{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:40:49Z","timestamp":1752982849336,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T00:00:00Z","timestamp":1720915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T00:00:00Z","timestamp":1720915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100003407","name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["SERICS (PE00000014)"],"award-info":[{"award-number":["SERICS (PE00000014)"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s10207-024-00886-0","type":"journal-article","created":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T02:02:21Z","timestamp":1720922541000},"page":"3199-3216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Information flow control for comparative privacy analyses"],"prefix":"10.1007","volume":"23","author":[{"given":"Zubair","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Calzavara","sequence":"additional","affiliation":[]},{"given":"Samuele","family":"Casarin","sequence":"additional","affiliation":[]},{"given":"Ben","family":"Stock","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,14]]},"reference":[{"key":"886_CR1","doi-asserted-by":"publisher","unstructured":"Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A., D\u00edaz, C.: The web never forgets: persistent tracking mechanisms in the wild. In: Ahn, G., Yung, M., Li, N. (eds.) Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3\u20137, 2014, pp. 674\u2013689. ACM (2014). https:\/\/doi.org\/10.1145\/2660267.2660347","DOI":"10.1145\/2660267.2660347"},{"key":"886_CR2","doi-asserted-by":"publisher","DOI":"10.1145\/3623382","author":"Z Ahmad","year":"2023","unstructured":"Ahmad, Z., Casarin, S., Calzavara, S.: An empirical analysis of web storage and its applications to web tracking. ACM Trans. Web (2023). https:\/\/doi.org\/10.1145\/3623382","journal-title":"ACM Trans. Web"},{"issue":"4","key":"886_CR3","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1515\/POPETS-2018-0033","volume":"2018","author":"MA Bashir","year":"2018","unstructured":"Bashir, M.A., Wilson, C.: Diffusion of user tracking data in the online advertising ecosystem. Proc. Priv. Enhanc. Technol. 2018(4), 85\u2013103 (2018). https:\/\/doi.org\/10.1515\/POPETS-2018-0033","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"886_CR4","unstructured":"Brave Privacy Team (2021). https:\/\/brave.com\/privacy-updates\/7-ephemeral-storage\/"},{"key":"886_CR5","unstructured":"Brave Software, Inc. (2022). https:\/\/brave.com\/shields\/"},{"key":"886_CR6","unstructured":"Brendan Eich (2013). https:\/\/brendaneich.com\/2013\/05\/c-is-for-cookie\/"},{"key":"886_CR7","unstructured":"Brendan Eich (2013). https:\/\/brendaneich.com\/2013\/06\/the-cookie-clearinghouse\/"},{"key":"886_CR8","unstructured":"VentureBeat (2016). https:\/\/venturebeat.com\/mobile\/brave-browser\/"},{"issue":"1","key":"886_CR9","doi-asserted-by":"publisher","first-page":"227","DOI":"10.2478\/POPETS-2022-0012","volume":"2022","author":"D Cassel","year":"2022","unstructured":"Cassel, D., Lin, S., Buraggina, A., Wang, W., Zhang, A., Bauer, L., Hsiao, H., Jia, L., Libert, T.: Omnicrawl: comprehensive measurement of web tracking with real desktop and mobile browsers. Proc. Priv. Enhanc. Technol. 2022(1), 227\u2013252 (2022). https:\/\/doi.org\/10.2478\/POPETS-2022-0012","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"886_CR10","doi-asserted-by":"publisher","unstructured":"Chen, Q., Ilia, P., Polychronakis, M., Kapravelos, A.: Cookie swap party: Abusing first-party cookies for web tracking. In: Leskovec, J., Grobelnik, M., Najork, M., Tang, J., Zia, L. (eds.) WWW \u201921: The Web Conference 2021, Virtual Event\/Ljubljana, Slovenia, April 19\u201323, 2021, pp. 2117\u20132129. ACM\/IW3C2 (2021). https:\/\/doi.org\/10.1145\/3442381.3449837","DOI":"10.1145\/3442381.3449837"},{"key":"886_CR11","doi-asserted-by":"publisher","unstructured":"Chen, Q., Kapravelos, A.: Mystique: Uncovering information leakage from browser extensions. In: Lie, D.,\u00a0Mannan, M.,\u00a0Backes, M.,\u00a0Wang, X. (eds.) Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15\u201319, 2018, pp. 1687\u20131700. ACM (2018). https:\/\/doi.org\/10.1145\/3243734.3243823","DOI":"10.1145\/3243734.3243823"},{"key":"886_CR12","unstructured":"Disconnect, Inc. (2022). https:\/\/disconnect.me\/trackerprotection"},{"key":"886_CR13","doi-asserted-by":"publisher","unstructured":"Englehardt, S., Narayanan, A.: Online tracking: A 1-million-site measurement and analysis. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C.,\u00a0Myers, A.C., Halevi, S. (eds.) Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24\u201328, 2016, pp. 1388\u20131401. ACM (2016). https:\/\/doi.org\/10.1145\/2976749.2978313","DOI":"10.1145\/2976749.2978313"},{"key":"886_CR14","unstructured":"Mozilla Support (2018). https:\/\/support.mozilla.org\/en-US\/kb\/enhanced-tracking-protection-firefox-desktop"},{"key":"886_CR15","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0038","author":"I Fouad","year":"2020","unstructured":"Fouad, I., Bielova, N., Legout, A., Sarafijanovic-Djukic, N.: Missed by filter lists: detecting unknown third-party trackers with invisible pixels. Proc. Privacy Enhanc. Technol. (2020). https:\/\/doi.org\/10.2478\/popets-2020-0038","journal-title":"Proc. Privacy Enhanc. Technol."},{"key":"886_CR16","unstructured":"European Union (2016). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"886_CR17","doi-asserted-by":"publisher","unstructured":"Hedin, D., Birgisson, A., Bello, L., Sabelfeld, A.: Jsflow: tracking information flow in javascript and its apis. In: Cho, Y., Shin, S.Y., Kim, S.,\u00a0Hung, C.,\u00a0Hong, J. (eds.) Symposium on Applied Computing, SAC 2014, Gyeongju, Republic of Korea - March 24\u201328, 2014, pp. 1663\u20131671. ACM (2014). https:\/\/doi.org\/10.1145\/2554850.2554909","DOI":"10.1145\/2554850.2554909"},{"issue":"12","key":"886_CR18","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1109\/TSE.2018.2878020","volume":"46","author":"R Karim","year":"2020","unstructured":"Karim, R., Tip, F., Sochurkov\u00e1, A., Sen, K.: Platform-independent dynamic taint analysis for javascript. IEEE Trans. Softw. Eng. 46(12), 1364\u20131379 (2020). https:\/\/doi.org\/10.1109\/TSE.2018.2878020","journal-title":"IEEE Trans. Softw. Eng."},{"key":"886_CR19","doi-asserted-by":"publisher","unstructured":"Klein, D., Barber, T., Bensalim, S., Stock, B., Johns, M.: Hand sanitizers in the wild: A large-scale study of custom javascript sanitizer functions. In: 7th IEEE European Symposium on Security and Privacy, EuroS &P 2022, Genoa, Italy, June 6\u201310, 2022, pp. 236\u2013250. IEEE (2022). https:\/\/doi.org\/10.1109\/EUROSP53844.2022.00023","DOI":"10.1109\/EUROSP53844.2022.00023"},{"key":"886_CR20","doi-asserted-by":"publisher","unstructured":"Klein, D., Musch, M., Barber, T., Kopmann, M., Johns, M.: Accept all exploits: exploring the security impact of cookie banners. In: Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5\u20139, 2022, pp. 911\u2013922. ACM (2022). https:\/\/doi.org\/10.1145\/3564625.3564647","DOI":"10.1145\/3564625.3564647"},{"key":"886_CR21","unstructured":"Knockel, J., Senft, A., Deibert, R.J.: Privacy and security issues in BAT web browsers. In: Houmansadr, A.,\u00a0Mittal, P. (eds.) 6th USENIX Workshop on Free and Open Communications on the Internet, FOCI \u201916, Austin, TX, USA, August 8, 2016. USENIX Association (2016). https:\/\/www.usenix.org\/conference\/foci16\/workshop-program\/presentation\/knockel"},{"key":"886_CR22","unstructured":"Lerner, A., Simpson, A.K., Kohno, T., Roesner, F.: Internet jones and the raiders of the lost trackers: an archaeological study of web tracking from 1996 to 2016. In: Holz, T., Savage, S. (eds.) 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10\u201312, 2016. USENIX Association (2016). https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/lerner"},{"key":"886_CR23","doi-asserted-by":"publisher","unstructured":"Mayer, J.R., Mitchell, J.C.: Third-party web tracking: policy and technology. In: IEEE Symposium on Security and Privacy, SP 2012, 21\u201323 May (2012), San Francisco, California, USA, pp. 413\u2013427. IEEE Computer Society (2012). https:\/\/doi.org\/10.1109\/SP.2012.47","DOI":"10.1109\/SP.2012.47"},{"key":"886_CR24","doi-asserted-by":"publisher","unstructured":"Merzdovnik, G., Huber, M., Buhov, D., Nikiforakis, N., Neuner, S., Schmiedecker, M., Weippl, E.R.: Block me if you can: a large-scale study of tracker-blocking tools. In: 2017 IEEE European Symposium on Security and Privacy, EuroS &P 2017, Paris, France, April 26\u201328, 2017, pp. 319\u2013333. IEEE (2017). https:\/\/doi.org\/10.1109\/EuroSP.2017.26","DOI":"10.1109\/EuroSP.2017.26"},{"key":"886_CR25","doi-asserted-by":"publisher","unstructured":"Munir, S., Siby, S., Iqbal, U., Englehardt, S., Shafiq, Z., Troncoso, C.: Cookiegraph: understanding and detecting first-party tracking cookies. In: Meng, W., Jensen, C.D., Cremers, C., Kirda, E. (eds.) Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26\u201330, 2023, pp. 3490\u20133504. ACM (2023). https:\/\/doi.org\/10.1145\/3576915.3616586","DOI":"10.1145\/3576915.3616586"},{"key":"886_CR26","unstructured":"Nick Nguyen (2018). https:\/\/blog.mozilla.org\/en\/products\/firefox\/latest-firefox-rolls-out-enhanced-tracking-protection\/"},{"issue":"1","key":"886_CR27","doi-asserted-by":"publisher","first-page":"29","DOI":"10.56553\/POPETS-2023-0003","volume":"2023","author":"A Pradeep","year":"2023","unstructured":"Pradeep, A., Feal, \u00c1., Gamba, J., Rao, A., Lindorfer, M., Vallina-Rodriguez, N., Choffnes, D.R.: Not your average app: a large-scale privacy analysis of android browsers. Proc. Priv. Enhanc. Technol. 2023(1), 29\u201346 (2023). https:\/\/doi.org\/10.56553\/POPETS-2023-0003","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"886_CR28","doi-asserted-by":"publisher","unstructured":"Randall, A., Snyder, P., Ukani, A., Snoeren, A.C., Voelker, G.M., Savage, S., Schulman, A.: Measuring UID smuggling in the wild. In: Barakat, C., Pelsser, C., Benson, T.A., Choffnes, D.R. (eds.) Proceedings of the 22nd ACM Internet Measurement Conference, IMC 2022, Nice, France, October 25\u201327, 2022, pp. 230\u2013243. ACM (2022). https:\/\/doi.org\/10.1145\/3517745.3561415","DOI":"10.1145\/3517745.3561415"},{"key":"886_CR29","unstructured":"Roesner, F., Kohno, T., Wetherall, D.: Detecting and defending against third-party tracking on the web. In: Gribble, S.D., Katabi, D. (eds.) Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2012, San Jose, CA, USA, April 25\u201327, 2012, pp. 155\u2013168. USENIX Association (2012). https:\/\/www.usenix.org\/conference\/nsdi12\/technical-sessions\/presentation\/roesner"},{"key":"886_CR30","unstructured":"Roth, S., Calzavara, S., Wilhelm, M., Rabitti, A., Stock, B.: The security lottery: measuring client-side web security inconsistencies. In: Butler, K.R.B., Thomas, K. (eds.) 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10\u201312, 2022, pp. 2047\u20132064. USENIX Association (2022). https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/roth"},{"issue":"1","key":"886_CR31","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5\u201319 (2003). https:\/\/doi.org\/10.1109\/JSAC.2002.806121","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"886_CR32","doi-asserted-by":"publisher","unstructured":"Schoepe, D., Balliu, M., Pierce, B.C., Sabelfeld, A.: Explicit secrecy: a policy for taint tracking. In: IEEE European Symposium on Security and Privacy, EuroS &P 2016, Saarbr\u00fccken, Germany, March 21\u201324, 2016, pp. 15\u201330. IEEE (2016). https:\/\/doi.org\/10.1109\/EUROSP.2016.14","DOI":"10.1109\/EUROSP.2016.14"},{"key":"886_CR33","doi-asserted-by":"publisher","unstructured":"Sj\u00f6sten, A., Hedin, D., Sabelfeld, A.: Essentialfp: exposing the essence of browser fingerprinting. In: IEEE European Symposium on Security and Privacy Workshops, EuroS &P 2021, Vienna, Austria, September 6\u201310, 2021, pp. 32\u201348. IEEE (2021). https:\/\/doi.org\/10.1109\/EuroSPW54576.2021.00011","DOI":"10.1109\/EuroSPW54576.2021.00011"},{"key":"886_CR34","doi-asserted-by":"publisher","unstructured":"Staicu, C., Schoepe, D., Balliu, M., Pradel, M., Sabelfeld, A.: An empirical study of information flows in real-world javascript. In: Mardziel, P., Vazou, N. (eds.) Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and Analysis for Security, CCS 2019, London, United Kingdom, November 11\u201315, 2019, pp. 45\u201359. ACM (2019). https:\/\/doi.org\/10.1145\/3338504.3357339","DOI":"10.1145\/3338504.3357339"},{"key":"886_CR35","unstructured":"Tim, H., Johann, H., Arthur, E. (2022). https:\/\/blog.mozilla.org\/security\/2021\/02\/23\/total-cookie-protection\/"},{"key":"886_CR36","doi-asserted-by":"publisher","unstructured":"Zafar, A., Das, A.: Comparative privacy analysis of mobile browsers. In: Shehab, M., Fern\u00e1ndez, M., Li, N. (eds.) Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24\u201326, 2023, pp. 3\u201314. ACM (2023). https:\/\/doi.org\/10.1145\/3577923.3583638","DOI":"10.1145\/3577923.3583638"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00886-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00886-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00886-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T01:05:24Z","timestamp":1726275924000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00886-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,14]]},"references-count":36,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["886"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00886-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2024,7,14]]},"assertion":[{"value":"14 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare full compliance with ethical standards. This article does not contain any studies involving humans or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}