
PUT(0,-845.90042)
226 BIBLIOGRAPHY
[255] Dolière Francis Somé, Nataliia Bielova, and Tamara Rezk. On the content security
policy violations due to the same-origin policy. In Barrett et al. [171], pages 877–886.
[256] Dolière Francis Somé and Tamara Rezk. DF-CSP: Dependency-Free Content Security
Policy. Submitted for review.
[257] Dolière Francis Somé and Tamara Rezk. Extending Content Security Policy: Black-
listing, URL arguments filtering and Monitoring. Submitted for review.
[258] Sid Stamm, Brandon Sterne, and Gervase Markham. Reining in the web with con-
tent security policy. In Michael Rappa, Paul Jones, Juliana Freire, and Soumen
Chakrabarti, editors, Proceedings of the 19th International Conference on World
Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pages
921–930. ACM, 2010.
[259] Oleksii Starov and Nick Nikiforakis. Extended tracking powers: Measuring the pri-
vacy diffusion enabled by browser extensions. In Barrett et al. [171], pages 1481–1490.
[260] Oleksii Starov and Nick Nikiforakis. XHOUND: quantifying the fingerprintability of
browser extensions. In 2017 IEEE Symposium on Security and Privacy, SP 2017,
San Jose, CA, USA, May 22-26, 2017, pages 941–956. IEEE Computer Society, 2017.
[261] Brandon Sterne and Adam Barth. Content Security Policy 1.0. W3C Candidate
Recommendation, 2012. http://www.w3.org/TR/2012/CR-CSP-20121115/.
[262] Nikhil Swamy, Cédric Fournet, Aseem Rastogi, Karthikeyan Bhargavan, Juan Chen,
Pierre-Yves Strub, and Gavin M. Bierman. Gradual typing embedded securely in
JavaScript. In Suresh Jagannathan and Peter Sewell, editors, The 41st Annual ACM
SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL
’14, San Diego, CA, USA, January 20-21, 2014, pages 425–438. ACM, 2014.
[263] Naoki Takei, Takamichi Saito, Ko Takasu, and Tomotaka Yamada. Web browser
fingerprinting using only cascading style sheets. In Proc. of the 10th BWCCA, pages
57–63, 2015.
[264] Randika Upathilake, Yingkun Li, and Ashraf Matrawy. A classification of web
browser fingerprinting techniques. In Proc. of the 7th NTMS, pages 1–5, 2015.
[265] Anne van Kesteren. Cross Origin Resource Sharing. W3C Recommendation, 2014.
https://www.w3.org/TR/cors/.
[266] Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. FP-
STALKER: tracking browser fingerprint evolutions. In 2018 IEEE Symposium on
Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, Cali-
fornia, USA, pages 728–741. IEEE, 2018.
[267] Lukas Weichselbaum, Michele Spagnuolo, Sebastian Lekies, and Artur Janc. CSP Is
Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content
Security Policy. In Weippl et al. [268], pages 1376–1387.
[268] Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, and
Shai Halevi, editors. Proceedings of the 2016 ACM SIGSAC Conference on Computer
and Communications Security, Vienna, Austria, October 24-28, 2016. ACM, 2016.
[269] Michael Weissbacher, Tobias Lauinger, and William K. Robertson. Why Is CSP
Failing? Trends and Challenges in CSP Adoption. In Research in Attacks, Intrusions
and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden,
September 17-19, 2014. Proceedings, pages 212–233, 2014.
[270] Michael Weissbacher, Enrico Mariconti, Guillermo Suarez-Tangil, Gianluca Stringh-
ini, William K. Robertson, and Engin Kirda. Ex-ray: Detection of history-leaking
PUT(0,-845.90042)