{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T16:22:32Z","timestamp":1747153352448,"version":"3.40.5"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031491863"},{"type":"electronic","value":"9783031491870"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-49187-0_10","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T12:02:36Z","timestamp":1701345756000},"page":"183-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5692-3952","authenticated-orcid":false,"given":"Valerio","family":"Bucci","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6396-9578","authenticated-orcid":false,"given":"Wanpeng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","unstructured":"Andriamilanto, N., Allard, T., Le Guelvouit, G., Garel, A.: A large-scale empirical analysis of browser fingerprints properties for web authentication. ACM Trans. Web 16(1), 4:1\u20134:62 (2021). https:\/\/doi.org\/10.1145\/3478026","DOI":"10.1145\/3478026"},{"issue":"9","key":"10_CR2","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1995376.1995398","volume":"54","author":"S Bandhakavi","year":"2011","unstructured":"Bandhakavi, S., Tiku, N., Pittman, W., King, S.T., Madhusudan, P., Winslett, M.: Vetting browser extensions for security vulnerabilities with Vex. Commun. ACM 54(9), 91\u201399 (2011). https:\/\/doi.org\/10.1145\/1995376.1995398","journal-title":"Commun. ACM"},{"key":"10_CR3","unstructured":"Barth, A., Felt, A.P., Saxena, P., Boodman, A.: Protecting browsers from extension vulnerabilities. In: Network and Distributed System Security Symposium (2010)"},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"Borgolte, K., Feamster, N.: Understanding the performance costs and benefits of privacy-focused browser extensions. In: Proceedings of The Web Conference 2020, pp. 2275\u20132286. ACM, Taipei Taiwan (2020). https:\/\/doi.org\/10.1145\/3366423.3380292","DOI":"10.1145\/3366423.3380292"},{"key":"10_CR5","doi-asserted-by":"publisher","unstructured":"Bui, D., Tang, B., Shin, K.G.: Detection of inconsistencies in privacy practices of browser extensions. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 2780\u20132798 (2023). https:\/\/doi.org\/10.1109\/SP46215.2023.10179338","DOI":"10.1109\/SP46215.2023.10179338"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-662-46669-8_21","volume-title":"Programming Languages and Systems","author":"S Calzavara","year":"2015","unstructured":"Calzavara, S., Bugliesi, M., Crafa, S., Steffinlongo, E.: Fine-grained detection of privilege escalation attacks on browser extensions. In: Vitek, J. (ed.) ESOP 2015. LNCS, vol. 9032, pp. 510\u2013534. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46669-8_21"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Datta, A., Lu, J., Tschantz, M.C.: Evaluating anti-fingerprinting privacy enhancing technologies. In: The World Wide Web Conference, pp. 351\u2013362. WWW 2019, Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3308558.3313703","DOI":"10.1145\/3308558.3313703"},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Eriksson, B., Picazo-Sanchez, P., Sabelfeld, A.: Hardening the security analysis of browser extensions. In: Proceedings of the 37th ACM\/SIGAPP Symposium on Applied Computing, pp. 1694\u20131703. SAC 2022, Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3477314.3507098","DOI":"10.1145\/3477314.3507098"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-319-20810-7_21","volume-title":"Data and Applications Security and Privacy XXIX","author":"A FaizKhademi","year":"2015","unstructured":"FaizKhademi, A., Zulkernine, M., Weldemariam, K.: FPGuard: detection and prevention of browser fingerprinting. In: Samarati, P. (ed.) DBSec 2015. LNCS, vol. 9149, pp. 293\u2013308. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20810-7_21"},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Fass, A., Som\u00e9, D.F., Backes, M., Stock, B.: DoubleX: statically detecting vulnerable data flows in browser extensions at scale. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 1789\u20131804. CCS 2021, Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3460120.3484745","DOI":"10.1145\/3460120.3484745"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Frisbie, M.: Understanding the implications of manifest V3. In: Frisbie, M. (ed.) Building Browser Extensions: Create Modern Extensions for Chrome, Safari, Firefox, and Edge, pp. 167\u2013185. Apress, Berkeley, CA (2023). https:\/\/doi.org\/10.1007\/978-1-4842-8725-5_6","DOI":"10.1007\/978-1-4842-8725-5_6"},{"key":"10_CR12","doi-asserted-by":"publisher","unstructured":"Gulyas, G.G., Some, D.F., Bielova, N., Castelluccia, C.: To extend or not to extend: on the uniqueness of browser extensions and web