literature:bibliography
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
literature:bibliography [2025/01/07 17:33] – Added citations for cookie classification karelkubicek | literature:bibliography [2025/03/19 08:55] (current) – identifier renaming karelkubicek | ||
---|---|---|---|
Line 283: | Line 283: | ||
year={2024}, | year={2024}, | ||
doi={10.56553/ | doi={10.56553/ | ||
+ | } | ||
+ | |||
+ | @inproceedings{shaoor2024purl, | ||
+ | author = {Shaoor Munir and Patrick Lee and Umar Iqbal and Zubair Shafiq and Sandra Siby}, | ||
+ | title = {{PURL}: Safe and Effective Sanitization of Link Decoration}, | ||
+ | booktitle = {33rd USENIX Security Symposium (USENIX Security 24)}, | ||
+ | year = {2024}, | ||
+ | isbn = {978-1-939133-44-1}, | ||
+ | address = {Philadelphia, | ||
+ | pages = {4103--4120}, | ||
+ | url = {https:// | ||
+ | publisher = {USENIX Association}, | ||
+ | month = aug | ||
+ | } | ||
+ | |||
+ | @inproceedings{hantke2023you, | ||
+ | | ||
+ | title = {You Call This Archaeology? | ||
+ | year = {2023}, | ||
+ | isbn = {9798400700507}, | ||
+ | | ||
+ | | ||
+ | url = {https:// | ||
+ | doi = {10.1145/ | ||
+ | | ||
+ | pages = {3168–3182}, | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | } | ||
+ | |||
+ | @article{hantke2025web, | ||
+ | title={Web Execution Bundles: Reproducible, | ||
+ | author={Hantke, | ||
+ | journal={arXiv preprint arXiv: | ||
+ | year={2025} | ||
+ | } | ||
+ | |||
+ | @inproceedings{lerner2016internet, | ||
+ | title={Internet Jones and the Raiders of the lost trackers: An archaeological study of web tracking from 1996 to 2016}, | ||
+ | author={Lerner, | ||
+ | booktitle={25th USENIX Security Symposium (USENIX Security 16)}, | ||
+ | year={2016}, | ||
+ | url={https:// | ||
+ | } | ||
+ | |||
+ | @article{jha2024privacy, | ||
+ | title={Privacy Policies and Consent Management Platforms: Growth and Users' Interactions over Time}, | ||
+ | author={Jha, | ||
+ | journal={arXiv preprint arXiv: | ||
+ | year={2024} | ||
+ | } | ||
+ | |||
+ | @inproceedings{amos2021privacy, | ||
+ | | ||
+ | title = {Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset}, | ||
+ | year = {2021}, | ||
+ | isbn = {9781450383127}, | ||
+ | | ||
+ | | ||
+ | url = {https:// | ||
+ | doi = {10.1145/ | ||
+ | | ||
+ | pages = {2165–2176}, | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | } | ||
+ | |||
+ | @article{dimova2021cname, | ||
+ | title={The CNAME of the game: Large-scale analysis of DNS-based tracking evasion}, | ||
+ | author={Dimova, | ||
+ | journal={Proceedings on Privacy Enhancing Technologies}, | ||
+ | doi={10.2478/ | ||
+ | url={https:// | ||
+ | volume={2021}, | ||
+ | issue={3}, | ||
+ | pages={394–412}, | ||
+ | year={2021} | ||
+ | } | ||
+ | |||
+ | @inproceedings{pletinckx2021out, | ||
+ | title={Out of sight, out of mind: Detecting orphaned web pages at internet-scale}, | ||
+ | author={Pletinckx, | ||
+ | year = {2021}, | ||
+ | isbn = {9781450384544}, | ||
+ | publisher = {Association for Computing Machinery}, | ||
+ | address = {New York, NY, USA}, | ||
+ | url = {https:// | ||
+ | doi = {10.1145/ | ||
+ | booktitle = {Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security}, | ||
+ | pages = {21–35}, | ||
+ | numpages = {15}, | ||
+ | keywords = {measurement, | ||
+ | location = {Virtual Event, Republic of Korea}, | ||
+ | series = {CCS '21} | ||
+ | } | ||
+ | |||
