
[2] G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. G¨
urses,
F. Piessens, and B. Preneel. FPDetective: dusting the
web for fingerprinters. In Proceedings of CCS.ACM, 2013.
[3] L. A. Adamic and B. A. Huberman. Zipf’s
law and the internet. Glottometrics,3(1):143–150, 2002.
[4] H. C. Altaweel I,
Good N. Web privacy census. Technology Science,2015.
[5] J. Angwin. What they
know. The Wall Street Journal. http://online.wsj.com/
public/page/what-they-know-digital-privacy.html, 2012.
[6] M. Ayenson, D. J. Wambach, A. Soltani,
N. Good, and C. J. Hoofnagle. Flash cookies and
privacy II: Now with HTML5 and ETag respawning. World
Wide Web Internet And Web Information Systems,2011.
[7] P. E. Black. Ratcliff/Obershelp pattern recognition.
http://xlinux.nist.gov/dads/HTML/ratcliffObershelp.html,
Dec. 2004.
[8] Bugzilla. WebRTC Internal IP Address Leakage.
https://bugzilla.mozilla.org/show bug.cgi?id=959893.
[9] A. Datta,
M. C. Tschantz, and A. Datta. Automated experiments on
ad privacy settings. Privacy Enhancing Technologies,2015.
[10] W. Davis. KISSmetrics Finalizes Supercookies Settlement.
http://www.mediapost.com/publications/article/
191409/kissmetrics-finalizes-supercookies- settlement.html,
2013. [Online; accessed 12-May-2014].
[11] Disconnect. Tracking
Protection Lists. https://disconnect.me/trackerprotection.
[12] P. Eckersley. How unique is your web browser?
In Privacy Enhancing Technologies.Springer, 2010.
[13] Electronic Frontier Foundation.
Encrypting the Web. https://www.eff.org/encrypt-the-web.
[14] S. Englehardt, D. Reisman, C. Eubank,
P. Zimmerman, J. Mayer, A. Narayanan, and E. W. Felten.
Cookies that give you away: The surveillance implications
of web tracking. In 24th International Conference
on World Wide Web,pages 289–299. International
World Wide Web Conferences Steering Committee, 2015.
[15] Federal Trade Commission. Google will pay $22.5 million
to settle FTC charges it misrepresented privacy assurances
to users of Apple’s Safari internet browser. https://www.
ftc.gov/news-events/press-releases/2012/08/google-will-
pay-225-million- settle-ftc-charges-it-misrepresented, 2012.
[16] D. Fifield and S. Egelman. Fingerprinting
web users through font metrics. In Financial Cryptography
and Data Security,pages 107–124. Springer, 2015.
[17] N. Fruchter, H. Miao, S. Stevenson,
and R. Balebako. Variations in tracking in relation
to geographic location. In Proceedings of W2SP,2015.
[18] S. Gorman
and J. Valentino-Devries. New Details Show Broader
NSA Surveillance Reach. http://on.wsj.com/1zcVv78, 2013.
[19] A. Hannak, G. Soeller, D. Lazer, A. Mislove, and C. Wilson.
Measuring price discrimination and steering on e-commerce
web sites. In 14th Internet Measurement Conference,2014.
[20] C. J. Hoofnagle and N. Good.
Web privacy census. Available at SSRN 2460547,2012.
[21] M. Kranch and
J. Bonneau. Upgrading HTTPS in midair: HSTS and key
pinning in practice. In NDSS ’15: The 2015 Network and
Distributed System Security Symposium,February 2015.
[22] S. A. Krashakov, A. B. Teslyuk, and L. N.
Shchur. On the universality of rank distributions of website
popularity. Computer Networks,50(11):1769–1780, 2006.
[23] B. Krishnamurthy, K. Naryshkin, and C. Wills.
Privacy leakage vs. protection measures: the growing
disconnect. In Proceedings of W2SP,volume 2, 2011.
[24] B. Krishnamurthy and C. Wills.
Privacy diffusion on the web: alongitudinal perspective.
In Conference on World Wide Web.ACM, 2009.
[25] B. Krishnamurthy and C. E. Wills. On the leakage of per-
sonally identifiable information via online social networks. In
2nd ACM workshop on Online social networks.ACM, 2009.
