{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:30:01Z","timestamp":1726759801594},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/sp.2013.43","type":"proceedings-article","created":{"date-parts":[[2013,6,26]],"date-time":"2013-06-26T19:02:12Z","timestamp":1372273332000},"source":"Crossref","is-referenced-by-count":239,"title":["Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting"],"prefix":"10.1109","author":[{"given":"N.","family":"Nikiforakis","sequence":"first","affiliation":[]},{"given":"A.","family":"Kapravelos","sequence":"additional","affiliation":[]},{"given":"W.","family":"Joosen","sequence":"additional","affiliation":[]},{"given":"C.","family":"Kruegel","sequence":"additional","affiliation":[]},{"given":"F.","family":"Piessens","sequence":"additional","affiliation":[]},{"given":"G.","family":"Vigna","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"35","author":"klein","year":"0","journal-title":"How Fraudsters Are Disguising PCs to Fool Device Fingerprinting"},{"key":"17","author":"mayer","year":"0","journal-title":"Tracking the Trackers Early Results - Center for Internet and Society"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1446862"},{"key":"18","article-title":"Host Fingerprinting and Tracking on the Web: Privacy and Security Implications","author":"yen","year":"0","journal-title":"Proceddings of the 19th Annual Network and Distributed System Security Symposium (NDSS) 2012"},{"key":"33","author":"scott","year":"0","journal-title":"How Many Firefox Users Have Add-ons Installed? 85%!"},{"key":"15","article-title":"Device identification in online banking is privacy threat, expert says","author":"mills","year":"2009","journal-title":"CNET News"},{"key":"34","year":"0","journal-title":"Adblock Plus - For Annoyance-free Web Surfing"},{"key":"16","year":"0","journal-title":"Opt Out of Being Tracked"},{"key":"39","article-title":"Pixel perfect: Fingerprinting canvas in HTML5","author":"mowery","year":"2012","journal-title":"Proceedings of W2SP 2012"},{"key":"13","article-title":"Fingerprinting information in JavaScript implementations","author":"mowery","year":"2011","journal-title":"Proceedings of W2SP 2011"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.48"},{"key":"37","author":"xu","year":"0","journal-title":"Private Browsing and Flash Player 10 1"},{"key":"11","author":"mayer","year":"2009","journal-title":"Any Person A Pamphleteer"},{"key":"38","author":"gasse?e","year":"0","journal-title":"Measuring Time Spent on a Web Page"},{"key":"12","article-title":"How Unique Is Your Browser?","author":"eckersley","year":"0","journal-title":"Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS) 2010"},{"key":"21","author":"krebs","year":"0","journal-title":"How to Unplug Java from the Browser"},{"key":"20","author":"cluley","year":"0","journal-title":"How to Turn off Java on Your Browser - and Why You Should Do It Now"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382274"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.23"},{"key":"40","article-title":"Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns","author":"olejnik","year":"0","journal-title":"5th Workshop on Hot Topics in Privacy Enhancing Technologies (HOTPETS 2012)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866339"},{"key":"23","year":"0","journal-title":"Torbutton I Can't View Videos on YouTube and Other Flash-based Sites Why?"},{"key":"24","year":"0","journal-title":"Anubis Analyzing Unknown Binaries"},{"key":"25","year":"0","journal-title":"VirusTotal - Free Online Virus Malware and URL Scanner"},{"key":"26","article-title":"Network Security and Fraud Detection System and Method","author":"pierson","year":"0"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"28","year":"0","journal-title":"ECMAScript Language Specification Standard ECMA-262 Third Edition"},{"key":"29","author":"zalewski","year":"2011","journal-title":"The Tangled Web A Guide to Securing Model Web Applications"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177088"},{"key":"2","article-title":"Privacy leakage on the Internet","author":"krishnamurthy","year":"2010","journal-title":"IETF 77"},{"key":"10","year":"0","journal-title":"Collusion Discover Who's Tracking You Online"},{"key":"1","article-title":"Giving the Web a Memory Cost Its Users Privacy","author":"schwartz","year":"0","journal-title":"The New York Times"},{"key":"30","author":"andersen","year":"0","journal-title":"History of the Browser User-agent String"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"6","author":"turow","year":"2009","journal-title":"Americans Reject Tailored Advertising and Three Activities That Enable It"},{"key":"32","author":"eckersley","year":"0","journal-title":"Panopticlick - Self-Defense"},{"key":"5","article-title":"What They Know","year":"0","journal-title":"The Wall Street Journal"},{"key":"31","year":"0","journal-title":"Web Tracking Protection"},{"key":"4","first-page":"12","article-title":"Detecting and defending against third-party tracking on the web","author":"roesner","year":"2012","journal-title":"NSDI'12 Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation"},{"key":"9","year":"0","journal-title":"Ghostery"},{"key":"8","article-title":"The Impact of Cookie Deletion on Site-Server and Ad-Server Metrics in Australia","year":"2011","journal-title":"ComScore"}],"event":{"name":"2013 IEEE Symposium on Security and Privacy (SP) Conference","location":"Berkeley, CA","start":{"date-parts":[[2013,5,19]]},"end":{"date-parts":[[2013,5,22]]}},"container-title":["2013 IEEE Symposium on Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6547086\/6547088\/06547132.pdf?arnumber=6547132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T19:42:30Z","timestamp":1490211750000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6547132\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":42,"URL":"http:\/\/dx.doi.org\/10.1109\/sp.2013.43","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}