logins. In: Proceedings of the 2018 Workshop on Privacy in the Electronic Society, pp. 14\u201327. WPES 2018, Association for Computing Machinery, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3267323.3268959","DOI":"10.1145\/3267323.3268959"},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Gunnarsson, P., Jakobsson, A., Carlsson, N.: On the impact of internal webpage selection when evaluating ad blocker performance. In: 2022 30th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), pp. 41\u201348 (2022). https:\/\/doi.org\/10.1109\/MASCOTS56607.2022.00014","DOI":"10.1109\/MASCOTS56607.2022.00014"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-030-35653-8_33","volume-title":"Future Data and Security Engineering","author":"PN Hiremath","year":"2019","unstructured":"Hiremath, P.N., Armentrout, J., Vu, S., Nguyen, T.N., Minh, Q.T., Phung, P.H.: MyWebGuard: toward a user-oriented tool for security and privacy protection on the web. In: Dang, T.K., K\u00fcng, J., Takizawa, M., Bui, S.H. (eds.) FDSE 2019. LNCS, vol. 11814, pp. 506\u2013525. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-35653-8_33"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Iqbal, U., Englehardt, S., Shafiq, Z.: Fingerprinting the fingerprinters: learning to detect browser fingerprinting behaviors. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1143\u20131161. IEEE Computer Society (2021). https:\/\/doi.org\/10.1109\/SP40001.2021.00017","DOI":"10.1109\/SP40001.2021.00017"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Karami, S., Ilia, P., Solomos, K., Polakis, J.: Carnus: exploring the privacy threats of browser extension fingerprinting. In: Proceedings 2020 Network and Distributed System Security Symposium. Internet Society, San Diego, CA (2020). https:\/\/doi.org\/10.14722\/ndss.2020.24383","DOI":"10.14722\/ndss.2020.24383"},{"key":"10_CR17","unstructured":"Karami, S., et al.: Unleash the simulacrum: shifting browser realities for robust $$\\{$$Extension-Fingerprinting$$\\}$$ prevention. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 735\u2013752 (2022)"},{"key":"10_CR18","unstructured":"Kariryaa, A., Savino, G.L., Stellmacher, C., Sch\u00f6ning, J.: Understanding users\u2019 knowledge about the privacy and security of browser extensions. in: seventeenth symposium on usable privacy and security (SOUPS 2021), pp. 99\u2013118 (2021)"},{"key":"10_CR19","unstructured":"Kettle, J.: Skeleton Scribe: Sparse Bruteforce Addon Detection. https:\/\/www.skeletonscribe.net\/2011\/07\/sparse-bruteforce-addon-scanner.html"},{"key":"10_CR20","unstructured":"Krzysztof Kotowicz: Intro to Chrome addons hacking: Fingerprinting. http:\/\/blog.kotowicz.net\/2012\/02\/intro-to-chrome-addons-hacking.html"},{"key":"10_CR21","doi-asserted-by":"publisher","unstructured":"Laperdrix, P., Bielova, N., Baudry, B., Avoine, G.: Browser fingerprinting: a survey. ACM Trans. Web 14(2), 8:1\u20138:33 (2020). https:\/\/doi.org\/10.1145\/3386040","DOI":"10.1145\/3386040"},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Laperdrix, P., Rudametkin, W., Baudry, B.: Mitigating browser fingerprint tracking: multi-level reconfiguration and diversification. In: 2015 IEEE\/ACM 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, pp. 98\u2013108 (2015). https:\/\/doi.org\/10.1109\/SEAMS.2015.18","DOI":"10.1109\/SEAMS.2015.18"},{"key":"10_CR23","doi-asserted-by":"publisher","unstructured":"Laperdrix, P., Rudametkin, W., Baudry, B.: Beauty and the beast: diverting modern web browsers to build unique browser fingerprints. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 878\u2013894 (2016). https:\/\/doi.org\/10.1109\/SP.2016.57","DOI":"10.1109\/SP.2016.57"},{"key":"10_CR24","unstructured":"Laperdrix, P., Starov, O., Chen, Q., Kapravelos, A., Nikiforakis, N.: Fingerprinting in style: detecting browser extensions via injected style sheets. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 2507\u20132524 (2021)"},{"key":"10_CR25","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-981-16-9229-1_4","volume-title":"Cyber Security","author":"T Li","year":"2022","unstructured":"Li, T., Zheng, X., Shen, K., Han, X.: FPFlow: detect and\u00a0prevent browser fingerprinting with dynamic taint analysis. In: Lu, W., Zhang, Y., Wen, W., Yan, H., Li, C. (eds.) CNCERT 2021. CCIS, vol. 1506, pp. 51\u201367. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-9229-1_4"},{"key":"10_CR26","unstructured":"Lin, X., Ilia, P., Solanki, S., Polakis, J.: Phish in sheep\u2019s clothing: exploring the authentication pitfalls of browser fingerprinting. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 1651\u20131668 (2022)"},{"key":"10_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-031-09234-3_8","volume-title":"Applied Cryptography and Network Security","author":"Z Liu","year":"2022","unstructured":"Liu, Z., Shrestha, P., Saxena, N.: Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques. In: Ateniese, G., Venturi, D. (eds.) Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 13269, pp. 147\u2013169. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-09234-3_8"},{"key":"10_CR28","unstructured":"Liverani, R.S., Freeman, N.: Abusing Firefox extensions. Defcon17 (2009)"},{"key":"10_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-73614-1_1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M Ter Louw","year":"2007","unstructured":"Ter Louw, M., Lim, J.S., Venkatakrishnan, V.N.: Extensible web browser security. In: M. H\u00e4mmerli, B., Sommer, R. (eds.) DIMVA 2007. LNCS, vol. 4579, pp. 1\u201319. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73614-1_1"},{"key":"10_CR30","doi-asserted-by":"publisher","first-page":"e7896571","DOI":"10.1155\/2022\/7896571","volume":"2022","author":"T Lyu","year":"2022","unstructured":"Lyu, T., Liu, L., Zhu, F., Hu, S., Ye, R.: BEFP: an extension recognition system based on behavioral and environmental fingerprinting. Secur. Commun. Netw. 2022, e7896571 (2022). https:\/\/doi.org\/10.1155\/2022\/7896571","journal-title":"Secur. Commun. Netw."},{"key":"10_CR31","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-981-16-9576-6_17","volume-title":"Mobile Internet Security","author":"D Moad","year":"2022","unstructured":"Moad, D., Sihag, V., Choudhary, G., Duguma, D.G., You, I.: Fingerprint defender: defense against browser-based user tracking. In: You, I., Kim, H., Youn, T.-Y., Palmieri, F., Kotenko, I. (eds.) MobiSec 2021. CCIS, vol. 1544, pp. 236\u2013247. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-9576-6_17"},{"key":"10_CR32","doi-asserted-by":"publisher","unstructured":"Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: exploring the ecosystem of web-based device fingerprinting. In: 2013 IEEE Symposium on Security and Privacy, pp. 541\u2013555 (2013). https:\/\/doi.org\/10.1109\/SP.2013.43","DOI":"10.1109\/SP.2013.43"},{"key":"10_CR33","doi-asserted-by":"publisher","unstructured":"Pantelaios, N., Nikiforakis, N., Kapravelos, A.: You\u2019ve changed: detecting malicious browser extensions through their update deltas. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 477\u2013491. ACM, Virtual Event USA (2020). https:\/\/doi.org\/10.1145\/3372297.3423343","DOI":"10.1145\/3372297.3423343"},{"issue":"4","key":"10_CR34","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/msp.2018.3111249","volume":"16","author":"R Perrotta","year":"2018","unstructured":"Perrotta, R., Hao, F.: Botnet in the browser: understanding threats caused by malicious browser extensions. IEEE Secur. Priv. 16(4), 66\u201381 (2018). https:\/\/doi.org\/10.1109\/msp.2018.3111249","journal-title":"IEEE Secur. Priv."},{"key":"10_CR35","doi-asserted-by":"publisher","unstructured":"Picazo-Sanchez, P., Eriksson, B., Sabelfeld, A.: No signal left to chance: driving browser extension analysis by download patterns. In: Proceedings of the 38th Annual Computer Security Applications Conference, pp. 896\u2013910. ACSAC 2022, Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3564625.3567988","DOI":"10.1145\/3564625.3567988"},{"issue":"6","key":"10_CR36","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1007\/s10207-022-00610-w","volume":"21","author":"P Picazo-Sanchez","year":"2022","unstructured":"Picazo-Sanchez, P., Ortiz-Martin, L., Schneider, G., Sabelfeld, A.: Are chrome extensions compliant with the spirit of least privilege? Int. J. Inf. Secur. 21(6), 1283\u20131297 (2022). https:\/\/doi.org\/10.1007\/s10207-022-00610-w","journal-title":"Int. J. Inf. Secur."},{"key":"10_CR37","doi-asserted-by":"publisher","unstructured":"Preuveneers, D., Joosen, W.: SmartAuth: dynamic context fingerprinting for continuous user authentication. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing, pp. 2185\u20132191. SAC 2015, Association for Computing Machinery, New York, NY, USA (2015). https:\/\/doi.org\/10.1145\/2695664.2695908","DOI":"10.1145\/2695664.2695908"},{"key":"10_CR38","doi-asserted-by":"publisher","unstructured":"Rochet, F., Efthymiadis, K., Koeune, F., Pereira, O.: SWAT: seamless web authentication technology. In: The World Wide Web Conference, pp. 1579\u20131589. WWW 2019, Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3308558.3313637","DOI":"10.1145\/3308558.3313637"},{"key":"10_CR39","doi-asserted-by":"publisher","unstructured":"Sam, J., Ancy Jenifer., J.: Mitigating the security risks of browser extensions. In: 2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS), pp. 1460\u20131465 (2023). https:\/\/doi.org\/10.1109\/ICSCSS57650.2023.10169483","DOI":"10.1109\/ICSCSS57650.2023.10169483"},{"key":"10_CR40","unstructured":"Sanchez-Rola, I., Santos, I., Balzarotti, D.: Extension breakdown: security analysis of browsers extension resources control policies. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 679\u2013694 (2017)"},{"key":"10_CR41","doi-asserted-by":"publisher","unstructured":"Schaub, F., et al.: Watching them watching me: browser extensions impact on user privacy awareness and concern. In: Proceedings 2016 Workshop on Usable Security. Internet Society, San Diego, CA (2016). https:\/\/doi.org\/10.14722\/usec.2016.23017","DOI":"10.14722\/usec.2016.23017"},{"key":"10_CR42","doi-asserted-by":"publisher","unstructured":"Sj\u00f6sten, A., Acker, S.V., Sabelfeld, A.: Discovering browser extensions via web accessible resources. In: CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy, pp. 329\u2013336 (2017). https:\/\/doi.org\/10.1145\/3029806.3029820","DOI":"10.1145\/3029806.3029820"},{"key":"10_CR43","doi-asserted-by":"publisher","unstructured":"Sjosten, A., Van Acker, S., Picazo-Sanchez, P., Sabelfeld, A.: Latex gloves: protecting browser extensions from probing and revelation attacks. In: Proceedings 2019 Network and Distributed System Security Symposium. Internet Society, San Diego, CA (2019). https:\/\/doi.org\/10.14722\/ndss.2019.23309","DOI":"10.14722\/ndss.2019.23309"},{"key":"10_CR44","unstructured":"Solomos, K., Ilia, P., Karami, S., Nikiforakis, N., Polakis, J.: The dangers of human touch: fingerprinting browser extensions through user actions. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 717\u2013733 (2022)"},{"key":"10_CR45","doi-asserted-by":"publisher","unstructured":"Solomos, K., Ilia, P., Nikiforakis, N., Polakis, J.: Escaping the confines of time: continuous browser extension fingerprinting through ephemeral modifications. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 2675\u20132688. CCS 2022, Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3548606.3560576","DOI":"10.1145\/3548606.3560576"},{"key":"10_CR46","doi-asserted-by":"publisher","unstructured":"Som\u00e9, D.F.: EmPoWeb: empowering web applications with browser extensions. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 227\u2013245 (2019). https:\/\/doi.org\/10.1109\/SP.2019.00058","DOI":"10.1109\/SP.2019.00058"},{"key":"10_CR47","doi-asserted-by":"publisher","unstructured":"Starov, O., Laperdrix, P., Kapravelos, A., Nikiforakis, N.: Unnecessarily identifiable: quantifying the fingerprintability of browser extensions due to bloat. In: The World Wide Web Conference, pp. 3244\u20133250. WWW \u201919, Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3308558.3313458","DOI":"10.1145\/3308558.3313458"},{"key":"10_CR48","doi-asserted-by":"publisher","unstructured":"Starov, O., Nikiforakis, N.: XHOUND: quantifying the fingerprintability of browser extensions. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 941\u2013956 (2017). https:\/\/doi.org\/10.1109\/SP.2017.18","DOI":"10.1109\/SP.2017.18"},{"key":"10_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-24177-7_1","volume-title":"Computer Security \u2013 ESORICS 2015","author":"CF Torres","year":"2015","unstructured":"Torres, C.F., Jonker, H., Mauw, S.: FP-Block: usable web privacy by controlling browser fingerprinting. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 3\u201319. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24177-7_1"},{"key":"10_CR50","unstructured":"Trickel, E., Starov, O., Kapravelos, A., Nikiforakis, N., Doup\u00e9, A.: Everyone is different: client-side diversification for defending against extension fingerprinting. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 1679\u20131696 (2019)"},{"key":"10_CR51","doi-asserted-by":"publisher","first-page":"3363335","DOI":"10.1155\/2022\/3363335","volume":"2022","author":"D Zhang","year":"2022","unstructured":"Zhang, D., Zhang, J., Bu, Y., Chen, B., Sun, C., Wang, T.: A survey of browser fingerprint research and application. Wirel. Commun. Mob. Comput. 2022, 3363335 (2022). https:\/\/doi.org\/10.1155\/2022\/3363335","journal-title":"Wirel. Commun. Mob. Comput."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49187-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T21:35:20Z","timestamp":1744148120000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49187-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031491863","9783031491870"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49187-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Groningen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc23.cs.rug.nl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}