
[17] M. A. Bashir, U. Farooq, M. Shahid, M. F. Zaffar, and C. Wilson,
“Quantity vs. quality: Evaluating user interest profiles using ad pref-
erence managers.” in 26th Annual Network and Distributed System
Security Symposium, NDSS 2019, San Diego, California, USA, February
24-27, 2019.
[18] A. Bortz and D. Boneh, “Exposing private information by timing web
applications,” in Proceedings of the 16th international conference on
World Wide Web, 2007, pp. 621–628.
[19] A. Clover, “Css visited pages disclosure,” 2002, https://lists.w3.org/
Archives/327Public/www-style/2002Feb/0039.html.
[20] A. Dabrowski, G. Merzdovnik, N. Kommenda, and E. Weippl, “Browser
history stealing with captive wi-fi portals,” in 2016 IEEE Security and
Privacy Workshops (SPW). IEEE, 2016, pp. 234–240.
[21] A. Das, G. Acar, N. Borisov, and A. Pradeep, “The Web’s
sixth sense: A study of scripts accessing smartphone sensors,”
in Proceedings of the 25th ACM Conference on Computer and
Communication Security (CCS). ACM, 2018. [Online]. Available:
https://doi.org/0.1145/3243734.3243860
[22] E. W. Felten and M. A. Schneider, “Timing attacks on web privacy,”
in Proceedings of the 7th ACM conference on Computer and commu-
nications security, 2000, pp. 25–32.
[23] G. Franken, T. Van Goethem, and W. Joosen, “Who left open the cookie
jar? a comprehensive evaluation of third-party cookie policies,” in 27th
USENIX Security Symposium (USENIX Security 18), 2018, pp. 151–
168.
[24] A. Janc and L. Olejnik, “Web browser history detection as a real-
world privacy threat,” in European Symposium on Research in Computer
Security. Springer, 2010, pp. 215–231.
[25] S. Karami, P. Ilia, K. Solomos, and J. Polakis, “Carnus: Exploring the
privacy threats of browser extension fingerprinting,” in 27th Annual
Network and Distributed System Security Symposium, NDSS 2020, San
Diego, California, USA, February 23-26, 2020. The Internet Society,
2020.
[26] H. Kim, S. Lee, and J. Kim, “Inferring browser activity and status
through remote monitoring of storage usage,” in Proceedings of the
32nd Annual Conference on Computer Security Applications, 2016, pp.
410–421.
[27] B. Kondracki, A. Aliyeva, M. Egele, J. Polakis, and N. Nikiforakis,
“Meddling middlemen: Empirical analysis of the risks of data-saving
mobile browsers,” in 2020 IEEE Symposium on Security and Privacy
(SP). IEEE, 2020, pp. 810–824.
[28] M. Kosinski, D. Stillwell, and T. Graepel, “Private traits and attributes
are predictable from digital records of human behavior,” Proceedings
of the national academy of sciences, vol. 110, no. 15, pp. 5802–5805,
2013.
[29] R. Kotcher, Y. Pei, P. Jumde, and C. Jackson, “Cross-origin pixel
stealing: timing attacks using css filters,” in Proceedings of the 2013
ACM SIGSAC conference on Computer & communications security,
ser. CCS ’13. New York, NY, USA: ACM, 2013, pp. 1055–1062.
[Online]. Available: http://doi.acm.org/10.1145/2508859.2516712
[30] M. Lecuyer, R. Spahn, Y. Spiliopoulos, A. Chaintreau, R. Geambasu,
and D. Hsu, “Sunlight: Fine-grained targeting detection at scale with
statistical confidence,” in Proceedings of the 22nd ACM SIGSAC
Conference on Computer and Communications Security, 2015, pp. 554–
566.
[31] J. Lee, H. Kim, J. Park, I. Shin, and S. Son, “Pride and prejudice
in progressive web apps: Abusing native app-like features in web
applications,” in Proceedings of the 2018 ACM SIGSAC Conference on
Computer and Communications Security. ACM, 2018, pp. 1731–1746.
[32] S. Lee, H. Kim, and J. Kim, “Identifying cross-origin resource status
using application cache.” in Network and Distributed System Security
Symposium, NDSS, 2015.
[33] S. Lee, Y. Kim, J. Kim, and J. Kim, “Stealing webpages rendered
on your browser by exploiting gpu vulnerabilities,” in 2014 IEEE
Symposium on Security and Privacy. IEEE, 2014, pp. 19–33.
[34] A. Lerner, A. K. Simpson, T. Kohno, and F. Roesner, “Internet jones and
the raiders of the lost trackers: An archaeological study of web tracking
from 1996 to 2016,” in 25th USENIX Security Symposium (USENIX
Security 16), 2016.
