{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:12:23Z","timestamp":1762506743451},"reference-count":179,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2016]]},"DOI":"10.1109\/comst.2016.2519912","type":"journal-article","created":{"date-parts":[[2016,1,25]],"date-time":"2016-01-25T19:08:37Z","timestamp":1453748917000},"page":"2124-2148","source":"Crossref","is-referenced-by-count":29,"title":["In-Depth Survey of Digital Advertising Technologies"],"prefix":"10.1109","volume":"18","author":[{"given":"Gong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jacob H.","family":"Cox","sequence":"additional","affiliation":[]},{"given":"A. Selcuk","family":"Uluagac","sequence":"additional","affiliation":[]},{"given":"John A.","family":"Copeland","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","article-title":"The beginning of the end for adobe&#x2019;s flash","author":"goldman","year":"2011","journal-title":"CNNmoney Tech"},{"key":"ref172","first-page":"2015","author":"o\u2019reilly","year":"2015","journal-title":"Google Microsoft And Amazon Are Paying Adblock Plus Huge Fees to Get Their Ads Unblocked"},{"key":"ref171","author":"panzarino","year":"2013","journal-title":"Apple to Reject Any Apps That Use UDIDs"},{"key":"ref174","author":"hoffman","year":"2015","journal-title":"How to Manage App Permissions on Android 6 0"},{"key":"ref173","author":"hoffman","year":"2014","journal-title":"Android&#x2019;s App Permissions Were Just Simplified&#x2014;Now They&#x2019;re Much Less Secure"},{"key":"ref176","first-page":"59","author":"nath","year":"0","journal-title":"Proc Annu Int Conf Mobile Syst Appl Serv"},{"key":"ref175","article-title":"An empirical study of mobile ad targeting","author":"book","year":"2015"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23948-9_22"},{"key":"ref177","first-page":"7","author":"kim","year":"0","journal-title":"Proc Workshop Mobile Comput Syst Appl"},{"key":"ref168","first-page":"337","author":"nicutar","year":"0","journal-title":"Proc ACM Int Conf Emerging Netw EXp Technol"},{"key":"ref169","first-page":"127","author":"qian","year":"0","journal-title":"Proc 10th Int Conf Mobile Syst Appl Services"},{"key":"ref39","first-page":"553","author":"shekhar","year":"0","journal-title":"Proc Usenix Secur Symp"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36516-4_7"},{"key":"ref33","article-title":"Longitudinal analysis of android ad library permissions","author":"book","year":"2013"},{"key":"ref32","first-page":"431","author":"gibler","year":"0","journal-title":"Proc 11th Annu Int Conf Mobile Syst Appl Serv"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566868"},{"key":"ref30","first-page":"1","author":"khan","year":"0","journal-title":"Proc Workshop Mobile Comput Syst Appl"},{"key":"ref37","first-page":"33","author":"haddadi","year":"0","journal-title":"Proc 5th ACM Int Workshop Mobility Evolving Internet Archit"},{"key":"ref36","first-page":"139","author":"svajcer","year":"0","journal-title":"Proc Virus Bull Conf"},{"key":"ref35","first-page":"343","author":"vallina-rodriguez","year":"0","journal-title":"Proc ACM Conf Internet Meas Conf"},{"key":"ref34","first-page":"196","article-title":"Children&#x2019;s exposure to mobile in-app advertising: An analysis of content appropriateness","author":"chen","year":"0","journal-title":"Proc Int Conf Social Comput (SocialCom)"},{"key":"ref28","first-page":"343","author":"luo","year":"0","journal-title":"Proc of the 27th Annual Comp Sec App Conf"},{"key":"ref27","first-page":"101","author":"grace","year":"0","journal-title":"Proc 5th ACM Conf Secur Privacy Wireless Mobile Netw"},{"key":"ref179","year":"2012","journal-title":"A Portrait of Today&#x2019;s Smartphone User"},{"key":"ref29","article-title":"Investigating user privacy in android ad libraries","author":"stevens","year":"0","journal-title":"Proc Workshop Mobile Secur Technol (MoST)"},{"key":"ref20","article-title":"Mactans: Injecting malware into iOS devices via malicious chargers","author":"lau","year":"2013","journal-title":"Proc Black Hat USA"},{"key":"ref22","article-title":"PiOS: Detecting privacy leaks in iOS applications","author":"egele","year":"0","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2494522"},{"key":"ref24","author":"smith","year":"2010","journal-title":"IPhone