{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:12:24Z","timestamp":1743099144934,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319184661"},{"type":"electronic","value":"9783319184678"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18467-8_7","type":"book-chapter","created":{"date-parts":[[2015,5,8]],"date-time":"2015-05-08T08:12:03Z","timestamp":1431072723000},"page":"97-111","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing"],"prefix":"10.1007","author":[{"given":"Chetan","family":"Bansal","sequence":"first","affiliation":[]},{"given":"S\u00f6ren","family":"Preibusch","sequence":"additional","affiliation":[]},{"given":"Natasa","family":"Milic-Frayling","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,9]]},"reference":[{"key":"7_CR1","unstructured":"Mozilla Developer Network and individual contributors, Same-origin policy (2014). \n                    https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Security\/Same-origin_policy"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Gomer, R., Rodrigues, E.M., Milic-Frayling, N., Schraefel, M.: Network analysis of third party tracking: User exposure to tracking cookies through search. In: IEEE\/WIC\/ACM Int. J. Conf. on Web Intelligence and Intelligent Agent Tech. (2013)","DOI":"10.1109\/WI-IAT.2013.77"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Carrascal, J.P., Riederer, C., Erramilli, V., Cherubini, M., de Oliveira, R.: Your browsing behavior for a big mac: economics of personal information online. In: Proceedings of the 22nd International Conference on World Wide Web (WWW 2013) (2013)","DOI":"10.1145\/2488388.2488406"},{"key":"7_CR4","unstructured":"TRUSTe, Behavioral Targeting: Not that Bad?! TRUSTe Survey Shows Decline in Concern for Behavioral Targeting, March 4, 2009. \n                    http:\/\/www.truste.com\/about-TRUSTe\/press-room\/news_truste_behavioral_targeting_survey"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Felten, E.W., Schneider, M.A.: Timing attacks on web privacy. In: Proceedings of the 7th ACM Conference on Computer and Communications Security (2000)","DOI":"10.1145\/352600.352606"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Jackson, C., Bortz, A., Boneh, D., Mitchell, J.C.: Protecting browser state from web privacy attacks. In: Proc. of the 15th Int. Conf. on World Wide Web (WWW) (2006)","DOI":"10.1145\/1135777.1135884"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A Practical attack to de-anonymize social network users. In: IEEE Symposium on Security and Privacy (SP) (2010)","DOI":"10.1109\/SP.2010.21"},{"key":"7_CR8","unstructured":"Jackson, C.: SafeCache: Add-ons for Firefox (2006). \n                    https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/safecache\/"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Jia, Y., Dongy, X., Liang, Z., Saxena, P.: I Know Where You\u2019ve Been: Geo-Inference Attacks via the Browser Cache. IEEE Internet Computing (2014) (forthcoming)","DOI":"10.1109\/MIC.2014.103"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Yan, G., Chen, G., Eidenbenz, S., Li, N.: Malware propagation in online social networks: nature, dynamics, and defense implications. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) (2011)","DOI":"10.1145\/1966913.1966939"},{"key":"7_CR11","unstructured":"Provos, N., McNamee, D., Mavrommatis, P., Wang, K., Modadugu, N: The ghost in the browser: analysis of web-based malware. In: First Workshop on Hot Topics in Understanding Botnets (HotBots) (2007)"},{"key":"7_CR12","unstructured":"Zalewski, M.: Chrome & Opera PoC: rapid history extraction through non-destructive cache timing, December 2011. \n                    http:\/\/lcamtuf.coredump.cx\/cachetime\/chrome.html"},{"key":"7_CR13","unstructured":"Youll, J.: Fraud vulnerabilities in sitekey security at Bank of America (2006). \n                    www.cr-labs.com\/publications\/SiteKey-20060718.pdf"},{"key":"7_CR14","unstructured":"Alexa Internet, Inc., Top Sites in United States (2014). \n                    http:\/\/www.alexa.com\/topsites\/countries\/US"},{"key":"7_CR15","unstructured":"Facebook, Company Info | Facebook Newsroom (2014). \n                    https:\/\/newsroom.fb.com\/company-info\/"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Preibusch, S.: The privacy jungle: on the market for data protection in social networks. In: Eighth Workshop on the Economics of Information Security (WEIS 2009) (2009)","DOI":"10.1007\/978-1-4419-6967-5_8"},{"key":"7_CR17","unstructured":"Pironti, A., Strub, P.-Y., Bhargavan, K.: Identifying Website Users by TLS Traffic Analysis: New Attacks and Effective Countermeasures. INRIA (2012)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Chen, S., Wang, R., Wang, X., Zhang, K.: Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. In: IEEE Symposium on Security and Privacy (SP 2010) (2010)","DOI":"10.1109\/SP.2010.20"},{"key":"7_CR19","unstructured":"The BIG browser benchmark (January 2013 edition). \n                    http:\/\/www.zdnet.com\/the-big-browser-benchmark-january-2013-edition-7000009776\/"},{"key":"7_CR20","unstructured":"Datanyze.com, CDN market share in the Alexa top 1K (2014). \n                    http:\/\/www.datanyze.com\/market-share\/cdn\/?selection=3"},{"key":"7_CR21","unstructured":"MSDN, HTTPS Caching and Internet Explorer - IEInternals (2010). \n                    http:\/\/blogs.msdn.com\/b\/ieinternals\/archive\/2010\/04\/21\/internet-explorer-may-bypass-cache-for-cross-domain-https-content.aspx"},{"key":"7_CR22","unstructured":"MozillaZine Knowledge base, Browser.cache.disk cache ssl (2014). \n                    http:\/\/kb.mozillazine.org\/Browser.cache.disk_cache_ssl"},{"key":"7_CR23","unstructured":"W3C, Resource Timing (2014). \n                    http:\/\/www.w3.org\/TR\/resource-timing"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Acar, G., Juarez, M., Nikiforakis, N., Diaz, C., G\u00fcrses, S., Piessens, F., Preneel, B.: FPDetective: dusting the web for fingerprinters. In: ACM SIGSAC Conference on Computer and Communications Security (CCS) (2013)","DOI":"10.1145\/2508859.2516674"},{"key":"7_CR25","unstructured":"Holter, M.: KISSmetrics Settles ETags Tracking Class Action Lawsuit. Top Class Actions LLC, October 22, 2012. \n                    http:\/\/topclassactions.com\/lawsuit-settlements\/lawsuit-news\/2731-kissmetrics-settles-etags-tracking-class-action-lawsuit\/"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18467-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T20:39:55Z","timestamp":1559162395000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-18467-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319184661","9783319184678"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18467-8_7","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}