
on Networked Systems Design and Implementation,
pages 169–182. USENIX Association, 2011.
[21] S. Kamkar. Evercookie - virtually irrevocable
persistent cookies. http://samy.pl/evercookie/, Sep
2010.
[22] M. Kerrisk. strace(1) - linux manual page. http:
//man7.org/linux/man-pages/man1/strace.1.html,
May 2014.
[23] T. Kohno, A. Broido, and K. C. Claffy. Remote
physical device fingerprinting. IEEE Transactions on
Dependable and Secure Computing, 2(2):93–108, 2005.
[24] R. Kotcher, Y. Pei, P. Jumde, and C. Jackson.
Cross-origin pixel stealing: timing attacks using CSS
filters. In ACM Conference on Computer and
Communications Security (CCS), pages 1055–1062.
ACM, 2013.
[25] B. Krishnamurthy and C. Wills. Privacy diffusion on
the Web: a longitudinal perspective. In International
Conference on World Wide Web, pages 541–550.
ACM, 2009.
[26] B. Krishnamurthy and C. E. Wills. On the leakage of
personally identifiable information via online social
networks. In ACM Workshop on Online Social
Networks, pages 7–12. ACM, 2009.
[27] B. Liu, A. Sheth, U. Weinsberg, J. Chandrashekar,
and R. Govindan. AdReveal: Improving transparency
into online targeted advertising. In ACM Workshop on
Hot Topics in Networks, page 12. ACM, 2013.
[28] J. Mayer. Tracking the trackers: Self-help tools.
https://cyberlaw.stanford.edu/blog/2011/09/
tracking-trackers-self-help-tools, September
2011.
[29] J. R. Mayer and J. C. Mitchell. Third-party web
tracking: Policy and technology. In IEEE Symposium
on Security and Privacy (S&P)), pages 413–427.
IEEE, 2012.
[30] A. M. McDonald and L. F. Cranor. Survey of the Use
of Adobe Flash Local Shared Objects to Respawn
HTTP Cookies, A. ISJLP, 7:639, 2011.
[31] K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham.
Fingerprinting information in JavaScript
implementations. In Web 2.0 Workshop on Security
and Privacy (W2SP), volume 2. IEEE, 2011.
[32] K. Mowery and H. Shacham. Pixel perfect:
Fingerprinting canvas in HTML5. In Web 2.0
Workshop on Security and Privacy (W2SP). IEEE,
2012.
[33] M. Mulazzani, P. Reschl, M. Huber, M. Leithner,
S. Schrittwieser, E. Weippl, and F. C. Wien. Fast and
reliable browser identification with JavaScript engine
fingerprinting. In Web 2.0 Workshop on Security and
Privacy (W2SP), volume 1. IEEE, 2013.
[34] A. Narayanan, J. Mayer, and S. Iyengar. Tracking Not
Required: Behavioral Targeting.
http://33bits.org/2012/06/11/tracking-not-
required-behavioral-targeting/, 2012.
[35] N. Nikiforakis, L. Invernizzi, A. Kapravelos,
S. Van Acker, W. Joosen, C. Kruegel, F. Piessens, and
G. Vigna. You are what you include: Large-scale
evaluation of remote javascript inclusions. In ACM
Conference on Computer and Communications
Security (CCS), pages 736–747. ACM, 2012.
[36] N. Nikiforakis, W. Joosen, and B. Livshits.
PriVaricator: Deceiving Fingerprinters with Little
White Lies. Available at
http://research.microsoft.com/en-us/um/people/
livshits/papers%5Ctr%5Cprivaricator.pdf.
[37] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel,
F. Piessens, and G. Vigna. Cookieless monster:
Exploring the ecosystem of web-based device
fingerprinting. In IEEE Symposium on Security and
Privacy, pages 541–555. IEEE, 2013.
[38] L. Olejnik, T. Minh-Dung, and C. Castelluccia. Selling
Off Privacy at Auction. In Annual Network and
Distributed System Security Symposium (NDSS).
IEEE, 2014.
[39] C. R. Orr, A. Chauhan, M. Gupta, C. J. Frisz, and
C. W. Dunn. An approach for identifying
JavaScript-loaded advertisements through static
program analysis. In ACM Workshop on Privacy in
the Electronic Society (WPES), pages 1–12. ACM,
2012.
[40] M. Perry, E. Clark, and S. Murdoch. The design and
implementation of the Tor browser [draft]. https://
www.torproject.org/projects/torbrowser/design,
2013.
[41] F. Roesner, T. Kohno, and D. Wetherall. Detecting
and Defending Against Third-Party Tracking on the
Web. In Symposium on Networking Systems Design
and Implementation. USENIX Association, 2012.
[42] N. Singer. Do Not Track? Advertisers Say ‘Don’t
Tread on Us’. http://www.nytimes.com/2012/10/14/
technology/do-not-track-movement-is-drawing-
advertisers-fire.html, 2012.
[43] A. Soltani, S. Canty, Q. Mayo, L. Thomas, and C. J.
Hoofnagle. Flash Cookies and Privacy. In AAAI
Spring Symposium: Intelligent Information Privacy
Management. AAAI, 2010.
[44] O. Sorensen. Zombie-cookies: Case studies and
mitigation. In Internet Technology and Secured
Transactions (ICITST), pages 321–326. IEEE, 2013.
[45] P. Stone. Pixel perfect timing attacks with HTML5.
Context Information Security (White Paper), 2013.
[46] A. Taly, J. C. Mitchell, M. S. Miller, J. Nagra, et al.
Automated analysis of security-critical javascript apis.
In IEEE Security and Privacy (S&P), pages 363–378.
IEEE, 2011.
[47] J. Temple. Stale Cookies: How companies are tracking
you online today. http://blog.sfgate.com/
techchron/2013/10/02/stale-cookies-how-
companies-are-tracking-you-online-today/, 2013.
[48] M. Tran, X. Dong, Z. Liang, and X. Jiang. Tracking
the trackers: Fast and scalable dynamic analysis of
web content for privacy violations. In Applied
Cryptography and Network Security, pages 418–435.
Springer, 2012.
[49] M.-D. Tran, G. Acs, and C. Castelluccia. Retargeting
without tracking. arXiv preprint arXiv:1404.4533,
2014.
[50] T. Unger, M. Mulazzani, D. Fruhwirt, M. Huber,
S. Schrittwieser, and E. Weippl. SHPF: Enhancing
HTTP(S) Session Security with Browser
Fingerprinting. In Availability, Reliability and Security
(ARES), pages 255–261. IEEE, 2013.
687