{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:24:21Z","timestamp":1771457061898,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319298825","type":"print"},{"value":"9783319298832","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29883-2_18","type":"book-chapter","created":{"date-parts":[[2016,2,3]],"date-time":"2016-02-03T08:48:30Z","timestamp":1454489310000},"page":"254-263","source":"Crossref","is-referenced-by-count":45,"title":["The Leaking Battery"],"prefix":"10.1007","author":[{"given":"\u0141ukasz","family":"Olejnik","sequence":"first","affiliation":[]},{"given":"Gunes","family":"Acar","sequence":"additional","affiliation":[]},{"given":"Claude","family":"Castelluccia","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Diaz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Proposal for a smaller battery API (2012). https:\/\/groups.google.com\/forum\/#!searchin\/mozilla.dev.webapi\/Why20is20the20battery20API20exposed20to20unprivileged20content3F\/mozilla.dev.webapi\/6gLD78z6ASI\/Sz1DH2gWN9wJ. Accessed 24 June 2014"},{"key":"18_CR2","unstructured":"Why is the battery API exposed to unprivileged content? (2012). https:\/\/groups.google.com\/forum\/#!topic\/mozilla.dev.webapi\/V361K7c0olQ\/discussion. Accessed 26 March 2014"},{"key":"18_CR3","unstructured":"Battery Status API - Can I use... Support tables for HTML5, CSS3, etc (2014). http:\/\/caniuse.com\/#search=battery. Accessed 24 June 2014"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A., Diaz, C.: The web never forgets: persistent tracking mechanisms in the wild. In: 21st ACM Conference on Computer and Communications Security (CCS), pp. 674\u2013689. ACM (2014)","DOI":"10.1145\/2660267.2660347"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Acar, G., Juarez, M., Nikiforakis, N., Diaz, C., G\u00fcrses, S., Piessens, F., Preneel, B.: FPDetective: dusting the Web for fingerprinters. In: 20th ACM Conference on Computer and Communications Security (CCS), pp. 1129\u20131140. ACM (2013)","DOI":"10.1145\/2508859.2516674"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Ayenson, M., Wambach, D.J., Soltani, A., Good, N., Hoofnagle, C.J.: Flash cookies and privacy II: now with HTML5 and ETag respawning. In: World Wide Web Internet and Web Information Systems (2011)","DOI":"10.2139\/ssrn.1898390"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Chen, Y.-C., Liao, Y., Baldi, M., Lee, S.-J., Qiu, L.: OS fingerprinting and tethering detection in mobile networks, pp. 173\u2013179 (2014)","DOI":"10.1145\/2663716.2663745"},{"key":"18_CR8","unstructured":"Dawson, B.: FloatingPoint Determinism \u2013 Random ASCII (2013). https:\/\/randomascii.wordpress.com\/2013\/07\/16\/floating-point-determinism\/. Accessed 31 August 2015"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14527-8_1","volume-title":"Privacy Enhancing Technologies","author":"P Eckersley","year":"2010","unstructured":"Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1\u201318. Springer, Heidelberg (2010)"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-662-47854-7_7","volume-title":"Financial Cryptography and Data Security","author":"D Fifield","year":"2015","unstructured":"Fifield, D., Egelman, S.: Fingerprinting web users through font metrics. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 107\u2013124. Springer, Heidelberg (2015)"},{"key":"18_CR11","unstructured":"Hughes, R.: UPower Reference Manual (2010). http:\/\/upower.freedesktop.org\/docs\/. Accessed 22 June 2014"},{"key":"18_CR12","unstructured":"Kamkar, S.: Evercookie (2010). http:\/\/samy.pl\/evercookie. Accessed 24 June 2014"},{"issue":"2","key":"18_CR13","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TDSC.2005.26","volume":"2","author":"T Kohno","year":"2005","unstructured":"Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93\u2013108 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"18_CR14","unstructured":"Kostiainen, A., Lamouri, M.: Battery Status API (2012). https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1124127"},{"issue":"3","key":"18_CR15","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1353445.1353446","volume":"30","author":"D Monniaux","year":"2008","unstructured":"Monniaux, D.: The pitfalls of verifying floating-point computations. ACM Trans. Program. Lang. Syst. (TOPLAS) 30(3), 12 (2008)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"18_CR16","unstructured":"Mowery, K., Bogenreif, D., Yilek, S., Shacham, H.: Fingerprinting information in JavaScript implementations. In: Web 2.0 Workshop on Security and Privacy (W2SP), vol. 2. IEEE (2011)"},{"key":"18_CR17","unstructured":"Mowery, K., Shacham, H.: Pixel perfect: fingerprinting canvas in HTML5. In: Web 2.0 Workshop on Security and Privacy (W2SP). IEEE (2012)"},{"key":"18_CR18","unstructured":"Nakibly, G., Shelef, G., Yudilevich, S.: Hardware fingerprinting using HTML5 (2015). CoRR, arxiv.1503.01408"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G., Cookieless monster: exploring the ecosystem of web-based device fingerprinting. In: IEEE Symposium on Security and Privacy (SP), pp. 541\u2013555. IEEE (2013)","DOI":"10.1109\/SP.2013.43"},{"key":"18_CR20","unstructured":"Olejnik, L.: Bug 1124127 - Round Off Navigator Battery Level on Linux (2015). https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1124127. Accessed 30 February 2015"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Soltani, A., Canty, S., Mayo, Q., Thomas, L., Hoofnagle, C.J.: Flash cookies and privacy. In: Intelligent Information Privacy Management, AAAI Spring Symposium (2010)","DOI":"10.2139\/ssrn.1446862"},{"key":"18_CR22","unstructured":"Tor Bugs: TorBrowser Bundle. #5293 Hook charging+discharching rates in Battery API (2012). https:\/\/trac.torproject.org\/projects\/tor\/ticket\/5293. Accessed 24 June 2014"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29883-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,12]],"date-time":"2021-02-12T01:19:54Z","timestamp":1613092794000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-29883-2_18"}},"subtitle":["A Privacy Analysis of the HTML5 Battery Status API"],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319298825","9783319298832"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29883-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}