[26] P. Laperdrix, W. Rudametkin, and B. Baudry.
Beauty and the beast: Diverting modern web browsers
to build unique browser fingerprints. In 37th IEEE
Symposium on Security and Privacy (S&P 2016),2016.
[27] M. L´ecuyer, G. Ducoffe, F. Lan, A. Papancea,
T. Petsios, R. Spahn, A. Chaintreau, and R. Geambasu.
Xray: Enhancing the web’s transparency with differential
correlation. In USENIX Security Symposium,2014.
[28] M. Lecuyer, R. Spahn,
Y. Spiliopolous, A. Chaintreau, R. Geambasu, and D. Hsu.
Sunlight: Fine-grained targeting detection at scale with
statistical confidence. In Proceedings of CCS.ACM, 2015.
[29] A. Lerner, A. K. Simpson, T. Kohno,
and F. Roesner. Internet jones and the raiders of the
lost trackers: An archaeological study of web tracking from
1996 to 2016. In Proceedings of USENIX Security),2016.
[30] J. Leyden. Sites pulling sneaky flash cookie-snoop. http:
//www.theregister.co.uk/2009/08/19/flash cookies/, 2009.
[31] T. Libert. Exposing the invisible web: An
analysis of third-party http requests on 1million websites.
International Journal of Communication,9(0), 2015.
[32] D. Mattioli. On Orbitz, Mac users steered
to pricier hotels. http://online.wsj.com/news/articles/
SB10001424052702304458604577488822667325882, 2012.
[33] J. R. Mayer
and J. C. Mitchell. Third-party web tracking: Policy and
technology. In Security and Privacy (S&P).IEEE, 2012.
[34] A. M. McDonald and L. F.
Cranor. Survey of the use of Adobe Flash Local Shared
Objects to respawn HTTP cookies, a. ISJLP,7, 2011.
[35] J. Mikians, L. Gyarmati, V. Erramilli, and N. Laoutaris.
Detecting price and search discrimination on the internet.
In Workshop on Hot Topics in Networks.ACM, 2012.
[36] N. Mohamed.
You deleted your cookies? think again. http://www.wired.
com/2009/08/you-deleted-your-cookies-think-again/, 2009.
[37] K. Mowery and H. Shacham. Pixel perfect: Fingerprinting
canvas in html5. Proceedings of W2SP,2012.
[38] Mozilla
Developer Network. Mixed content - Security. https://
developer.mozilla.org/en-US/docs/Security/Mixed content.
[39] C. Neasbitt, B. Li, R. Perdisci, L. Lu, K. Singh, and
K. Li. Webcapsule: Towards alightweight forensic engine
for web browsers. In Proceedings of CCS.ACM, 2015.
[40] N. Nikiforakis, L. Invernizzi, A. Kapravelos, S. Van Acker,
W. Joosen, C. Kruegel, F. Piessens, and G. Vigna.
You are what you include: Large-scale evaluation of remote
javascript inclusions. In Proceedings of CCS.ACM, 2012.
[41] N. Nikiforakis, A. Kapravelos, W. Joosen,
C. Kruegel, F. Piessens, and G. Vigna. Cookieless
monster: Exploring the ecosystem of web-based device
fingerprinting. In Security and Privacy (S&P).IEEE, 2013.
[42] F. Ocariza, K. Pattabiraman, and
B. Zorn. Javascript errors in the wild: An empirical study.
In Software Reliability Engineering (ISSRE).IEEE, 2011.
[43] L. Olejnik,
G. Acar, C. Castelluccia, and C. Diaz. The leaking
battery. Cryptology ePrint Archive,Report 2015/616, 2015.
[44] L. Olejnik, C. Castelluccia, et al. Selling
off privacy at auction. In NDSS ’14: The 2014 Network
and Distributed System Security Symposium,2014.
[45] Phantom JS. Supported web
standards. http://www.webcitation.org/6hI3iptm5, 2016.
[46] M. Z. Rafique, T. Van Goethem, W. Joosen,
C. Huygens, and N. Nikiforakis. It’s free for areason:
Exploring the ecosystem of free live streaming services.
In Network and Distributed System Security (NDSS),2016.
[47] N. Robinson and J. Bonneau. Cognitive disconnect: