-
1
-
-
0005502376
-
Giving the Web a Memory Cost Its Users Privacy
-
The New York Times - John Schwartz, "Giving the Web a Memory Cost Its Users Privacy," http://www.nytimes.com/2001/09/04/technology/04COOK. html.
-
The New York Times
-
-
Schwartz, J.1
-
2
-
-
84878345182
-
Privacy leakage on the Internet
-
presented at March
-
B. Krishnamurthy, "Privacy leakage on the Internet," presented at IETF 77, March 2010.
-
(2010)
IETF 77
-
-
Krishnamurthy, B.1
-
3
-
-
34547459938
-
Generating a privacy footprint on the Internet
-
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, ser.
-
B. Krishnamurthy and C. E. Wills, "Generating a privacy footprint on the Internet," in Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, ser. IMC '06, New York, NY, USA, 2006, pp. 65-70.
-
IMC '06, New York, NY, USA, 2006
, pp. 65-70
-
-
Krishnamurthy, B.1
Wills, C.E.2
-
4
-
-
85040309213
-
Detecting and defending against third-party tracking on the web
-
Berkeley, CA, USA: USENIX Association
-
F. Roesner, T. Kohno, and D. Wetherall, "Detecting and defending against third-party tracking on the web," in NSDI'12: Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. Berkeley, CA, USA: USENIX Association, 2012, pp. 12-12.
-
(2012)
NSDI'12: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation
, pp. 12-12
-
-
Roesner, F.1
Kohno, T.2
Wetherall, D.3
-
5
-
-
84881258456
-
What They Know
-
The Wall Street Journal, "What They Know," http://blogs.wsj. com/wtk/.
-
The Wall Street Journal
-
-
-
6
-
-
77956141828
-
-
J. Turow, J. King, C. J. Hoofnagle, A. Bleakley, and M. Hennessy, "Americans Reject Tailored Advertising and Three Activities that Enable It," 2009.
-
(2009)
Americans Reject Tailored Advertising and Three Activities That Enable It
-
-
Turow, J.1
King, J.2
Hoofnagle, C.J.3
Bleakley, A.4
Hennessy, M.5
-
7
-
-
84865009920
-
Smart, useful, scary, creepy: Perceptions of online behavioral advertising
-
Proceedings of the Eighth Symposium on Usable Privacy and Security, ser. New York, NY, USA: ACM
-
B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang, "Smart, useful, scary, creepy: perceptions of online behavioral advertising," in Proceedings of the Eighth Symposium on Usable Privacy and Security, ser. SOUPS '12. New York, NY, USA: ACM, 2012, pp. 4:1-4:15.
-
(2012)
SOUPS '12
-
-
Ur, B.1
Leon, P.G.2
Cranor, L.F.3
Shay, R.4
Wang, Y.5
-
8
-
-
84881262069
-
The Impact of Cookie Deletion on Site-Server and Ad-Server Metrics in Australia
-
January
-
comScore, "The Impact of Cookie Deletion on Site-Server and Ad-Server Metrics in Australia," January 2011.
-
(2011)
comScore
-
-
-
9
-
-
84881256791
-
-
"Ghostery," http:wwww.ghostery.com.
-
Ghostery
-
-
-
13
-
-
84881232179
-
Fingerprinting information in JavaScript implementations
-
H. Wang, Ed. IEEE Computer Society, May
-
K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham, "Fingerprinting information in JavaScript implementations," in Proceedings of W2SP 2011, H. Wang, Ed. IEEE Computer Society, May 2011.
-
(2011)
Proceedings of W2SP 2011
-
-
Mowery, K.1
Bogenreif, D.2
Yilek, S.3
Shacham, H.4
-
14
-
-
84869847729
-
Rozzle: De-cloaking internet malware
-
C. Kolbitsch, B. Livshits, B. Zorn, and C. Seifert, "Rozzle: De-cloaking internet malware," in IEEE Symposium on Security and Privacy, May 2012.