[35] X. Lin, P. Ilia, and J. Polakis, “Fill in the blanks: Empirical analysis of
the privacy threats of browser form autofill,” in Proceedings of the 2020
ACM SIGSAC Conference on Computer and Communications Security,
2020, pp. 507–519.
[36] F. Marcantoni, M. Diamantaris, S. Ioannidis, and J. Polakis, “A large-
scale study on the risks of the html5 webapi for mobile sensor-based
attacks,” in The World Wide Web Conference, 2019, pp. 3063–3071.
[37] ——, “A large-scale study on the risks of the html5 webapi for
mobile sensor-based attacks,” in 30th International World Wide Web
Conference, WWW ’19. ACM, 2019.
[38] L. Olejnik, S. Englehardt, and A. Narayanan, “Battery status not
included: Assessing privacy in web standards.” in IWPE@ SP, 2017,
pp. 17–24.
[39] P. Papadopoulos, P. Ilia, M. Polychronakis, E. P. Markatos, S. Ioannidis,
and G. Vasiliadis, “Master of web puppets: Abusing web browsers
for persistent and stealthy computation,” in 26th Annual Network
and Distributed System Security Symposium, NDSS 2019, San Diego,
California, USA, February 24-27, 2019, 2019.
[40] J. R. R. Fielding, M. Nottingham, “Hypertext transfer protocol
(http/1.1): Caching,” https://httpwg.org/specs/rfc7234.html#heuristic.
freshness, June 2014, accessed on 2020-01-05.
[41] S. Roth, T. Barron, S. Calzavara, N. Nikiforakis, and B. Stock,
“Complex security policy? a longitudinal analysis of deployed content
security policies.” in 27th Annual Network and Distributed System
Security Symposium, NDSS, 2020.
[42] G. Rydstedt, E. Bursztein, D. Boneh, and C. Jackson, “Busting frame
busting a study of clickjacking vulnerabilities on popular sites,” in Web
2.0 Security and Privacy. IEEE, 2010.
[43] I. Sanchez-Rola, D. Balzarotti, and I. Santos, “Bakingtimer: privacy
analysis of server-side request processing time,” in Proceedings of the
35th Annual Computer Security Applications Conference. ACM, 2019,
pp. 478–488.
[44] P. Skolka, C.-A. Staicu, and M. Pradel, “Anything to hide? studying
minified and obfuscated code in the web,” in The World Wide Web
Conference, 2019, pp. 1735–1746.
[45] M. Smith, C. Disselkoen, S. Narayan, F. Brown, and D. Stefan,
“Browser history re:visited,” in 12th USENIX Workshop on Offensive
Technologies (WOOT 18). Baltimore, MD: USENIX Association,
Aug. 2018. [Online]. Available: https://www.usenix.org/conference/
woot18/presentation/smith
[46] P. Snyder, L. Ansari, C. Taylor, and C. Kanich, “Browser feature usage
on the modern web,” in Proceedings of the 2016 Internet Measurement
Conference. ACM, 2016, pp. 97–110.
[47] P. Snyder, C. Taylor, and C. Kanich, “Most websites don’t need to
vibrate: A cost-benefit approach to improving browser security,” in
Proceedings of the 2017 ACM SIGSAC Conference on Computer and
Communications Security. ACM, 2017, pp. 179–194.
[48] T. Steiner, “What is in a web view: An analysis of progressive web
app features when the means of web access is not a web browser,” in
Companion Proceedings of the The Web Conference 2018, 2018, pp.
789–796.
[49] B. Stock, M. Johns, M. Steffens, and M. Backes, “How the web tangled
itself: Uncovering the history of client-side web (in) security,” in 26th
USENIX Security Symposium (USENIX Security 17), 2017, pp. 971–
987.
[50] J. Su, A. Shukla, S. Goel, and A. Narayanan, “De-anonymizing web
browsing data with social networks,” in Proceedings of the 26th
International Conference on World Wide Web, 2017, pp. 1261–1269.
[51] Y. Tian, Y. C. Liu, A. Bhosale, L. S. Huang, P. Tague, and C. Jackson,
“All your screens are belong to us: attacks exploiting the html5 screen
sharing api,” in 2014 IEEE Symposium on Security and Privacy. IEEE,
2014, pp. 34–48.
[52] T. Van Goethem, W. Joosen, and N. Nikiforakis, “The clock is still
ticking: Timing attacks in the modern web,” in Proceedings of the 22nd
ACM SIGSAC Conference on Computer and Communications Security,
2015, pp. 1382–1393.
[53] G. Venkatadri, A. Andreou, Y. Liu, A. Mislove, K. P. Gummadi,
P. Loiseau, and O. Goga, “Privacy risks with facebook’s pii-based
targeting: Auditing a data broker’s advertising interface,” in 2018 IEEE
Symposium on Security and Privacy (SP). IEEE, 2018, pp. 89–107.
15