Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem
Third-party services form an integral part of the mobile ecosystem: they ease application
development and enable features such as analytics, social network integration, and app …
development and enable features such as analytics, social network integration, and app …
A long way to the top: Significance, structure, and stability of internet top lists
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …
security rely on lists of target domains to be analysed; researchers make use of target lists …
Watching you watch: The tracking ecosystem of over-the-top tv streaming devices
The number of Internet-connected TV devices has grown significantly in recent years,
especially Over-the-Top (" OTT") streaming devices, such as Roku TV and Amazon Fire TV …
especially Over-the-Top (" OTT") streaming devices, such as Roku TV and Amazon Fire TV …
Measuring the impact of the GDPR on data sharing in ad networks
The European General Data Protection Regulation (GDPR), which went into effect in May
2018, brought new rules for the processing of personal data that affect many business …
2018, brought new rules for the processing of personal data that affect many business …
Mystique: Uncovering information leakage from browser extensions
Browser extensions are small JavaScript, CSS and HTML programs that run inside the
browser with special privileges. These programs, often written by third parties, operate on …
browser with special privileges. These programs, often written by third parties, operate on …
Doublex: Statically detecting vulnerable data flows in browser extensions at scale
Browser extensions are popular to enhance users' browsing experience. By design, they
have access to security-and privacy-critical APIs to perform tasks that web applications …
have access to security-and privacy-critical APIs to perform tasks that web applications …
I never signed up for this! Privacy implications of email tracking
We show that the simple act of viewing emails contains privacy pitfalls for the unwary. We
assembled a corpus of commercial mailing-list emails, and find a network of hundreds of …
assembled a corpus of commercial mailing-list emails, and find a network of hundreds of …
Fingerprinting in style: Detecting browser extensions via injected style sheets
Browser extensions enhance the web experience and have seen great adoption from users
in the past decade. At the same time, past research has shown that online trackers can use …
in the past decade. At the same time, past research has shown that online trackers can use …
[PDF][PDF] Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting.
With users becoming increasingly privacy-aware and browser vendors incorporating anti-
tracking mechanisms, browser fingerprinting has garnered significant attention. Accordingly …
tracking mechanisms, browser fingerprinting has garnered significant attention. Accordingly …
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation
Extensions complement web browsers with additional functionalities and also bring new
vulnerability venues, allowing privilege escalations from adversarial web pages to use …
vulnerability venues, allowing privilege escalations from adversarial web pages to use …