
Mimicking Humanoid Usage Behavior for Studies of Online Services 15
8. Card, S.K., Moran, T.P., Newell, A.: The keystroke-level model for user perfor-
mance time with interactive systems. Communications of the ACM 23(7), 396–410
(Jul 1980)
9. Chaabane, A., Kaafar, M.A., Boreli, R.: Big friend is watching you: Analyzing on-
line social networks tracking capabilities. In: WOSN ’12. pp. 7–12. ACM, Helsinki,
Finland (Aug 2012)
10. Choudhary, S.R., Prasad, M.R., Alessandro Orso: X-PERT: a web application test-
ing tool for cross-browser inconsistency detection. In: ISSTA ’14. pp. 417–420.
ACM, San Jose, CA, USA (2014)
11. Dalai, A.K., Jena, S.K.: Online identification of illegitimate web server requests.
In: ICIP ’11. pp. 123–131. Springer, Bangalore, India (2011)
12. Degeling, M., Utz, C., Lentzsch, C., Hosseini, H., Schaub, F., Holz, T.: We Value
Your Privacy ... Now Take Some Cookies: Measuring the GDPR’s Impact on Web
Privacy. In: NDSS ’19. San Diego, CA, USA (Feb 2019)
13. DETER Project: DASH user guide (2014), https://deter-project.org/sites/
deter-test.isi.edu/files/files/dash_users_guide.pdf
14. Drury, C.G., Hoffmann, E.R.: A model for movement time on data-entry keyboards.
Ergonomics 35(2), 129–147 (Feb 1992)
15. Englehardt, S., Narayanan, A.: Online Tracking: A 1-million-site Measurement and
Analysis. In: CCS’16. pp. 1388–1401. ACM, Vienna, Austria (Oct 2016)
16. European Parliament and Council: Regulation (EU) 2016/679 (GDPR) (Jan 2016),
http://data.europa.eu/eli/reg/2016/679/oj/eng
17. Franken, G., Goethem, T.V., Joosen, W.: Who Left Open the Cookie Jar? A
Comprehensive Evaluation of Third-Party Cookie Policies. In: USENIX Security
’18. Baltimore, MD, USA (Aug 2018)
18. Freeman, D., Jain, S., Duermuth, M., Biggio, B., Giacinto, G.: Who Are You? A
Statistical Approach to Measuring User Authenticity. In: NDSS ’16. San Diego,
CA, USA (Feb 2016)
19. Golla, M., D¨urmuth, M.: On the Accuracy of Password Strength Meters. In: CCS
’18. pp. 1567–1582. ACM, Toronto, Canada (Oct 2018)
20. Google: reCAPTCHA v3 (Jul 2019), https://developers.google.com/
recaptcha/docs/v3
21. Google Chrome: Puppeteer - Headless Chrome node API (Jul 2019), https://
github.com/googlechrome/puppeteer
22. Grassi, P.A., Fenton, J.L., Newton, E.M., Perlner, R.A., Regenscheid, A.R., Burr,
W.E., Richer, J.P., Lefkovitz, N.B., Danker, J.M., Choong, Y.Y., Greene, K.K.,
Theofanos, M.F.: Digital identity guidelines: authentication and lifecycle manage-
ment. Tech. Rep. NIST SP 800-63b, National Institute of Standards and Technol-
ogy, Gaithersburg, MD (Jun 2017)
23. Iaroshevych, O.: Improving Second Factor Authentication Challenges to Help Pro-
tect Facebook account owners. In: SOUPS ’17. USENIX Association, Santa Clara,
CA, USA (Jul 2017)
24. Judd, T., Kennedy, G.: A five-year study of on-campus Internet use by undergrad-
uate biomedical students. Computers & Education 55(4), 1564–1571 (Dec 2010)
25. Komandur, S., Johnson, P.W., Storch, R.: Relation between mouse button click
duration and muscle contraction time. In: EMBC ’08. IEEE (Aug 2008)
26. Li, T.C., Hang, H., Faloutsos, M., Efstathopoulos, P.: TrackAdvisor: Taking Back
Browsing Privacy from Third-Party Trackers. In: Passive and Active Measurement,
vol. 8995, pp. 277–289. Springer International Publishing, Cham (2015)
27. Mark, G., Wang, Y., Niiya, M.: Stress and multitasking in everyday college life: an
empirical study of online activity. In: CHI ’14. ACM, Toronto, Canada (2014)