Survey and taxonomy of adversarial reconnaissance techniques

S Roy, N Sharmin, JC Acosta, C Kiekintveld… - ACM Computing …, 2022 - dl.acm.org
Adversaries are often able to penetrate networks and compromise systems by exploiting
vulnerabilities in people and systems. The key to the success of these attacks is information …

[КНИГА][B] Privacy is power

C Véliz - 2021 - igi-global.com
Privacy is Power Page 1 International Journal of Technoethics Volume 12 • Issue 2 • July-December
2021  Copyright©2021,IGIGlobal.CopyingordistributinginprintorelectronicformswithoutwrittenpermissionofIGIGlobalisprohibited …

Leaky forms: A study of email and password exfiltration before form submission

A Senol, G Acar, M Humbert, FZ Borgesius - 31st USENIX Security …, 2022 - usenix.org
Web users enter their email addresses into online forms for a variety of reasons, including
signing in or signing up for a service or subscribing to a newsletter. While enabling such …

Watching you watch: The tracking ecosystem of over-the-top tv streaming devices

H Mohajeri Moghaddam, G Acar, B Burgess… - Proceedings of the …, 2019 - dl.acm.org
The number of Internet-connected TV devices has grown significantly in recent years,
especially Over-the-Top (" OTT") streaming devices, such as Roku TV and Amazon Fire TV …

Manipulative tactics are the norm in political emails: Evidence from 300K emails from the 2020 US election cycle

A Mathur, A Wang, C Schwemmer… - Big Data & …, 2023 - journals.sagepub.com
We collect and analyze a corpus of more than 300,000 political emails sent during the 2020
US election cycle. These emails were sent by over 3000 political campaigns and …

4 years of EU cookie law: Results and lessons learned

M Trevisan, S Traverso, E Bassi, M Mellia - Proceedings on Privacy …, 2019 - arts.units.it
Personalized advertisement has changed the web. It lets websites monetize the content they
offer. The downside is the continuous collection of personal information with significant …

Protocols for checking compromised credentials

L Li, B Pal, J Ali, N Sullivan, R Chatterjee… - Proceedings of the …, 2019 - dl.acm.org
To prevent credential stuffing attacks, industry best practice now proactively checks if user
credentials are present in known data breaches. Recently, some web services, such as …

An automated approach to auditing disclosure of third-party data collection in website privacy policies

T Libert - Proceedings of the 2018 World Wide Web Conference, 2018 - dl.acm.org
A dominant regulatory model for web privacy is" notice and choice". In this model, users are
notified of data collection and provided with options to control it. To examine the efficacy of …

[КНИГА][B] Privacidad es poder: Datos, vigilancia y libertad en la era digital

C Véliz - 2021 - books.google.com
Seleccionado por The Economist como uno de los libros del año. La guía definitiva para
afrontar uno de los problemas más acuciantes de nuestro tiempo: la pérdida de la …

Squadbox: A tool to combat email harassment using friendsourced moderation

K Mahar, AX Zhang, D Karger - Proceedings of the 2018 CHI Conference …, 2018 - dl.acm.org
Communication platforms have struggled to provide effective tools for people facing
harassment online. We conducted interviews with 18 recipients of online harassment to …