-
IEEE Symposium on Security and Privacy, May 2012
-
-
Kolbitsch, C.1
Livshits, B.2
Zorn, B.3
Seifert, C.4
-
15
-
-
84881236981
-
Device identification in online banking is privacy threat, expert says
-
April
-
E. Mills, "Device identification in online banking is privacy threat, expert says," CNET News (April 2009).
-
(2009)
CNET News
-
-
Mills, E.1
-
18
-
-
84889027843
-
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications
-
T.-F. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi, "Host Fingerprinting and Tracking on the Web: Privacy and Security Implications," in Proceddings of the 19th Annual Network and Distributed System Security Symposium (NDSS), 2012.
-
Proceddings of the 19th Annual Network and Distributed System Security Symposium (NDSS), 2012
-
-
Yen, T.-F.1
Xie, Y.2
Yu, F.3
Yu, R.P.4
Abadi, M.5
-
22
-
-
78649998785
-
An empirical study of privacy-violating information flows in JavaScript Web applications
-
D. Jang, R. Jhala, S. Lerner, and H. Shacham, "An empirical study of privacy-violating information flows in JavaScript Web applications," in Proceedings of CCS 2010, Oct. 2010.
-
Proceedings of CCS 2010, Oct. 2010
-
-
Jang, D.1
Jhala, R.2
Lerner, S.3
Shacham, H.4
-
26
-
-
85050193682
-
Network Security and Fraud Detection System and Method
-
Patent US20080040802
-
G. Pierson and J. DeHaan, "Patent US20080040802 - Network Security and Fraud Detection System and Method."
-
-
-
Pierson, G.1
DeHaan, J.2
-
27
-
-
77954566293
-
Detection and analysis of drive-by-download attacks and malicious javascript code
-
M. Cova, C. Kruegel, and G. Vigna, "Detection and analysis of drive-by-download attacks and malicious javascript code," in Proceedings of the 19th International Conference on World Wide Web (WWW), 2010, pp. 281-290.
-
Proceedings of the 19th International Conference on World Wide Web (WWW), 2010
, pp. 281-290
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
31
-
-
84881244529
-
-
"Web Tracking Protection," http://www.w3.org/Submission/2011/ SUBM-web-tracking-protection-20110224/.
-
Web Tracking Protection
-
-
-
36
-
-
77953112077
-
Flash Cookies and Privacy
-
preprint August
-
A. Soltani, S. Canty, Q. Mayo, L. Thomas, and C. J. Hoofnagle, "Flash Cookies and Privacy," in SSRN preprint (August 2009).
-
(2009)
SSRN
-
-
Soltani, A.1
Canty, S.2
Mayo, Q.3
Thomas, L.4
Hoofnagle, C.J.5
-
39
-
-
84881222012
-
Pixel perfect: Fingerprinting canvas in HTML5
-
M. Fredrikson, Ed. IEEE Computer Society, May
-
K. Mowery and H. Shacham, "Pixel perfect: Fingerprinting canvas in HTML5," in Proceedings of W2SP 2012, M. Fredrikson, Ed. IEEE Computer Society, May 2012.
-
(2012)
Proceedings of W2SP 2012
-
-
Mowery, K.1
Shacham, H.2
-
41
-
-
80051955689
-
I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks
-
Proceedings of the 2011 IEEE Symposium on Security and Privacy, ser.
-
Z. Weinberg, E. Y. Chen, P. R. Jayaraman, and C. Jackson, "I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks," in Proceedings of the 2011 IEEE Symposium on Security and Privacy, ser. SP '11, 2011, pp. 147-161.
-
(2011)
SP '11
, pp. 147-161
-
-
Weinberg, Z.1
Chen, E.Y.2
Jayaraman, P.R.3
Jackson, C.4
-
42
-
-
84869428407
-
You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions
-
N. Nikiforakis, L. Invernizzi, A. Kapravelos, S. V. Acker, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna, "You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions," in Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2012.
-
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2012
-
-
Nikiforakis, N.1
Invernizzi, L.2
Kapravelos, A.3
Acker, S.V.4
Joosen, W.5
Kruegel, C.6
Piessens, F.7
Vigna, G.8
|