2015) 17–29 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet A privacy-aware framework for targeted advertising ⇑ Wei Wang a, Linlin Yang b, Yanjiao Chen a, Qian Zhang a, a Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong b Fok Ying Tung Graduate School, Hong Kong University of Science and Technology, Hong Kong article info abstract Article history: Much of today’s Internet ecosystem relies on online advertising for financial support. Since Received 21 June 2014 the effectiveness of advertising heavily depends on the relevance of the advertisements Received in revised form 6 November 2014 (ads) to user’s interests, many online advertisers turn to targeted advertising through an Accepted 27 December 2014 ad broker, who is responsible for personalized ad delivery that caters to user’s preference Available online 7 January 2015 and interest. Most of existing targeted advertising systems need to access the users’ pro- files to learn their traits, which, however, has raised severe privacy concerns and make Keywords: users unwilling to involve in the advertising systems. Spurred by the growing privacy con- Targeted advertising cerns, this paper proposes a privacy-aware framework to promote targeted advertising. In Privacy Game theory our framework, the ad broker sits between advertisers and users for targeted advertising and provides certain amount of compensation to incentivize users to click ads that are interesting yet sensitive to them. The users determine their clicking behaviors based on their interests and potential privacy leakage, and the advertisers pay the ad broker for ad clicking.
    [Show full text]
  • The Value of Behavioral Targeting By
    The Value of Behavioral Targeting by Howard Beales1 This study seeks to provide an initial understanding of the effect of behaviorally targeted advertising on advertising rates and revenues. A survey of twelve ad networks was conducted to obtain quarterly data on pricing (CPM data), conversion rates, and revenues across various types of ad segments (run of network advertising and behavioral advertising). The survey results reveal three key findings: (1) Advertising rates are significantly higher for behaviorally targeted ads. The average CPM for behaviorally targeted advertising is just over twice the average CPM for run-of-network advertising. On average across participating networks, the price of behaviorally targeted advertising in 2009 was 2.68 times the price of run of network advertising. (2) Advertising using behavioral targeting is more successful than standard run of network advertising, creating greater utility for consumers from more relevant advertisements and clear appeal for advertisers from increased ad conversion. (3) Finally, a majority of network advertising revenue is spent acquiring inventory from publishers, making behavioral targeting an important source of revenue for online content and services providers as well as third party ad networks. This study was sponsored by the Network Advertising Initiative (NAI). The NAI is a coalition of more than 40 leading online marketing companies committed to building consumer awareness and reinforcing responsible business and data management practices and standards. For a description of the NAI and a list of its members, see http://www.networkadvertising.org/index.asp (last visited Mar. 3, 2010). 1. Howard Beales has been an Associate Professor at the School of Business at George Washington University since 1988.
    [Show full text]
  • Download on Our Platform and We Have Obtained Licenses from Many Content Providers
    Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 20-F (Mark One) ¨ REGISTRATION STATEMENT PURSUANT TO SECTION 12(b) OR 12(g) OF THE SECURITIES EXCHANGE ACT OF 1934 or x ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2013. or ¨ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to or ¨ SHELL COMPANY REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 Date of event requiring this shell company report Commission file number: 000-51469 Baidu, Inc. (Exact name of Registrant as specified in its charter) N/A (Translation of Registrant’s name into English) Cayman Islands (Jurisdiction of incorporation or organization) Baidu Campus No. 10 Shangdi 10th Street Haidian District, Beijing 100085 The People’s Republic of China (Address of principal executive offices) Jennifer Xinzhe Li, Chief Financial Officer Telephone: +(86 10) 5992-8888 Email: [email protected] Facsimile: +(86 10) 5992-0000 Baidu Campus No. 10 Shangdi 10th Street, Haidian District, Beijing 100085 The People’s Republic of China (Name, Telephone, Email and/or Facsimile number and Address of Company Contact Person) Securities registered or to be registered pursuant to Section 12(b) of the Act: Title of Each Class Name of Each Exchange on Which Registered American depositary shares (ten American depositary shares representing one Class A ordinary share, The NASDAQ Stock Market LLC par value US$0.00005 per share) (The NASDAQ Global Select Market) Class A ordinary shares, par value US$0.00005 per share* The NASDAQ Stock Market LLC (The NASDAQ Global Select Market) * Not for trading, but only in connection with the listing on The NASDAQ Global Select Market of American depositary shares.
    [Show full text]
  • Study Guide TABLE of CONTENTS
    1 | Study Guide www.iab.com/salescert TABLE OF CONTENTS INTRODUCTION and HOW TO USE THIS GUIDE ................................................................................................4 PART ONE: THE IAB DIGITAL MEDIA SALES CERTIFICATION EXAM CHAPTER 1. ABOUT THE DMSC EXAM ..................................................................................................................5 Exam Format.....................................................................................................................................................5 Scoring...............................................................................................................................................................5 Exam Content Overview...................................................................................................................................5 Exam Blueprint ................................................................................................................................................6 PART TWO: EXAM CONTENT CHAPTER 2 . CORE DIGITAL MEDIA SALES KNOWLEDGE..................................................................................7 Calculations ......................................................................................................................................................7 Specialized Knowledge .....................................................................................................................................7 Skills, Abilities and Attributes........................................................................................................................10
    [Show full text]
  • Stuxnet : Analysis, Myths and Realities
    ACTUSÉCU 27 XMCO David Helan STUXNET : ANALYSIS, MYTHS AND REALITIES CONTENTS Stuxnet: complete two-part article on THE virus of 2010 Keyboard Layout: analysis of the MS10-073 vulnerability used by Stuxnet Current news: Top 10 hacking techniques, zero-day IE, Gsdays 2010, ProFTPD... Blogs, softwares and our favorite Tweets... This document is the property of XMCO Partners. Any reproduction is strictly prohibited. !!!!!!!!!!!!!!!!! [1] Are you concerned by IT security in your company? ACTU SÉCU 27 XMCO Partners is a consultancy whose business is IT security audits. Services: Intrusion tests Our experts in intrusion can test your networks, systems and web applications Use of OWASP, OSSTMM and CCWAPSS technologies Security audit Technical and organizational audit of the security of your Information System Best Practices ISO 27001, PCI DSS, Sarbanes-Oxley PCI DSS support Consulting and auditing for environments requiring PCI DSS Level 1 and 2 certification. CERT-XMCO: Vulnerability monitoring Personalized monitoring of vulnerabilities and the fixes affecting your Information System CERT-XMCO: Response to intrusion Detection and diagnosis of intrusion, collection of evidence, log examination, malware autopsy About XMCO Partners: Founded in 2002 by experts in security and managed by its founders, we work in the form of fixed-fee projects with a commitment to achieve results. Intrusion tests, security audits and vulnerability monitoring are the major areas in which our firm is developing. At the same time, we work with senior management on assignments providing support to heads of information- systems security, in drawing up master plans and in working on awareness-raising seminars with several large French accounts.
    [Show full text]