Applications & Privacy Issues An Analysis of Application Transmission of IPhone Unique Device Identifiers (UDIDs)"},{"key":"ref23","volume":"2","author":"enck","year":"0","journal-title":"Proc Usenix Secur Symp"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.25"},{"key":"ref26","first-page":"29","author":"pathak","year":"0","journal-title":"Proc 7th ACM Eur Conf Comput Syst"},{"key":"ref100","first-page":"2409","author":"lindqvist","year":"0","journal-title":"Proc SIGCHI Conf Hum Factors Comput Syst"},{"key":"ref25","author":"smith","year":"2012","journal-title":"Apple&#x2019;s UDID Hypocrisy"},{"key":"ref50","first-page":"91","article-title":"Risk-aware revenue maximization in display advertising","author":"heavlin","year":"0","journal-title":"Proc 21st Int Conf World Wide Web"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187888"},{"key":"ref154","first-page":"269","author":"wigdor","year":"0","journal-title":"Proc 20th Annu ACM Symp User Interface Softw Technol"},{"key":"ref153","first-page":"97","author":"roesner","year":"0","journal-title":"Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13)"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39498-0_10"},{"key":"ref155","first-page":"2487","author":"de sa","year":"0","journal-title":"Proc SIGCHI Conf Hum Factors Comput Syst"},{"key":"ref150","first-page":"57","article-title":"Decaf: Detecting and characterizing ad fraud in mobile apps","author":"liu","year":"0","journal-title":"Proc 11th USENIX Symp on Netw Syst Design Implement (NSDI 14)"},{"key":"ref152","first-page":"239","author":"roesner","year":"0","journal-title":"Proc of the 15th Annual ACM Symp on User Interface Software and Technology"},{"key":"ref151","first-page":"123","author":"crussell","year":"0","journal-title":"Proc 12th Annu Int Conf Mobile Syst Appl Serv"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"ref147","first-page":"611","year":"0","journal-title":"Proc ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref148","first-page":"1043","author":"yang","year":"0","journal-title":"Proc ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref149","article-title":"The core of the matter: Analyzing malicious traffic in cellular carriers","author":"lever","year":"0","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6554914"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963427"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963429"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772729"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772702"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1257\/aer.97.1.242"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187886"},{"key":"ref52","first-page":"1037","author":"stavrogiannis","year":"0","journal-title":"Proc Int Conf Auton Agents Multi-Agent Syst"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516762"},{"key":"ref167","first-page":"267","author":"mohan","year":"0","journal-title":"Proc ACM Eur Conf Comput Syst"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000020"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307658"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187844"},{"key":"ref163","first-page":"281","author":"falaki","year":"0","journal-title":"Proc 10th ACM SIGCOMM Conf Internet Meas"},{"key":"ref162","article-title":"Adobe report finds massive 43 growth in online video watching","author":"tweney","year":"2014"},{"key":"ref161","author":"barbosa","year":"2015","journal-title":"Top 5 Digital and Social Advertising Trends for 2015"},{"key":"ref160","author":"cohen","year":"2014","journal-title":"Everything You Need to Know About Facebook&#x2019;s Launch of its Revamped Atlas Ad Platform Social Times"},{"key":"ref4","first-page":"765","author":"dave","year":"0","journal-title":"Proc ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref3","author":"dunn","year":"2013","journal-title":"Cyber-Security and Data Privacy Outlook and Review"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10841-9_1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.10"},{"key":"ref159","first-page":"1","article-title":"Factors affecting attitudes and behavioural intention towards social networking advertising: A case of facebook users in