fox browser. We restrict our analysis to cliques of size
greater than 5 – i.e., JavaScripts shared by more than
5 sites in our dataset – as we are interested in identi-
fying scripts that are shared across many websites. We
acknowledge that this approach might fail to flag anti-
adblocking scripts utilized by individual or a small num-
ber of websites, and those used by a few websites in the
Alexa Top-5K but popular among websites ranked above
5K. As shown in Table 1, we find 1,373 cliques that are
shared among 3,619 websites in the downloaded files,
with an average of 232 websites per clique (σ =365.6)
and the largest clique having 1,320 websites (which we
find, via manual inspection, is a JS related to jQuery).
Among the embedded scripts, 509 cliques are shared by
2,070 websites (µ =41.2 σ =48.9 max=261).
We manually analyze all the 1,882 cliques (corre-
sponding to 4,017 unique websites) identified for both
downloaded and embedded scripts, and tag them as
trackers (if they upload information such as IP addresses
and cookies to tracking companies), anti-adblockers (if
they check for the presence of adblockers), or oth-
ers. Manual analysis is performed by identifying exter-
nal libraries and function specific keywords used in the
scripts. We note that manual analysis of JS is a tedious
process that does not scale to a larger number of scripts,
therefore we leave as part of future work to investigate
ways to automate JS tagging.
We uncover 22 cliques used for anti-adblocking em-
ployed by 335 websites – about 6.7% of Alexa Top-5K
websites. We observe that Alexa Top-1K have 60 anti-
adblocking websites, and the number increases by about
70 websites for every additional 1K considered, reaching
335 anti-adblocking websites in Top-5K. While study-
ing anti-adblockers, we also identify 456 tracking cliques
employed by about 54% of Alexa Top-5K, validating
previous studies on the pervasiveness of tracking over the
Web [8].
Anti-adblocking by website categories. In Table 2, we
report the categories of the 335 anti-adblocking web-
sites, using McAfee’s URL categorization service [18].
We find that anti-adblocking is common among a di-
verse mix of publishers, and prevalent among publish-
ers of “General News” (19.5%), “Blogs/Wiki” (9.3%),
and “Entertainment” (8.5%) categories, which represent
more than one third of all websites. Note that these
categories are also among the most popular ones across
all Top-5K Alexa domains, although to a lesser extent
– respectively, 9.4%, 6.29%, and 5.4%. Whereas, other
popular categories among Top-5K domains (e.g., “Inter-
net services”, “Online Shopping”, “Business”, which ac-
count for 20% of the Top-5K) are much less prevalent in
anti-adblocking websites.
Website response to detection of adblockers. In order
to assess how anti-adblocking websites behave once they
% Category % Category
19.5% General News 2.5% Pornography
9.3% Blogs/Wiki 2.5% Forum/Bulletin Boards
8.5% Entertainment 2.2% Technical/Business Forums
4.3% Internet Services 2.2% Potential Illegal Software
3.7% Sports 2.0% Online Shopping
3.7% Games
1.7% Portal Sites
3.2% Travel 1.7% Humor/Comics
3.2% Education/Reference 1.2% Social Networking
2.7% Business 1.2% Provocative Attire
2.5% Software/Hardware 1.2% Marketing/Merchandising
Table 2: Distribution of anti-adblocking websites by category
according to McAfee’s URL categorization.
identify adblockers, we look at all the screenshots taken
by our crawler, respectively, when using the vanilla Fire-
fox browser with no extensions and the Firefox browser
with AdBlock Plus enabled (which we assume is more
likely to be detected due to its popularity [21]) .
We note cases where there is an explicit (i.e., warning
to disable adblocker) or a discrete (i.e., blank page via
AdBlock Plus, but normal appearance without) response
to adblocking. For these websites, we also view screen-
shots when accessed by the Firefox browser with each of
the following extensions: Ghostery, Privacy Badger, and
NoScript.
We find only 6 explicit and no discrete responses
to adblocking. Of the explicit responses, 3 are dis-
played by porn websites hosted by the same company
– MindGeek – and employ the same anti-adblocking
script downloaded from DoublePimp. The warning is
displayed for both AdBlock Plus and Ghostery. The re-
maining 3 also employ the same script, but display differ-
ent messages (only for AdBlock Plus) with the same gen-
eral theme, i.e., nudging the user to disable the adblocker
and/or support the website via subscription or donation.
Some websites display adblocker warning to users af-
ter they engage in some form of activity, such as clicking
on links or scrolling. To capture such responses, we re-
peat the above exercise for screenshots taken after mim-
icking user activity – specifically, clicking on a random
link on the page, scrolling down to the bottom of the
newly loaded page, waiting three seconds, then scrolling
back up to the top of the page, waiting 5 seconds. While
the modified methodology validates our previous obser-
vations, we do not discover any new responses.
In the attempt of automating the analysis of websites’
response to anti-adblocking, we have also tried to use im-
age comparison tools, such as perceptual hashing. How-
ever, this generates a high number of false positives due
to dynamic content on many sites as well as false nega-
tives since anti-adblocking warnings and messages gen-
erate a relatively small visual difference.
How anti-adblockers work. Next, we manually in-
spect the 22 anti-adblocking scripts (14 downloaded and
4