One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant {APIs} in {WeChat}

C Wang, Y Zhang, Z Lin - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
The past few years have witnessed a boom of mobile super apps, which are the apps
offering multiple services such as e-commerce, e-learning, and e-government via miniapps …

Leaky forms: A study of email and password exfiltration before form submission

A Senol, G Acar, M Humbert, FZ Borgesius - 31st USENIX Security …, 2022 - usenix.org
Web users enter their email addresses into online forms for a variety of reasons, including
signing in or signing up for a service or subscribing to a newsletter. While enabling such …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Escaping the confines of time: Continuous browser extension fingerprinting through ephemeral modifications

K Solomos, P Ilia, N Nikiforakis, J Polakis - Proceedings of the 2022 …, 2022 - dl.acm.org
Browser fingerprinting continues to proliferate across the web. Critically, popular
fingerprinting libraries have started incorporating extension-fingerprinting capabilities, thus …

Phish in sheep's clothing: Exploring the authentication pitfalls of browser fingerprinting

X Lin, P Ilia, S Solanki, J Polakis - 31st USENIX Security Symposium …, 2022 - usenix.org
As users navigate the web they face a multitude of threats; among them, attacks that result in
account compromise can be particularly devastating. In a world fraught with data breaches …

Are privacy dashboards good for end users? Evaluating user perceptions and reactions to google's my activity

FM Farke, DG Balash, M Golla, M Dürmuth… - 30th USENIX Security …, 2021 - usenix.org
Privacy dashboards and transparency tools help users review and manage the data
collected about them online. Since 2016, Google has offered such a tool, My Activity, which …

Drawnapart: A device identification technique based on remote gpu fingerprinting

T Laor, N Mehanna, A Durey, V Dyadyuk… - arXiv preprint arXiv …, 2022 - arxiv.org
Browser fingerprinting aims to identify users or their devices, through scripts that execute in
the users' browser and collect information on software or hardware characteristics. It is used …

Ads and Fraud: a comprehensive survey of fraud in online advertising

S Sadeghpour, N Vlajic - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Over the last two decades, we have witnessed a fundamental transformation of the
advertising industry, which has been steadily moving away from the traditional advertising …

The cname of the game: Large-scale analysis of dns-based tracking evasion

Y Dimova, G Acar, L Olejnik, W Joosen… - arXiv preprint arXiv …, 2021 - arxiv.org
Online tracking is a whack-a-mole game between trackers who build and monetize
behavioral user profiles through intrusive data collection, and anti-tracking mechanisms …

{WebGraph}: Capturing advertising and tracking information flows for robust blocking

S Siby, U Iqbal, S Englehardt, Z Shafiq… - 31st USENIX Security …, 2022 - usenix.org
Users rely on ad and tracker blocking tools to protect their privacy. Unfortunately, existing ad
and tracker blocking tools are susceptible to mutable advertising and tracking content. In this …