-
1
-
-
34250623674
-
CSS visited pages disclosure
-
A. Clover. (2002) CSS visited pages disclosure. BUGTRAQ mailing list posting. http://seclists.org/bugtraq/2002/Feb/271
-
(2002)
BUGTRAQ Mailing List Posting
-
-
Clover, A.1
-
4
-
-
78649998785
-
An empirical study of privacy-violating information flows in JavaScript web applications
-
D. Jang, R. Jhala, S. Lerner, and H. Shacham, "An Empirical Study of Privacy-Violating Information Flows in JavaScript Web Applications," in ACM Conference on Computer and Communications Security (CCS), 2010. http://cseweb.ucsd.edu/~d1jang/papers/ccs10.pdf
-
(2010)
ACM Conference on Computer and Communications Security (CCS)
-
-
Jang, D.1
Jhala, R.2
Lerner, S.3
Shacham, H.4
-
8
-
-
77955224128
-
On the incoherencies in web browser access control policies
-
K. Singh, A. Moshchuk, H. J. Wang, and W. Lee, "On the Incoherencies in Web Browser Access Control Policies," in IEEE Symposium on Security and Privacy (Oakland), 2010. http://research.microsoft.com/en-us/um/people/helenw/ papers/incoherencyAndWebAnalyzer.pdf
-
(2010)
IEEE Symposium on Security and Privacy (Oakland)
-
-
Singh, K.1
Moshchuk, A.2
Wang, H.J.3
Lee, W.4
-
9
-
-
34250634485
-
Protecting browser state from web privacy attacks
-
C. Jackson, A. Bortz, D. Boneh, and J. C. Mitchell, "Protecting Browser State from Web Privacy Attacks," in International World Wide Web Conference (WWW), 2006. http://crypto.stanford.edu/sameorigin/sameorigin.pdf
-
(2006)
International World Wide Web Conference (WWW)
-
-
Jackson, C.1
Bortz, A.2
Boneh, D.3
Mitchell, J.C.4
-
10
-
-
85177640319
-
Sniff browser history for improved user experience
-
N. Kennedy. (2008) Sniff browser history for improved user experience. Blog entry. http://www.niallkennedy.com/blog/2008/02/browser-history-sniff.html
-
(2008)
Blog Entry
-
-
Kennedy, N.1
-
13
-
-
85177652183
-
Making OpenID more useful: Let's detect logged-in state
-
L. Shepard. (2009) Making OpenID more useful: let's detect logged-in state. Blog entry. http://www.sociallipstick.com/?p=167
-
(2009)
Blog Entry
-
-
Shepard, L.1
-
16
-
-
77955214796
-
A practical attack to de-anonymize social network users
-
G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, "A Practical Attack to De-anonymize Social Network Users," in IEEE Symposium on Security and Privacy (Oakland), 2010. http://www.iseclab.org/papers/sonda-tr.pdf
-
(2010)
IEEE Symposium on Security and Privacy (Oakland)
-
-
Wondracek, G.1
Holz, T.2
Kirda, E.3
Kruegel, C.4
-
18
-
-
0005785915
-
Web spoofing: An internet con game
-
E. W. Felten, D. Balfanz, D. Dean, and D. S. Wallach, "Web Spoofing: An Internet Con Game," in National Information Systems Security Conference, 1997. http://www.csl.sri.com/users/ddean/papers/spoofing.pdf
-
(1997)
National Information Systems Security Conference
-
-
Felten, E.W.1
Balfanz, D.2
Dean, D.3
Wallach, D.S.4
-
20
-
-
0003965705
-
-
V. Apparao, S. Byrne, M. Champion, S. Isaacs, A. L. Hors, G. Nicol, J. Robie, P. Sharpe, B. Smith, J. Sorensen, R. Sutor, R. Whitmer, and C. Wilson, Document Object Model (DOM) Level 1 Specification, W3C Recommendation, 1998. http://www.w3.org/TR/1998/REC-DOM-Level-1-19981001/
-
(1998)
Document Object Model (DOM) Level 1 Specification
-
-
Apparao, V.1
Byrne, S.2
Champion, M.3
Isaacs, S.4
Hors, A.L.5
Nicol, G.6
Robie, J.7
Sharpe, P.8
Smith, B.9
Sorensen, J.10
Sutor, R.11
Whitmer, R.12
Wilson, C.13
-
25
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
L. von Ahn, M. Blum, N. Hopper, and J. Langford, "CAPTCHA: Using Hard AI Problems for Security," in Advances in Cryptology - EUROCRYPT 2003, 2003. http://dx.doi.org/10.1007/3-540-39200-9-18
-
(2003)
Advances in Cryptology - EUROCRYPT 2003
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
26
-
-
85177699063
-
CSS fonts module level 3
-
J. Daggett, CSS Fonts Module Level 3, W3C Working Draft, 2009. http://www.w3.org/TR/css3-fonts/