south korea","author":"jung","year":"2015","journal-title":"Int J Advertising"},{"key":"ref8","first-page":"279","author":"stone-gross","year":"0","journal-title":"Proc ACM SIGCOMM Conf Internet Meas Conf"},{"key":"ref49","first-page":"1222","author":"mcmahan","year":"0","journal-title":"Proc ACM SIGKDD Int Conf Knowledge Discovery and Data Mining"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568029"},{"key":"ref157","first-page":"2449","author":"kelley","year":"0","journal-title":"Proc SIGCHI Conf Hum Factors Comput Syst"},{"key":"ref158","first-page":"33","article-title":"I&#x2019;ve got 99 problems, but vibration ain&#x2019;t one: A survey of smartphone users&#x2019; concerns","author":"felt","year":"0","journal-title":"Proc 2nd ACM Workshop Secur Privacy Smartphones Mobile Devices"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486038"},{"key":"ref46","article-title":"When money moves to digital, where should it go? Identifying the right media-placement strategies for digital display","author":"hunter","year":"2010"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835459"},{"key":"ref48","first-page":"515","author":"broder","year":"0","journal-title":"Proc of ACM Int Conf on Web Search and Data Mining"},{"key":"ref47","first-page":"1077","author":"zhang","year":"0","journal-title":"Proc ACM SIGKDD Int Conf Knowledge Discovery and Data Mining"},{"key":"ref42","first-page":"1097","author":"chapelle","year":"0","journal-title":"Proc ACM SIGKDD Int Conf Knowledge Discovery and Data Mining"},{"key":"ref41","first-page":"19","author":"zhang","year":"0","journal-title":"Proc of the Joint WICOW\/AIRWeb Workshop on Web Quality"},{"key":"ref44","article-title":"The value of behavioral targeting","author":"beales","year":"2010"},{"key":"ref43","first-page":"141","author":"gill","year":"0","journal-title":"Proc Conf Internet Meas Conf"},{"key":"ref127","first-page":"371","author":"ter louw","year":"0","journal-title":"Proc Usenix Secur Symp"},{"key":"ref126","first-page":"373","author":"zarras","year":"0","journal-title":"Proc Conf Internet Meas Conf"},{"key":"ref125","first-page":"297","author":"dong","year":"0","journal-title":"Proc of the 27th Annual Comp Sec App Conf"},{"key":"ref124","first-page":"674","author":"li","year":"0","journal-title":"Proc ACM Conf Comput Commun Secur"},{"key":"ref73","first-page":"2","author":"leontiadis","year":"0","journal-title":"Proc Workshop Mobile Comput Syst Appl"},{"key":"ref72","first-page":"59","article-title":"Admotional: Towards personalized online ads","volume":"8","author":"meyer","year":"2011","journal-title":"IJCSA"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342394"},{"key":"ref71","first-page":"111","article-title":"How effective is targeted advertising?","author":"farahat","year":"0","journal-title":"Proc 21st Int Conf World Wide Web"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.41"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963431"},{"key":"ref76","first-page":"137","author":"wei","year":"0","journal-title":"Proc 18th Annu Int Conf Mobile Comput Netw"},{"key":"ref130","first-page":"21","author":"alrwais","year":"0","journal-title":"Proc 28th Annu Comput Secur Appl Conf"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2412096.2412100"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2342480.2342482"},{"key":"ref75","first-page":"277","author":"petsas","year":"0","journal-title":"Proc Conf Internet Meas Conf"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22424-9_10"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_15"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/1764873.1764877"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2012.6461010"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"ref136","first-page":"129","author":"meng","year":"0","journal-title":"Proc ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref135","first-page":"455","author":"moore","year":"0","journal-title":"Proc 18th ACM Conf Comput Commun Secur"},{"key":"ref138","first-page":"81","article-title":"All your droid are belong to us: A survey of current android attacks","author":"vidas","year":"0","journal-title":"Proc Usenix Conf Offensive Technol (WOOT)"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567983"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2010.137"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488429"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488470"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772699"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772717"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435380"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488391"},{"key":"ref141","first-page":"1844","author":"hoffmann","year":"0","journal-title":"Proc 28th Annu ACM Symp Appl Comput"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187887"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref67","first-page":"413","author":"bilenko","year":"0","journal-title":"Proc ACM SIGKDD Int Conf Knowledge Discovery and Data Mining"},{"key":"ref143","author":"zhang","year":"2015","journal-title":"Kemoge Another Mobile Malicious Adware Infecting Over 20 Countries"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187851"},{"key":"ref144","article-title":"Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets","author":"zhou","year":"0","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref2","article-title":"Q3 2014 internet advertising revenues hit $12.4 billion, making it the highest quarter on record","author":"goldberg","year":"0"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772695"},{"key":"ref145","article-title":"A static assurance analysis of android applications","author":"elish","year":"2013","journal-title":"Virginia Polytechnic Institute and State University"},{"key":"ref1","article-title":"At $11.6 billion in q1 2014, internet advertising revenues hit all-time first quarter high","author":"goldberg","year":"0"},{"key":"ref109","first-page":"631","article-title":"Privacy-preserving social plugins","author":"kontaxis","year":"0","journal-title":"Usenix Security"},{"key":"ref95","first-page":"125","author":"khan","year":"0","journal-title":"Proc 11th Annu Int Conf Mobile Syst Appl Serv"},{"key":"ref108","article-title":"Priv3: A third party cookie policy","author":"dhawan","year":"0","journal-title":"Proc W3C Workshop Do Not Track Beyond"},{"key":"ref94","first-page":"179","author":"falaki","year":"0","journal-title":"Proc 8th Int Conf Mobile Syst Appl Serv"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.37"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"429","DOI":"10.25300\/MISQ\/2014\/38.2.05","article-title":"An economic analysis of online advertising using behavioral targeting","volume":"38","author":"chen","year":"2014","journal-title":"MIS Quart"},{"key":"ref106","article-title":"Adnostic: Privacy preserving targeted advertising","author":"toubiana","year":"0","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188140"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04280-5_14"},{"key":"ref91","article-title":"Host fingerprinting and tracking on the web: Privacy and security implications","author":"yen","year":"0","journal-title":"Proc 19th Annu Netw Distrib Syst Security Symp (NDSS)"},{"key":"ref104","article-title":"Serving ads from localhost for performance, privacy, and profit","author":"guha","year":"0","journal-title":"Proc HOTNETS"},{"key":"ref90","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-14527-8_1","article-title":"How unique is your web browser?","author":"eckersley","year":"2010","journal-title":"Privacy Enhancing Technologies"},{"key":"ref103","first-page":"169","article-title":"Privad: Practical privacy in online advertising","author":"guha","year":"0","journal-title":"Proc Symp Netw Syst Design Implementation (NSDI)"},{"key":"ref102","first-page":"667","author":"reznichenko","year":"0","journal-title":"Proc 18th ACM Conf Comput Commun Secur"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_1"},{"key":"ref112","first-page":"71","author":"pearce","year":"0","journal-title":"Proc 7th ACM Symp Inf Comput Commun Secur"},{"key":"ref110","year":"2015","journal-title":"The World&#x2019;s Most Admired Companies"},{"key":"ref98","article-title":"Shining the floodlights on mobile web tracking&#x2014;A privacy survey","volume":"2","author":"eubank","year":"0","journal-title":"Proc IEEE Workshop Web"},{"key":"ref99","first-page":"19","author":"polakis","year":"0","journal-title":"Proc 29th Annu Comput