Measuring and applying invalid SSL certificates: The silent majority

T Chung, Y Liu, D Choffnes, D Levin… - Proceedings of the …, 2016 - dl.acm.org
SSL and TLS are used to secure the most commonly used Internet protocols. As a result, the
ecosystem of SSL certificates has been thoroughly studied, leading to a broad …

Fp-crawlers: studying the resilience of browser fingerprinting to block crawlers

A Vastel, W Rudametkin, R Rouvoy… - MADWeb'20-NDSS …, 2020 - inria.hal.science
Data available on the Web, such as financial data or public reviews, provides a competitive
advantage to companies able to exploit them. Web crawlers, a category of bot, aim at …

The leaking battery: A privacy analysis of the HTML5 Battery Status API

Ł Olejnik, G Acar, C Castelluccia, C Diaz - Data Privacy Management, and …, 2016 - Springer
We highlight privacy risks associated with the HTML5 Battery Status API. We put special
focus on its implementation in the Firefox browser. Our study shows that websites can …

Fingerprinting web users through font metrics

D Fifield, S Egelman - Financial Cryptography and Data Security: 19th …, 2015 - Springer
We describe a web browser fingerprinting technique based on measuring the onscreen
dimensions of font glyphs. Font rendering in web browsers is affected by many factors …

Exploring the cookieverse: A multi-perspective analysis of web cookies

A Rasaii, S Singh, D Gosain, O Gasser - International Conference on …, 2023 - Springer
Web cookies have been the subject of many research studies over the last few years.
However, most existing research does not consider multiple crucial perspectives that can …

Omnicrawl: Comprehensive measurement of web tracking with real desktop and mobile browsers

D Cassel, SC Lin, A Buraggina, W Wang… - Proceedings on …, 2022 - petsymposium.org
Over half of all visits to websites now take place in a mobile browser, yet the majority of web
privacy studies take the vantage point of desktop browsers, use emulated mobile browsers …

Tracing cross border web tracking

C Iordanou, G Smaragdakis, I Poese… - Proceedings of the …, 2018 - dl.acm.org
A tracking flow is a flow between an end user and a Web tracking service. We develop an
extensive measurement methodology for quantifying at scale the amount of tracking flows …

Jack-in-the-box: An Empirical Study of JavaScript Bundling on the Web and its Security Implications

J Rack, CA Staicu - Proceedings of the 2023 ACM SIGSAC Conference …, 2023 - dl.acm.org
In recent years, we have seen an increased interest in studying the software supply chain of
user-facing applications to uncover problematic third-party dependencies. Prior work shows …

[PDF][PDF] Tales of favicons and caches: Persistent tracking in modern browsers

K Solomos, J Kristoff, C Kanich, J Polakis - Network and Distributed …, 2021 - par.nsf.gov
The privacy threats of online tracking have garnered considerable attention in recent years
from researchers and practitioners. This has resulted in users becoming more …

The representativeness of automated web crawls as a surrogate for human browsing

D Zeber, S Bird, C Oliveira, W Rudametkin… - Proceedings of The …, 2020 - dl.acm.org
Large-scale Web crawls have emerged as the state of the art for studying characteristics of
the Web. In particular, they are a core tool for online tracking research. Web crawling is an …