-
(2009)
W3C Working Draft
-
-
Daggett, J.1
-
27
-
-
85177679673
-
-
Web page
-
J. Schiller. (2010) SVG Support. Web page. http://www.codedread.com/svg- support.php
-
(2010)
SVG Support
-
-
Schiller, J.1
-
28
-
-
85177677099
-
-
Data set
-
Alexa. Top Sites. Data set. http://www.alexa.com/topsites
-
Top Sites
-
-
-
29
-
-
0013803852
-
Data processing in typing: Typing rate as a function of kind of material and amount exposed
-
R. L. Hershman and W. A. Hillix, "Data Processing in Typing: Typing Rate as a Function of Kind of Material and Amount Exposed," Human Factors, vol. 7, pp. 483-492, 1965. http://www.ingentaconnect.com/content/hfes/hf/1965/ 00000007/00000005/art00007
-
(1965)
Human Factors
, vol.7
, pp. 483-492
-
-
Hershman, R.L.1
Hillix, W.A.2
-
30
-
-
0011842902
-
-
Ithaca, New York: School of Industrial and Labor Relations, Cornell University
-
H. A. Landsberger, Hawthorne Revisited: Management and the Worker, Its Critics, and Developments in Human Relations in Industry. Ithaca, New York: School of Industrial and Labor Relations, Cornell University, 1958.
-
(1958)
Hawthorne Revisited: Management and the Worker, its Critics, and Developments in Human Relations in Industry
-
-
Landsberger, H.A.1
-
31
-
-
85177667334
-
CAPTCHAs' effect on conversion rates
-
C. Henry. (2009) CAPTCHAs' Effect on Conversion Rates. Blog entry. http://www.seomoz.org/blog/captchas-affect-on-conversion-rates
-
(2009)
Blog Entry
-
-
Henry, C.1
-
33
-
-
77956232955
-
Demographics of mechanical turk
-
Center for Digital Economy Research
-
P. G. Ipeirotis, "Demographics of Mechanical Turk," Center for Digital Economy Research, NYU Stern School of Business, Working paper, 2010. http://hdl.handle.net/2451/29585
-
(2010)
NYU Stern School of Business, Working Paper
-
-
Ipeirotis, P.G.1
-
34
-
-
79958094274
-
Who are the crowdworkers? Shifting demographics in mechanical turk
-
J. Ross, L. Irani, M. S. Silberman, A. Zaldivar, and B. Tomlinson, "Who are the Crowdworkers? Shifting Demographics in Mechanical Turk," in alt.CHI, 2010. http://www.ics.uci.edu/~jwross/pubs/RossEtAl- WhoAreTheCrowdworkers-altCHI2010.pdf
-
(2010)
Alt. CHI
-
-
Ross, J.1
Irani, L.2
Silberman, M.S.3
Zaldivar, A.4
Tomlinson, B.5
-
35
-
-
84882750204
-
An analysis of private browsing modes in modern browsers
-
G. Aggarwal, E. Burzstein, D. Boneh, and C. Jackson, "An Analysis of Private Browsing Modes in Modern Browsers," in USENIX Security Symposium, 2010. http://crypto.stanford.edu/~dabo/pubs/papers/privatebrowsing.pdf
-
(2010)
USENIX Security Symposium
-
-
Aggarwal, G.1
Burzstein, E.2
Boneh, D.3
Jackson, C.4
-
39
-
-
85177697651
-
-
Web site
-
A. Ternovskiy et al. (2009) Chatroulette. Web site. http://www. chatroulette.com/
-
(2009)
-
-
Ternovskiy, A.1
-
41
-
-
85177699815
-
WebGL specification
-
C. Marrin, WebGL Specification, Khronos Working Draft, 2011. http://www.khronos.org/registry/webgl/specs/latest
-
(2011)
Khronos Working Draft
-
-
Marrin, C.1
-
42
-
-
85094661726
-
Organization-based analysis of web-object sharing and caching
-
A. Wolman, G. Voelker, N. Sharma, N. Cardwell, M. Brown, T. Landray, D. Pinnel, A. Karlin, and H. Levy, "Organization-Based Analysis of Web-Object Sharing and Caching," in USENIX Symposium on Internet Technologies and Systems, 1999. http://www.cs.washington.edu/research/networking/websys/pubs/ usits99.ps
-
(1999)
USENIX Symposium on Internet Technologies and Systems
-
-
Wolman, A.1
Voelker, G.2
Sharma, N.3
Cardwell, N.4
Brown, M.5
Landray, T.6
Pinnel, D.7
Karlin, A.8
Levy, H.9
-
45
-
-
80051944229
-
DNS cache snooping, or snooping the cache for fun and profit
-
L. Grangeia, "DNS Cache Snooping, or Snooping the Cache for Fun and Profit," SideStep Segurança Digital, Tech. Rep., 2004. http://www.rootsecure.net/content/downloads/pdf/dns-cache-snooping.pdf
-
(2004)
SideStep Segurança Digital, Tech. Rep.