Secur Appl Conf"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2013.6547438"},{"key":"ref97","first-page":"329","author":"xu","year":"0","journal-title":"Proc ACM SIGCOMM Conf Internet Meas Conf"},{"key":"ref10","author":"insider","year":"2013","journal-title":"How Ad Serving Works"},{"key":"ref11","author":"pettey","year":"2013","journal-title":"Global Mobile Ad Market Growing Faster Than Expected will be Worth us $11 4 Billion in 2013 Double That by 2016 Says Gartner"},{"key":"ref12","first-page":"111","author":"nath","year":"0","journal-title":"Proc 11th Annu Int Conf Mobile Syst Appl Serv"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.26"},{"key":"ref14","volume":"30","author":"felt","year":"0","journal-title":"Proc Usenix Secur Symp"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.2"},{"key":"ref118","first-page":"662","author":"hardt","year":"0","journal-title":"Proc ACM Conf Comput Commun Secur"},{"key":"ref16","first-page":"627","author":"felt","year":"0","journal-title":"Proc 18th ACM Conf Comput Commun Secur"},{"key":"ref82","first-page":"149","author":"krishnan","year":"0","journal-title":"Proc Internet Meas Conf"},{"key":"ref117","article-title":"MoRePriv: Mobile OS support for application personalization and privacy","volume":"3","author":"davidson","year":"2012","journal-title":"Microsoft Research"},{"key":"ref17","first-page":"217","author":"au","year":"0","journal-title":"Proc ACM Conf Comput Commun Secur"},{"key":"ref81","first-page":"295","author":"ihm","year":"0","journal-title":"Proc ACM SIGCOMM Conf Internet Meas Conf"},{"key":"ref18","volume":"31","author":"dietz","year":"0","journal-title":"Proc Usenix Secur Symp"},{"key":"ref84","article-title":"Measuring the effectiveness of privacy tools for limiting behavioral advertising","author":"balebako","year":"0","journal-title":"Proceedings of Web 2 0 Security & Privacy Workshop"},{"key":"ref119","first-page":"31","author":"wei","year":"0","journal-title":"Proc 28th Annu Comput Secur Appl Conf"},{"key":"ref19","first-page":"559","article-title":"Jekyll on iOS: When benign apps become evil","volume":"13","author":"wang","year":"0","journal-title":"Usenix Security"},{"key":"ref83","first-page":"81","author":"guha","year":"0","journal-title":"Proc 10th ACM SIGCOMM Conf Internet Meas"},{"key":"ref114","first-page":"639","author":"hornyack","year":"0","journal-title":"Proc 18th ACM Conf Comput Commun Secur"},{"key":"ref113","first-page":"9","author":"zhang","year":"0","journal-title":"Proc 29th Annu Comput Secur Appl Conf"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2013.6465567"},{"key":"ref80","article-title":"Detecting and defending against third-party tracking on the web","author":"roesner","year":"0","journal-title":"Proc 9th USENIX Conf Netw Syst Des Implement"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36632-1_14"},{"key":"ref120","author":"micro","year":"2014","journal-title":"12 Most Abused Android App Permissions"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567992"},{"key":"ref121","first-page":"73","author":"barrera","year":"0","journal-title":"Proc 17th ACM Conf Comput Commun Secur"},{"key":"ref122","author":"vance","year":"2009","journal-title":"Times web ads show security breach"},{"key":"ref123","first-page":"1","author":"mavrommatis","year":"0","journal-title":"Proc 17th USENIX Security Symp"},{"key":"ref85","article-title":"A study of third-party tracking by mobile apps in the wild","author":"han","year":"2012"},{"key":"ref86","article-title":"Online tracking, targeted advertising and user privacy-the technical part","author":"sprankel","year":"2011"},{"key":"ref87","article-title":"Targeted, not tracked: Client-side solutions for privacy-friendly behavioral advertising","author":"bilenko","year":"0","journal-title":"Proc 11th Privacy Enhancing Technol Symp (PETS11)"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/7548084\/07390161.pdf?arnumber=7390161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:43:45Z","timestamp":1642005825000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7390161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":179,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/comst.2016.2519912","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}