
B WEB CATEGORIES OF PWAS VULNERABLE
TO THE SIDE-CHANNEL ATTACK ON
BROWSING HISTORY
Category # of Websites
Technology & Computing 100
News / Weather / Information 71
Travel 45
Non-Standard Content 43
Arts & Entertainment 36
Hobbies & Interests 32
Personal Finance 29
Hotels 28
Shopping 37
Education 22
Food & Drink 20
Automotive 19
Society 17
Video & Computer Games 17
Business 17
File Sharing 16
Adult Content 15
Real Estate 14
Sports 14
Health & Fitness 14
Table 6: Top 20 categories of vulnerable PWAs
REFERENCES
[1]
G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz. 2014.
The Web Never Forgets: Persistent Tracking Mechanisms in the Wild. In ACM
Conference on Computer and Communications Security. ACM.
[2]
Urban Airship. 2009. Retrieved April 25, 2018 from https://www.urbanairship.
com/
[3]
A. Barth, C. Jackson, and J. Mitchell. 2008. Securing Frame Communications in
Browsers. In USENIX Security Symposium. USENIX Association.
[4]
A. Biørn-Hansen, T. Majchrzak, and T. Grønli. 2017. Progressive Web Apps: the
Possible Web-native Unifier for Mobile Development. In International Conference
on Web Information Systems and Technologies.
[5]
Bugzilla. 2015. Iframe Onload Event Does Not Fire. Retrieved April 28, 2018
from https://bugzilla.mozilla.org/show_bug.cgi?id=444165
[6]
P. Chapman and D. Evans. 2011. Automated Black-box Detection of Side-channel
Vulnerabilities in Web Applications. In ACM Conference on Computer and Com-
munications Security. ACM.
[7]
S. Chen, R. Wang, X. Wang, and K. Zhang. 2010. Side-Channel Leaks in Web
Applications: A Reality Today, a Challenge Tomorrow. In Proceedings of the IEEE
Symposium on Security and Privacy. IEEE Computer Society.
[8]
Chromium. 2014. Javascript Iframe Onerror Event. Retrieved April 28, 2018
from https://bugs.chromium.org/p/chromium/issues/detail?id=365457
[9] Coinhive. 2018. Coinhive – Monero JavaScript Mining. https://coinhive.com/
[10]
M. Cova, C. Kruegel, and G. Vigna. 2008. There is No Free Phish: An Analysis
of "Free" and Live Phishing Kits. In Proceedings of the Conference on USENIX
Workshop on Offensive Technologies. USENIX Association.
[11]
Apple Developer. 2016. Apple Certificates Support. Retrieved May 9, 2018 from
https://developer.apple.com/support/certificates/
[12]
Chrome Developer. 2018. Chrome Extentions - Content Settings. Retrieved Au-
guest 14, 2018 from https://developer.chrome.com/extensions/contentSettings#
type-ContentSetting
[13]
Google Developers. 2016. AliExpress. Retrieved May 1, 2018 from https:
//developers.google.com/web/showcase/2016/aliexpress
[14]
Google Developers. 2016. Flipkart Triples Time-on-site with Progressive Web
App. Retrieved May 1, 2018 from https://developers.google.com/web/showcase/
2016/flipkart
[15]
Google Developers. 2016. Introduction to Progressive Web Apps. Retrieved May
9, 2018 from https://codelabs.developers.google.com/pwa-dev-summit
[16]
Google Developers. 2016. Mythbusting HTTPS. Retrieved April
25, 2018 from http://www.codechannels.com/video/Chrome/chrome/
mythbusting-https- progressive-web-app-summit-2016/
[17]
Google Developers. 2018. Introduction to Push Notifications. Re-
trieved May 9, 2018 from https://developers.google.com/web/ilt/pwa/
introduction-to- push-notifications
[18]
Google Developers. 2018. PWA Case Studies. Retrieved April 26, 2018 from
https://developers.google.com/web/showcase
[19]
Google Developers. 2018. Web Push Protocol. Retrieved May 9,
2018 from https://developers.google.com/web/fundamentals/push-notifications/
web-push- protocol
[20] R. Dhamija, J. Tygar, and M. Hearst. 2006. Why Phishing Works. In Proceedings
of the SIGCHI Conference on Human Factors in Computing Systems. ACM.
