暂无分享,去创建一个
[1] Craig E. Wills,et al. What Ad Blockers Are (and Are Not) Doing , 2016, 2016 Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).
[2] Wouter Joosen,et al. Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting , 2013, 2013 IEEE Symposium on Security and Privacy.
[3] Vern Paxson,et al. Ad Injection at Scale: Assessing Deceptive Advertisement Modifications , 2015, 2015 IEEE Symposium on Security and Privacy.
[4] Rebecca Balebako,et al. Variations in Tracking in Relation to Geographic Location , 2015, ArXiv.
[5] Adrienne Porter Felt,et al. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness , 2013, USENIX Security Symposium.
[6] Gianluca Stringhini,et al. Movie Pirates of the Caribbean: Exploring Illegal Streaming Cyberlockers , 2018, ICWSM.
[7] Wouter Joosen,et al. It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services , 2016, NDSS.
[8] Shigeki Goto,et al. Detecting Drive-by-Download Attacks based on HTTP Context-Types , 2016 .
[9] Jun Zhao,et al. Measuring Third-party Tracker Power across Web and Mobile , 2018, ACM Trans. Internet Techn..
[10] Christopher Krügel,et al. Hulk: Eliciting Malicious Behavior in Browser Extensions , 2014, USENIX Security Symposium.
[11] William K. Robertson,et al. TrueClick: automatically distinguishing trick banners from genuine download links , 2014, ACSAC '14.
[12] Steven Englehardt,et al. Automated discovery of privacy violations on the web , 2018 .
[13] Sufian Hameed,et al. Clicksafe: Providing Security against Clickjacking Attacks , 2014, 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering.
[14] D. Leporini,et al. Architectures and protocols powering illegal content streaming over the Internet , 2015 .
[15] Stefan Savage,et al. Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser , 2017, CSET @ USENIX Security Symposium.
[16] Constantinos Patsakis,et al. I know what you streamed last night: On the security and privacy of streaming , 2018, Digit. Investig..
[17] Emiliano De Cristofaro,et al. Adblocking and Counter Blocking: A Slice of the Arms Race , 2016, FOCI.
[18] Niels Provos,et al. Trends and Lessons from Three Years Fighting Malicious Extensions , 2015, USENIX Security Symposium.
[19] Dan Boneh,et al. Busting frame busting a study of clickjacking vulnerabilities on popular sites , 2010 .
[20] Arvind Narayanan,et al. Online Tracking: A 1-million-site Measurement and Analysis , 2016, CCS.
[21] Arvind Narayanan,et al. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild , 2014, CCS.
[22] Zhiyun Qian,et al. The ad wars: retrospective measurement and analysis of anti-adblock filter lists , 2017, Internet Measurement Conference.
[23] Sunny Consolvo,et al. Improving SSL Warnings: Comprehension and Adherence , 2015, CHI.