
REFERENCES
[1] A Twitter message shows up Luminati’s proxy SDK promotion. https://
twitter.com/malwrhunterteam/status/902965922016714753?s=20, 2017.
[2] Alexa Find Similar Sites. https://www.alexa.com/find-similar-sites.
[3] Kevin Allix, Tegawend´
e F Bissyand´
e, Jacques Klein, and Yves
Le Traon. Androzoo: Collecting millions of android apps for the
research community. In 2016 IEEE/ACM 13th Working Conference
on Mining Software Repositories (MSR), pages 468–471. IEEE, 2016.
[4] Android Background Execution Limits. https://developer.android.com/
about/versions/oreo/background.html.
[5] Anzhi. http://www.anzhi.com/.
[6] AppChina. http://www.appchina.com/.
[7] AppGrow. https://www.appgrow.com/.
[8] Michael Backes, Sven Bugiel, and Erik Derr. Reliable third-party library
detection in android and its security applications. In Proceedings of
the 2016 ACM SIGSAC Conference on Computer and Communications
Security, pages 356–367. ACM, 2016.
[9] Blazing Proxies. https://blazingseollc.com/proxy/ipv6- proxies/.
[10] California Consumer Privacy Act. https://en.wikipedia.org/wiki/
California Consumer Privacy Act.
[11] Taejoong Chung, David Choffnes, and Alan Mislove. Tunneling for
transparency: A large-scale analysis of end-to-end violations in the
internet. In Proceedings of the 2016 Internet Measurement Conference,
pages 199–213. ACM, 2016.
[12] Discussion of Luminati’s SDK in an Android monetization forum.
http://forums.makingmoneywithandroid.com/advertising-networks/
47226-luminati- sdk.html.
[13] Fobus, the sneaky little thief that could. https://blog.avast.com/2015/01/
15/fobus-the-sneaky-little-thief- that-could/.
[14] Frida Gadget. https://frida.re/docs/gadget/.
[15] General Data Protection Regulation. https://gdpr-info.eu/.
[16] Liangyi Gong, Zhenhua Li, Feng Qian, Zifan Zhang, Qi Alfred Chen,
Zhiyun Qian, Hao Lin, and Yunhao Liu. Experiences of landing
machine learning onto market-scale mobile malware detection. In Pro-
ceedings of the Fifteenth European Conference on Computer Systems,
pages 1–14, 2020.
[17] Google Play Developer Policy Center. https://play.google.com/about/
privacy-security-deception/device-network-abuse/.
[18] Michael Grace, Yajin Zhou, Qiang Zhang, Shihong Zou, and Xuxian
Jiang. Riskranker: scalable and accurate zero-day android malware
detection. In Proceedings of the 10th international conference on
Mobile systems, applications, and services, pages 281–294. ACM, 2012.
[19] HTTP tunnel. https://en.wikipedia.org/wiki/HTTP tunnell.
[20] Hybrid Analysis. https://www.hybrid-analysis.com/.
[21] Intoli. https://intoli.com/.
[22] IoT Devices as Proxies for Cybercrime. https://krebsonsecurity.com/
2016/10/iot-devices-as-proxies-for-cybercrime/.
[23] IP Ninja. https://ipninja.io/.
[24] IPinfo. https://ipinfo.io/developers.
[25] Christian Kreibich, Nicholas Weaver, Boris Nechaev, and Vern Paxson.
Netalyzr: illuminating the edge network. In Proceedings of the 10th
ACM SIGCOMM conference on Internet measurement, pages 246–259.
ACM, 2010.
[26] Lethean. https://lethean.io/.
[27] Menghao Li, Wei Wang, Pei Wang, Shuai Wang, Dinghao Wu, Jian Liu,
Rui Xue, and Wei Huo. Libd: scalable and precise third-party library
detection in android markets. In 2017 IEEE/ACM 39th International
Conference on Software Engineering (ICSE), pages 335–346. IEEE,
2017.
[28] Luminati. https://luminati.io/.
[29] Ziang Ma, Haoyu Wang, Yao Guo, and Xiangqun Chen. Libradar: fast
and accurate detection of third-party libraries in android apps. In Pro-
ceedings of the 38th international conference on software engineering
companion, pages 653–656. ACM, 2016.