-
-
Grangeia, L.1
-
46
-
-
85177667496
-
Performance research, Part 2: Browser cache usage - Exposed!
-
T. Theurer. (2007) Performance Research, Part 2: Browser Cache Usage - Exposed! Blog entry. http://www.yuiblog.com/blog/2007/01/04/performance- research-part-2/
-
(2007)
Blog Entry
-
-
Theurer, T.1
-
47
-
-
85177653920
-
Call to improve browser caching
-
S. Souders. (2010) Call to improve browser caching. Blog entry. http://www.stevesouders.com/blog/2010/04/26/call-to-improve-browser-caching/
-
(2010)
Blog Entry
-
-
Souders, S.1
-
48
-
-
85177680922
-
Patching privacy leaks
-
K. Brewster. (2008) Patching Privacy Leaks. Blog entry. http://kentbrewster.com/patching-privacy-leaks/
-
(2008)
Blog Entry
-
-
Brewster, K.1
-
49
-
-
85177637138
-
How to tell if a user is signed in to facebook and other services
-
ThinkerMade
-
ThinkerMade. (2008) How to Tell if a User is Signed in to Facebook and Other Services. Blog entry. http://replay.waybackmachine.org/20081020072934/ http://www.thinkermade.com/blog/2008/07/how-to-tell-if-a-user-is-signed-in-to- facebook-and-other-services/
-
(2008)
Blog Entry
-
-
-
51
-
-
77955220132
-
HTTP state management mechanism
-
A. Barth, HTTP State Management Mechanism, IETF Internet-Draft, 2010. https://datatracker.ietf.org/doc/draft-ietf-httpstate-cookie/
-
(2010)
IETF Internet-draft
-
-
Barth, A.1
-
52
-
-
85177660674
-
-
Web page
-
Adobe. (2006) What are local shared objects? Web page. http://www.adobe.com/products/flashplayer/articles/lso/
-
(2006)
What Are Local Shared Objects?
-
-
-
55
-
-
33744788938
-
The platform for privacy preferences 1.0 specification
-
L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-Marshall, and J. Reagle, The Platform for Privacy Preferences 1.0 Specification, W3C Recommendation, 2002. http://www.w3.org/TR/P3P/
-
(2002)
W3C Recommendation
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Presler-Marshall, M.4
Reagle, J.5
-
56
-
-
85177668710
-
Token attempt: The misrepresentation of website privacy policies through the misuse of P3P compact policy tokens
-
P. Leon, L. Cranor, A. McDonald, and R. McGuire, "Token Attempt: The Misrepresentation of Website Privacy Policies through the Misuse of P3P Compact Policy Tokens," in Workshop on Privacy in the Electronic Society, 2010. http://www.cylab.cmu.edu/files/pdfs/tech-reports/CMUCyLab10014.pdf
-
(2010)
Workshop on Privacy in the Electronic Society
-
-
Leon, P.1
Cranor, L.2
McDonald, A.3
McGuire, R.4
-
58
-
-
84864195701
-
How unique is your browser?
-
P. Eckersley, "How Unique Is Your Browser?" in Privacy Enhancing Technologies Symposium (PETS), 2010. http://www.defcon.org/images/ defcon-18/dc-18-presentations/Eckersley/DEFCON-18-Eckersley-Panopticlick.pdf
-
(2010)
Privacy Enhancing Technologies Symposium (PETS)
-
-
Eckersley, P.1
-
60
-
-
34548825886
-
-
W. Palant et al. (2006) Adblock Plus. Software. http://adblockplus.org/
-
(2006)
Software
-
-
Palant, W.1
-
62
-
-
85177665336
-
Distinguishing "embeddable" versus "Readable," web resources considered harmful
-
R. O'Callahan. (2011) Distinguishing "Embeddable" Versus "Readable" Web Resources Considered Harmful. Blog entry. http://weblogs.mozillazine.org/roc/archives/2011/02/distinguishing.html
-
(2011)
Blog Entry
-
-
O'Callahan, R.1
-
63
-
-
85177667853
-
Breaking web platform consistency considered harmful
-
A. van Kesteren. (2011) Breaking Web Platform Consistency Considered Harmful. Blog entry. http://annevankesteren.nl/2011/02/web-platform-consistency
-
(2011)
Blog Entry
-
-
Van Kesteren, A.1
|