
8. REFERENCES
[1] Bose v. interclick, inc., 2011.
[2] G. Acar, C. Eubank, S. Englehardt, M. Juarez,
A. Narayanan, and C. Diaz. The web never forgets:
Persistent tracking mechanisms in the wild. In
Proceedings of the 2014 ACM SIGSAC Conference on
Computer and Communications Security, pages
674–689. ACM, 2014.
[3] J. Archibald. Application Cache is a douchebag.
http://alistapart.com/article/application-
cache-is-a-douchebag, May 2012.
[4] L. D. Baron. Preventing attacks on a user’s history
through CSS :visited selectors.
http://dbaron.org/mozilla/visited-privacy, 2010.
[5] A. Barth, C. Jackson, and J. C. Mitchell. Robust
defenses for cross-site request forgery. In Proceedings
of the 15th ACM conference on Computer and
communications security, pages 75–88. ACM, 2008.
[6] Beevolve. An exhaustive study of Twitter users across
the world.
http://www.beevolve.com/twitter-statistics/,
October 2012.
[7] A. Bortz and D. Boneh. Exposing private information
by timing web applications. In Proceedings of the 16th
international conference on World Wide Web, pages
621–628. ACM, 2007.
[8] D. Brumley and D. Boneh. Remote timing attacks are
practical. Computer Networks, 48(5):701–716, 2005.
[9] A. Clover. CSS visited pages disclosure, 2002.
[10] X. Ding, L. Zhang, Z. Wan, and M. Gu. A brief survey
on de-anonymization attacks in online social networks.
In CASoN, pages 611–615, 2010.
[11] Facebook. Company info.
http://newsroom.fb.com/company-info/.
[12] E. W. Felten and M. A. Schneider. Timing attacks on
web privacy. In Proceedings of the 7th ACM conference
on Computer and communications security, pages
25–32. ACM, 2000.
[13] R. Fielding, J. Gettys, J. Mogul, H. Frystyk,
L. Masinter, P. Leach, and T. Berners-Lee. Hypertext
transfer protocol–HTTP/1.1, 1999. RFC2616, 2006.
[14] H. Gao, J. Hu, T. Huang, J. Wang, and Y. Chen.
Security issues in online social networks. Internet
Computing, IEEE, 15(4):56–63, 2011.
[15] D. Goodin. Marketer taps browser flaw to see if you’re
pregnant. http://www.theregister.co.uk/2011/07/
22/marketer_sniffs_browser_history/, July 2011.
[16] M. Heiderich, M. Niemietz, F. Schuster, T. Holz, and
J. Schwenk. Scriptless attacks: Stealing the pie
without touching the sill. In Proceedings of the 2012
ACM conference on Computer and communications
security, pages 760–771. ACM, 2012.
[17] D. Jang, R. Jhala, S. Lerner, and H. Shacham. An
empirical study of privacy-violating information flows
in JavaScript web applications. In Proceedings of the
17th ACM conference on Computer and
communications security, pages 270–283. ACM, 2010.
[18] Y. Jia, X. Dong, Z. Liang, and P. Saxena. I know
where you’ve been: Geo-inference attacks via the
browser cache. Web 2.0 Security & Privacy (W2SP),
2014.
[19] M. Johns. Exploiting the intranet with a webpage.
http://web.sec.uni-passau.de/members/martin/
docs/070906_HITB_Martin_Johns.pdf, September
2007.
[20] P. C. Kocher. Timing attacks on implementations of
Diffie-Hellman, RSA, DSS, and other systems. In
Advances in Cryptology—CRYPTO’96, pages 104–113.
Springer, 1996.
[21] R. Kotcher, Y. Pei, P. Jumde, and C. Jackson.
Cross-origin pixel stealing: timing attacks using CSS
filters. In Proceedings of the 2013 ACM SIGSAC
conference on Computer & communications security,
pages 1055–1062. ACM, 2013.
[22] S. Lee, H. Kim, and J. Kim. Identifying cross-origin
resource status using Application Cache. In
Proceedings of the ISOC Network and Distributed
System Security Symposium (NDSS’15), 2015.
[23] LinkedIn. About LinkedIn.
https://press.linkedin.com/about-linkedin.
[24] J. Mann. High Resolution Time. W3C
recommendation, 2012.
[25] Microsoft. modern.IE - platform status.
https://status.modern.ie/serviceworker.
[26] Mozilla Developer Network. ServiceWorker api.
https://developer.mozilla.org/en-
US/docs/Web/API/ServiceWorker_API.
[27] Mozilla Developer Network. Using HTML5 audio and
video. https://developer.mozilla.org/en-US/docs/
Web/Guide/HTML/Using_HTML5_audio_and_video.
[28] Y. Nagami, D. Miyamoto, H. Hazeyama, and
Y. Kadobayashi. An independent evaluation of web
timing attack and its countermeasure. In Availability,
Reliability and Security (ARES), 2008.
[29] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel,
F. Piessens, and G. Vigna. Cookieless monster:
Exploring the ecosystem of web-based device
fingerprinting. In Security and privacy (SP), 2013
IEEE symposium on, pages 541–555. IEEE, 2013.
[30] OOKLA Net Index. Household download index.
http://www.netindex.com/download/allcountries/,
February 2015.
[31] S. Schinzel. An efficient mitigation method for timing
side channels on the web. In 2nd International
Workshop on Constructive Side-Channel Analysis and
Secure Design (COSADE), 2011.
[32] I. Schmitt and S. Schinzel. WAFFle: Fingerprinting
filter rules of web application firewalls. In WOOT,
pages 34–40, 2012.
[33] StatCounter. Top 5 desktop browsers on jan 2015.
http://gs.statcounter.com/#desktop-browser-ww-
monthly-201501-201501-bar, January 2015.
[34] P. Stone. Bug 711043 - (CVE-2013-1693) SVG filter
timing attack. https:
//bugzilla.mozilla.org/show_bug.cgi?id=711043,
December 2011.
[35] P. Stone. Pixel perfect timing attacks with HTML5.
Context Information Security (White Paper), 2013.
[36] Twitter. Company info.
https://about.twitter.com/company, February 2015.
[37] A. Van Kesteren and WHATWG. Fetch.
https://fetch.spec.whatwg.org/, January 2015.
[38] W3C. Navigation Timing.
http://www.w3.org/TR/navigation-timing/,
December 2012.
[39] W3C. Service Workers.
http://www.w3.org/TR/service-workers/, February
2015.
[40] Z. Weinberg, E. Y. Chen, P. R. Jayaraman, and
C. Jackson. I still know what you visited last summer:
Leaking browsing history via user interaction and side
channel attacks. In Security and Privacy (SP), 2011
IEEE Symposium on, pages 147–161. IEEE, 2011.
[41] WHATWG. Offline web applications.
https://html.spec.whatwg.org/multipage/
browsers.html#offline, January 2015.
[42] G. Wondracek, T. Holz, E. Kirda, and C. Kruegel. A
practical attack to de-anonymize social network users.
In Security and Privacy (SP), 2010 IEEE Symposium
on, pages 223–238. IEEE, 2010.
12