[30] Akshaya Mani, Tavish Vaidya, David Dworken, and Micah Sherr. An
extensive evaluation of the internet’s open proxies. In Proceedings
of the 34th Annual Computer Security Applications Conference, pages
252–265. ACM, 2018.
[31] Niall McLaughlin, Jesus Martinez del Rincon, BooJoong Kang,
Suleiman Yerima, Paul Miller, Sakir Sezer, Yeganeh Safaei, Erik
Trickel, Ziming Zhao, Adam Doup´
e, et al. Deep android malware
detection. In Proceedings of the Seventh ACM on Conference on Data
and Application Security and Privacy, pages 301–308. ACM, 2017.
[32] Xianghang Mi, Xuan Feng, Xiaojing Liao, Baojun Liu, XiaoFeng Wang,
Feng Qian, Zhou Li, Sumayah Alrwais, Limin Sun, and Ying Liu.
Resident evil: Understanding residential ip proxy as a dark service. In
2019 IEEE Symposium on Security and Privacy (SP), pages 1185–1201.
IEEE, 2019.
[33] MonkeySocks. https://monkeysocks.net/.
[34] netnut. https://netnut.io/.
[35] Nmap Service Probes. https://svn.nmap.org/nmap/nmap-service-probes.
[36] Mark O’Neill, Scott Ruoti, Kent Seamons, and Daniel Zappala. Tls
proxies: Friend or foe? In Proceedings of the 2016 Internet Measure-
ment Conference, pages 551–557. ACM, 2016.
[37] Oxylabs. https://oxylabs.io.
[38] p0f. http://lcamtuf.coredump.cx/p0f3/.
[39] Diego Perino, Matteo Varvello, and Claudio Soriente. Proxytorrent:
Untangling the free http (s) proxy ecosystem. In Proceedings of the
2018 World Wide Web Conference, pages 197–206. International World
Wide Web Conferences Steering Committee, 2018.
[40] Bradley Reaves, Ethan Shernan, Adam Bates, Henry Carter, and Patrick
Traynor. Boxed out: Blocking cellular interconnect bypass fraud at the
network edge. In 24th {USENIX}Security Symposium ({USENIX}
Security 15), pages 833–848, 2015.
[41] SDK for monetization of android installs - monkeysocks.net.
https://forum.xda-developers.com/monetization/general/
sdk-monetization- android-installs- t3814192, 2018.
[42] SimilarWeb. https://www.similarweb.com/.
[43] Smartproxy. https://smartproxy.com/.
[44] SOCKS Proxy SDKs a New Risk for En-
terprises. https://securityboulevard.com/2018/04/
socks-proxy- sdks-a- new-risk-for-enterprises/, 2018.
[45] Tapcore. https://tapcore.com/en.
[46] The Rise of “Bulletproof” Residential Net-
works. https://krebsonsecurity.com/2019/08/
the-rise- of-bulletproof-residential-networks/, 2019.
[47] Giorgos Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athana-
sopoulos, and Michalis Polychronakis. A large-scale analysis of content
modification by open http proxies. In NDSS, 2018.
[48] VirusTotal APIs. https://developers.virustotal.com/reference.
[49] Nicholas Weaver, Christian Kreibich, Martin Dam, and Vern Paxson.
Here be web proxies. In International Conference on Passive and Active
Network Measurement, pages 183–192. Springer, 2014.
[50] Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, and Kuo-
Ping Wu. Droidmat: Android malware detection through manifest and
api calls tracing. In 2012 Seventh Asia Joint Conference on Information
Security, pages 62–69. IEEE, 2012.
[51] Zhenlong Yuan, Yongqiang Lu, Zhaoguo Wang, and Yibo Xue. Droid-
sec: deep learning in android malware detection. In ACM SIGCOMM
Computer Communication Review, volume 44, pages 371–372. ACM,
2014.
[52] Yin Zhang and Vern Paxson. Detecting stepping stones. In USENIX
Security Symposium, volume 171, page 184, 2000.
IX. APPENDIX
A. User Study Questions
1) What is your age group?
a) 18 ∼24
b) 25 ∼34
c) 35 ∼44
d) 45 ∼54
15