[21]
Chromium Documents. 2018. Do Service Workers live forever? Retrieved Au-
guest 14, 2018 from https://github.com/chromium/chromium/blob/master/docs/
security/service-worker- security-faq.md#do- service-workers- live-forever
[22]
E. Felten and M. Schneider. 2000. Timing Attacks on Web Privacy. In ACM
Conference on Computer and Communications Security. ACM.
[23]
D. Florencio and C. Herley. 2006. Password Rescue: A New Approach to Phishing
Prevention. In 1st USENIX Workshop on Hot Topics in Security. USENIX Associa-
tion.
[24]
Linux Foundation. 2018. Let’s Encrypt. Retrieved April 25, 2018 from https:
//letsencrypt.org/
[25] FoxPush. 2016. Retrieved April 25, 2018 from https://www.foxpush.com/
[26]
T.V. Goethem, M. Vanhoef, F. Piessens, and W. Joosen. 2016. Request and Conquer:
Exposing Cross-Origin Resource Size. In USENIX Security Symposium. USENIX
Association.
[27]
Google. 2018. Google Safe Browsing. Retrieved Auguest 11, 2018 from https:
//developers.google.com/safe-browsing/
[28]
W3C Groups. 2016. Content Security Policy Level 3. Retrieved May 9, 2018 from
https://www.w3.org/TR/CSP3/
[29]
W3C Groups. 2017. Web Workers. Retrieved April 24, 2017 from https://w3c.
github.io/workers/
[30]
W3C Groups. 2018. Push API. Retrieved May 9, 2018 from https://w3c.github.
io/push-api/
[31]
W3C Groups. 2018. Service Workers Nightly. Retrieved April 24, 2018 from
https://w3c.github.io/ServiceWorker/
[32]
W3C Groups. 2018. the Notification API. Retrieved May 7, 2018 from https:
//notifications.spec.whatwg.org/
[33]
X. Han, N. Kheir, and D.Balzarotti. 2016. PhishEye: Live Monitoring of Sandboxed
Phishing Kits. In ACM Conference on Computer and Communications Security.
ACM.
[34] Izooto. 2016. Retrieved April 25, 2018 from https://www.izooto.com/
[35]
T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer. 2007. Social Phishing.
Commun. ACM (2007).
[36]
M. Jakobsson and S. Myers. [n. d.]. Phishing and Countermeasures: Understanding
the Increasing Problem of Electronic Identity Theft. Wiley-Interscience.
[37]
Huang L, A. Moshchuk, H. J. Wang, S. Schecter, and C. Jackson. 2012. Clickjacking:
Attacks and Defenses. In USENIX Security Symposium. USENIX Association.
[38]
S. Lee, H. Kim, and J. Kim. 2015. Identifying Cross-origin Resource Status using
Application Cache. In Proceedings of the Annual Network and Distributed System
Security Symposium.
[39]
T. Lee. 2017. How Bitcoins Became Worth $10,000. Retrieved
May 9, 2017 from https://arstechnica.com/tech-policy/2017/11/
how-bitcoins- became-worth- 10000/
[40]
T. Majchrzak, A. Biørn-Hansen, and T. Grønli. 2018. Progressive Web Apps:
the Definite Approach to Cross-Platform Development?. In Hawaii International
Conference on System Sciences.
[41]
I. Malavolta. 2016. Beyond Native Apps: Web Technologies to the Rescue!
(Keynote). In Proceedings of the 1st International Workshop on Mobile Development.
ACM.
[42]
I. Malavolta, G. Procaccianti, P. Noorland, and P. Vukmirovic. 2017. Assessing
the Impact of Service Workers on the Energy Efficiency of Progressive Web Apps.
In International Conference on Mobile Software Engineering and Systems.
[43]
R. McPherson, S. Jana, and V. Shmatikov. 2015. No Escape From Reality: Security
and Privacy of Augmented Reality Browsers. In International World Wide Web
Conference.
[44] mitmproxy. 2018. Retrieved April 25, 2018 from https://mitmproxy.org/
[45]
T. Moore and R. Clayton. 2012. Discovering Phishing Dropboxes using Email
Metadata. In eCrime Researchers Summit.
[46]
Mozilla Developer Network. 2016. HSTS - Strict Transport Security. Re-
trieved April 25, 2018 from https://developer.mozilla.org/en-US/docs/Web/HTTP/
Headers/Strict-Transport- Security
[47]
Mozilla Developer Network. 2017. CSP: frame-ancestors - HTTP. Retrieved
May 9, 2018 from https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/
Content-Security- Policy/frame-ancestors