
[30]
Gras, B., Razavi, K., Bosman, E., Bos, H., and Giuffrida, C. ASLR on the
Line: Practical Cache Attacks on the MMU. In Proceedings of the Symposium on
Networked and Distributed System Security (2017).
[31]
Gruss, D., Bidner, D., and Mangard, S. Practical memory deduplication attacks
in sandboxed javascript. In European Symposium on Research in Computer Security
(2015), Springer, pp. 108–122.
[32]
Guarnieri, S., and Livshits, B. Gatekeeper: mostly static enforcement of
security and reliability policies for javascript code. In Proceedings of the 18th
conference on USENIX security symposium (Berkeley, CA, USA, 2009), SSYM’09,
USENIX Association, pp. 151–168.
[33]
Heiderich, M., Frosch, T., and Holz, T. Iceshield: detection and mitigation
of malicious websites with a frozen dom. In International Workshop on Recent
Advances in Intrusion Detection (2011), Springer, pp. 281–300.
[34]
Ho, G., Boneh, D., Ballard, L., and Provos, N. Tick tock: building browser red
pills from timing side channels. In 8th USENIX Workshop on Offensive Technologies
(WOOT 14) (2014).
[35]
Kim, H., Lee, S., and Kim, J. Exploring and mitigating privacy threats of html5
geolocation api. In Proceedings of the 30th Annual Computer Security Applications
Conference (2014), ACM, pp. 306–315.
[36] Kostiainen, A. Vibration. http://www.w3.org/TR/vibration/, 2105.
[37]
Kostiainen, A., Oksanen, I., and Hazaël-Massieux, D. Html media capture.
http://www.w3.org/TR/html-media-capture/, 2104.
[38]
Kotcher, R., Pei, Y., Jumde, P., and Jackson, C. Cross-origin pixel stealing:
timing attacks using css filters. In Proceedings of the 2013 ACM SIGSAC conference
on Computer & communications security (2013), ACM, pp. 1055–1062.
[39]
Lamouri, M., and Cceres, M. Screen orientation. http://www.w3.org/TR/
screen-orientation/, 2105.
[40]
Laperdrix, P., Rudametkin, W., and Baudry, B. Beauty and the beast: Divert-
ing modern web browsers to build unique browser fingerprints. In 37th IEEE
Symposium on Security and Privacy (S&P 2016) (2016).
[41]
Liu, C., White, R. W., and Dumais, S. Understanding web browsing behaviors
through weibull analysis of dwell time. In Proceedings of the 33rd international
ACM SIGIR conference on Research and development in information retrieval (2010),
ACM, pp. 379–386.
[42]
Maone, G. Noscript - javascript/java/flash blocker for a safer firefox experience!
https://noscript.net/, 2015. [Online; accessed 08-February-2015].
[43] Meyerovich, L. A., and Livshits, B. Conscript: Specifying and enforcing fine-
grained security policies for javascript in the browser. In 2010 IEEE Symposium
on Security and Privacy (2010), IEEE, pp. 481–496.
[44] Miller, M. S. Google caja. https://developers.google.com/caja/, 2013.
[45] Mozilla Corporation. Dxr. https://github.com/mozilla/dxr, 2016.
[46]
Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., and
Vigna, G. Cookieless monster: Exploring the ecosystem of web-based device
fingerprinting. In IEEE Symposium on Security and Privacy (2013).
[47]
Olejnik, L. Stealing sensitive browser data with the W3C
Ambient Light Sensor API. https://blog.lukaszolejnik.com/
stealing-sensitive- browser- data-with-the-w3c-ambient- light-sensor-api/, 2017.
[48]
Olejnik, L., Acar, G., Castelluccia, C., and Diaz, C. The leaking battery a
privacy analysis of the html5 battery status api. Tech. rep., Cryptology ePrint
Archive, Report 2015/616, 2015, ht tp://eprint. iacr. org, 2015.
[49]
Oren, Y., Kemerlis, V. P., Sethumadhavan, S., and Keromytis, A. D. The spy in
the sandbox: Practical cache attacks in javascript and their implications. In Pro-
ceedings of the 22nd ACM SIGSAC Conference on Computer and Communications
Security (2015), ACM, pp. 1406–1418.
[50]
Ozment, A., and Schechter, S. E. Milk or wine: does software security improve
with age? In Usenix Security (2006).
[51]
Patrizio, A. How forbes inadvertently proved the anti-malware value
of ad blockers. http://www.networkworld.com/article/3021113/security/
forbes-malware- ad-blocker- advertisements.html, 2016. [Online; accessed 15-
February-2016].
[52]
Perry, M., Clark, E., and Murdoch, S. The design and implementation
of the tor browser. https://www.torproject.org/projects/torbrowser/design/
#fingerprinting-linkability, 2015. [Online; accessed 15-February-2016].
[53]
Shin, Y., Meneely, A., Williams, L., and Osborne, J. A. Evaluating complexity,
code churn, and developer activity metrics as indicators of software vulnerabili-
ties. IEEE Transactions on Software Engineering 37, 6 (2011), 772–787.
[54]
Snyder, P., Ansari, L., Taylor, C., and Kanich, C. Browser feature usage on
the modern web. In Proceedings of the 2016 Internet Measurement Conference (to
appear) (2016).
[55]
Son, S., and Shmatikov, V. The postman always rings twice: Attacking and
defending postmessage in html5 websites. In NDSS (2013).
[56]
Stamm, S., Sterne, B., and Markham, G. Reining in the web with content
security policy. In Proceedings of the 19th International Conference on World Wide
Web (2010), ACM, pp. 921–930.
[57]
Tian, Y., Liu, Y. C., Bhosale, A., Huang, L. S., Tague, P., and Jackson, C. All
your screens are belong to us: attacks exploiting the html5 screen sharing api.
In 2014 IEEE Symposium on Security and Privacy (2014), IEEE, pp. 34–48.
[58]
Turner, D., and Kostiainen, A. Ambient light events. http://www.w3.org/TR/
ambient-light/, 2105.
[59]
Van Goethem, T., Joosen, W., and Nikiforakis, N. The clock is still ticking:
Timing attacks in the modern web. In Proceedings of the 22nd ACM SIGSAC
Conference on Computer and Communications Security (2015), ACM, pp. 1382–
1393.
[60]
Van Goethem, T., Vanhoef, M., Piessens, F., and Joosen, W. Request and
conquer: Exposing cross-origin resource size. In Proceedings of the Usenix Security
Symposium (2016).
[61]
Web Hypertext Application Technology Working Group (WHATWG).
Html living standard. https://html.spec.whatwg.org/, 2015.
[62]
Weissbacher, M., Robertson, W.,Kirda, E., Kruegel, C., and Vigna, G. Zigzag:
Automatically hardening web applications against client-side validation vul-
nerabilities. In 24th USENIX Security Symposium (USENIX Security 15) (2015),
pp. 737–752.
[63]
Xu, M., Jang, Y., Xing, X., Kim, T., and Lee, W. Ucognito: Private browsing
without tears. In Proceedings of the 22nd ACM SIGSAC Conference on Computer
and Communications Security (2015), ACM, pp. 438–449.
[64]
Zimmermann, T., Nagappan, N., and Zeller, A. Predicting bugs from history.
In Software Evolution. Springer, 2008, pp. 69–88.