Toppling top lists: Evaluating the accuracy of popular website lists

K Ruth, D Kumar, B Wang, L Valenta… - Proceedings of the 22nd …, 2022 - dl.acm.org
Researchers rely on lists of popular websites like the Alexa Top Million both to measure the
web and to evaluate proposed protocols and systems. Prior work has questioned the …

Online Methods for Validating and Testing Entrepreneurial Ideas: A New Product Development Perspective

Z Bezhovski, TJ Apasieva, R Temjanovski - Management Research and …, 2024 - ceeol.com
In the new digital and dynamic world, the validation and testing of business ideas could be
crucial for the entrepreneurial success. This paper explores the transformative role of online …

Who's in and who's out? A case study of multimodal CLIP-filtering in DataComp

R Hong, W Agnew, T Kohno… - Proceedings of the 4th …, 2024 - dl.acm.org
As training datasets become increasingly drawn from unstructured, uncontrolled
environments such as the web, researchers and industry practitioners have increasingly …

Specious sites: Tracking the spread and sway of spurious news stories at scale

HWA Hanley, D Kumar… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Misinformation, propaganda, and outright lies proliferate on the web, with some narratives
having dangerous real-world consequences on public health, elections, and individual …

[HTML][HTML] Web browsing privacy in the deep learning era: Beyond VPNs and encryption

D Perdices, JEL de Vergara, I González, L de Pedro - Computer Networks, 2023 - Elsevier
Web browsing privacy is a matter of paramount importance for the Internet users. While they
try to protect themselves from being monitored by getting advantage of encryption or VPNs …

Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles

MM Ali, P Snyder, C Kanich, H Haddadi - … of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
This work presents Unbundle-Rewrite-Rebundle (URR), a system for detecting privacy-
harming portions of bundled JavaScript code and rewriting that code at runtime to remove …

Browser‐in‐the‐middle attacks: A comprehensive analysis and countermeasures

RO Jagannath, AK Jain - Security and Privacy, 2024 - Wiley Online Library
A browser‐in‐the‐middle (BITM) attack occurs when an attacker intercepts and manipulates
communication between a user's web browser and the website they are attempting to visit …

The Double Edged Sword: Identifying Authentication Pages and their Fingerprinting Behavior

A Senol, A Ukani, D Cutler, I Bilogrevic - … of the ACM on Web Conference …, 2024 - dl.acm.org
Browser fingerprinting is often associated with cross-site user tracking, a practice that many
browsers (eg, Safari, Brave, Edge, Firefox, and Chrome) want to block. However, less is …

[PDF][PDF] Understanding the ethical frameworks of internet measurement studies

E Pauley, P McDaniel - 2nd International Workshop on Ethics …, 2023 - patrickmcdaniel.org
Measurement of network data received from or transmitted over the public Internet has
yielded a myriad of insights towards improving the security and privacy of deployed services …

Interest-disclosing mechanisms for advertising are privacy-exposing (not preserving)

Y Beugin, P McDaniel - arXiv preprint arXiv:2306.03825, 2023 - arxiv.org
Today, targeted online advertising relies on unique identifiers assigned to users through
third-party cookies--a practice at odds with user privacy. While the web and advertising …