Alternative to third-party cookies: investigating persistent PII leakage-based web tracking
暂无分享,去创建一个
[1] Arnaud Legout,et al. Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels , 2020, Proc. Priv. Enhancing Technol..
[2] Nili Steinfeld,et al. "I agree to the terms and conditions": (How) do users read privacy policies online? An eye-tracking experiment , 2016, Comput. Hum. Behav..
[3] Arvind Narayanan,et al. Online Tracking: A 1-million-site Measurement and Analysis , 2016, CCS.
[4] Arnaud Legout,et al. ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic , 2015, MobiSys.
[5] Информатика. Public Suffix List , 2010 .
[6] Steve Uhlig,et al. Tracking Personal Identifiers Across the Web , 2016, PAM.
[7] Ilana Segall,et al. The Representativeness of Automated Web Crawls as a Surrogate for Human Browsing , 2020, WWW.
[8] Valery Dudykevych,et al. Detecting third-party user trackers with cookie files , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).
[9] Wouter Joosen,et al. The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion , 2021, Proc. Priv. Enhancing Technol..
[10] Arvind Narayanan,et al. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild , 2014, CCS.
[11] Xavier Blanc,et al. FP-Crawlers: Studying the Resilience of Browser Fingerprinting to Block Crawlers , 2020, Proceedings 2020 Workshop on Measurements, Attacks, and Defenses for the Web.
[12] Nick Nikiforakis,et al. Extended Tracking Powers: Measuring the Privacy Diffusion Enabled by Browser Extensions , 2017, WWW.
[13] Nick Nikiforakis,et al. Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms , 2016, Proc. Priv. Enhancing Technol..
[14] Norbert Pohlmann,et al. Measuring the Impact of the GDPR on Data Sharing in Ad Networks , 2020, AsiaCCS.
[15] Balachander Krishnamurthy,et al. WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Privacy Diffusion on the Web: A Longitudinal Perspective , 2022 .
[16] Kensuke Fukuda,et al. CNAME Cloaking-Based Tracking on the Web: Characterization, Detection, and Protection , 2021, IEEE Transactions on Network and Service Management.
[17] Elie Bursztein,et al. Cloak of Visibility: Detecting When Machines Browse a Different Web , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[18] Hugo L. Jonker,et al. Fingerprint Surface-Based Detection of Web Bot Detectors , 2019, ESORICS.
[19] Balachander Krishnamurthy,et al. Privacy leakage vs . Protection measures : the growing disconnect , 2011 .
[20] Frank Piessens,et al. FPDetective: dusting the web for fingerprinters , 2013, CCS.
[21] Sotiris Ioannidis,et al. You Shall Not Register! Detecting Privacy Leaks Across Registration Forms , 2019, IOSec/MSTEC/FINSEC@ESORICS.
[22] Arvind Narayanan,et al. I never signed up for this! Privacy implications of email tracking , 2018, Proc. Priv. Enhancing Technol..
[23] Wouter Joosen,et al. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation , 2018, NDSS.
[24] Aaron Alva,et al. Cross-Device Tracking: Measurement and Disclosures , 2017, Proc. Priv. Enhancing Technol..
[25] Nataliia Bielova. Web Tracking Technologies and Protection Mechanisms , 2017, CCS.
[26] Evangelos P. Markatos,et al. Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask , 2018, WWW.