TY - GEN
T1 - Dirty jobs
T2 - 20th USENIX Security Symposium
AU - Motoyama, Marti
AU - McCoy, Damon
AU - Levchenko, Kirill
AU - Savage, Stefan
AU - Voelker, Geoffrey M.
N1 - Funding Information:
We would like to thank the anonymous reviewers for their feedback, Qing Zhang for the cosmetic Web sites, and Do-kyum Kim and Lawrence Saul for helpful discussions on job classification. This work was supported in part by National Science Foundation grants NSF-0433668 and NSF-0831138, by the Office of Naval Research MURI grant N000140911081, and by generous research, operational and in-kind support from Yahoo, Microsoft, Google, and the UCSD Center for Networked Systems (CNS). McCoy was supported by a CCC-CRA-NSF Computing Innovation Fellowship.
Publisher Copyright:
© 2011 by The USENIX Association.
PY - 2011
Y1 - 2011
N2 - Modern Web services inevitably engender abuse, as attackers find ways to exploit a service and its user base. However, while defending against such abuse is generally considered a technical endeavor, we argue that there is an increasing role played by human labor markets. Using over seven years of data from the popular crowdsourcing site Freelancer.com, as well data from our own active job solicitations, we characterize the labor market involved in service abuse. We identify the largest classes of abuse work, including account creation, social networking link generation and search engine optimization support, and characterize how pricing and demand have evolved in supporting this activity.
AB - Modern Web services inevitably engender abuse, as attackers find ways to exploit a service and its user base. However, while defending against such abuse is generally considered a technical endeavor, we argue that there is an increasing role played by human labor markets. Using over seven years of data from the popular crowdsourcing site Freelancer.com, as well data from our own active job solicitations, we characterize the labor market involved in service abuse. We identify the largest classes of abuse work, including account creation, social networking link generation and search engine optimization support, and characterize how pricing and demand have evolved in supporting this activity.
UR - http://www.scopus.com/inward/record.url?scp=84856151953&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84856151953&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84856151953
T3 - Proceedings of the 20th USENIX Security Symposium
SP - 203
EP - 218
BT - Proceedings of the 20th USENIX Security Symposium
PB - USENIX Association
Y2 - 8 August 2011 through 12 August 2011
ER -