+ | @inproceedings{roth2020complex, | ||
+ | title={Complex security policy? A longitudinal analysis of deployed content security policies}, | ||
+ | author={Roth, | ||
+ | booktitle={Proceedings of the 27th Network and Distributed System Security Symposium (NDSS)}, | ||
+ | year={2020} | ||
+ | } | ||
+ | |||
+ | @inproceedings{stock2017web, | ||
+ | title={How the Web Tangled Itself: Uncovering the History of Client-Side Web (In) Security}, | ||
+ | author={Stock, | ||
+ | booktitle = {26th USENIX Security Symposium (USENIX Security 17)}, | ||
+ | year = {2017}, | ||
+ | isbn = {978-1-931971-40-9}, | ||
+ | address = {Vancouver, BC}, | ||
+ | pages = {971--987}, | ||
+ | url = {https:// | ||
+ | publisher = {USENIX Association}, | ||
+ | month = aug | ||
+ | } | ||
+ | } | ||
+ | |||
+ | @inproceedings{bouhoula2024automated, | ||
+ | author = {Ahmed Bouhoula and Karel Kubicek and Amit Zac and Carlos Cotrini and David Basin}, | ||
+ | title = {Automated Large-Scale Analysis of Cookie Notice Compliance}, | ||
+ | booktitle = {33rd USENIX Security Symposium (USENIX Security 24)}, | ||
+ | year = {2024}, | ||
+ | isbn = {978-1-939133-44-1}, | ||
+ | address = {Philadelphia, | ||
+ | pages = {1723--1739}, | ||
+ | url = {https:// | ||
+ | publisher = {USENIX Association}, | ||
+ | month = aug | ||
+ | } | ||
+ | |||
+ | @inproceedings{khandelwal2023automated, | ||
+ | | ||
+ | title = {Automated Cookie Notice Analysis and Enforcement}, | ||
+ | | ||
+ | year = {2023}, | ||
+ | isbn = {978-1-939133-37-3}, | ||
+ | | ||
+ | pages = {1109--1126}, | ||
+ | url = {https:// | ||
+ | | ||
+ | month = aug | ||
+ | } | ||
+ | |||
+ | @inproceedings{urban2020beyond, | ||
+ | | ||
+ | title = {Beyond the Front Page: | ||
+ | year = {2020}, | ||
+ | isbn = {9781450370233}, | ||
+ | | ||
+ | | ||
+ | url = {https:// | ||
+ | doi = {10.1145/ | ||
+ | | ||
+ | pages = {1275–1286}, | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | } | ||
+ | |||
+ | @inproceedings{zeber2020representativeness, | ||
+ | | ||
+ | title = {The Representativeness of Automated Web Crawls as a Surrogate for Human Browsing}, | ||
+ | year = {2020}, | ||
+ | isbn = {9781450370233}, | ||
+ | | ||
+ | | ||
+ | url = {https:// | ||
+ | doi = {10.1145/ | ||
+ | | ||
+ | pages = {167–178}, | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | } | ||
+ | |||
+ | @inproceedings{englehardt2016online, | ||
+ | | ||
+ | title = {Online Tracking: A 1-million-site Measurement and Analysis}, | ||
+ | year = {2016}, | ||
+ | isbn = {9781450341394}, | ||
+ | | ||
+ | | ||
+ | url = {https:// | ||
+ | doi = {10.1145/ | ||
+ | | ||
+ | pages = {1388–1401}, | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | } | ||
+ | |||
+ | @inproceedings{bashir2016tracing, | ||
+ | title={Tracing information flows between ad exchanges using retargeted ads}, | ||
+ | author={Bashir, | ||
+ | booktitle={25th USENIX Security Symposium (USENIX Security 16)}, | ||
+ | pages={481--496}, | ||
+ | year={2016}, | ||
+ | url={https:// | ||
+ | } | ||
+ | |||
+ | @inproceedings{fouad2022my, | ||
+ | title={My Cookie is a phoenix: Detection, measurement, | ||
+ | author={Fouad, | ||
+ | booktitle={PETS 2022-22nd Privacy Enhancing Technologies Symposium}, | ||
+ | year={2022}, | ||
+ | doi={10.56553/ | ||
+ | url={https:// | ||
} | } | ||
</ | </ |
literature/bibliography.1736271213.txt.gz · Last modified: 2025/01/07 17:33 by karelkubicek