{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:31:31Z","timestamp":1755999091319},"reference-count":57,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179385","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"1023-1040","source":"Crossref","is-referenced-by-count":1,"title":["Only Pay for What You Leak: Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense"],"prefix":"10.1109","author":[{"given":"Ryan","family":"Torok","sequence":"first","affiliation":[{"name":"Princeton University,Department of Computer Science,Princeton,New Jersey,USA"}]},{"given":"Amit","family":"Levy","sequence":"additional","affiliation":[{"name":"Princeton University,Department of Computer Science,Princeton,New Jersey,USA"}]}],"member":"263","reference":[{"volume-title":"Do not track","year":"2022","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"volume-title":"Privacy budget","year":"2020","author":"White","key":"ref3"},{"volume-title":"Privacy budget","year":"2022","author":"West","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"volume-title":"Meet the online tracking device that is virtually impossible to block","year":"2014","author":"Angwin","key":"ref6"},{"article-title":"Pixel perfect: Fingerprinting canvas in HTML5","volume-title":"proceedings of the 6th Workshop on Web 2.0 Security and Privacy (W2SP \u201912)","author":"Mowery","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64200-0_7"},{"volume-title":"Fingerprint.js quick start guide","year":"2022","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833612"},{"volume-title":"Firefox\u2019s protection against fingerprinting","key":"ref11"},{"volume-title":"Fingerprinting defenses 2.0","author":"Team","key":"ref12"},{"volume-title":"Browser fingerprinting","key":"ref13"},{"volume-title":"What are grey borders resized on tor browser window?","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00017"},{"volume-title":"Fingerprint randomization","year":"2020","key":"ref16"},{"volume-title":"Brave, fingerprinting, and privacy budgets","year":"2019","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741090"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_7"},{"key":"ref20","first-page":"679","article-title":"Extension breakdown: Security analysis of browsers extension resources control policies","volume-title":"Proceedings of the 26th USENIX Security Symposium (USENIX Security \u201917)","author":"Sanchez-Rola"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23309"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24383"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.18"},{"article-title":"Unleash the simulacrum: Shifting browser realities for robust extension-fingerprinting prevention","volume-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security \u201922)","author":"Karami","key":"ref24"},{"article-title":"Everyone is different: Client-side diversification for defending against extension fingerprinting","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security \u201919)","author":"Trickel","key":"ref25"},{"volume-title":"At home testing","key":"ref26"},{"key":"ref27","first-page":"495","article-title":"Learning in situ: A randomized experiment in video streaming","volume-title":"Proceedings of the 17th USENIX Conference on Networked Systems Design and Implementation (NSDI \u201920)","author":"Yan"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WTS48268.2020.9198728"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098843"},{"key":"ref30","first-page":"645","article-title":"Neural adaptive content-aware internet video delivery","volume-title":"Proceedings of the 13th USENIX Conference on Operating Systems Design and Implementation (OSDI \u201918)","author":"Yeo"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405856"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2428556.2428577"},{"volume-title":"The structured clone algorithm","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3290390"},{"volume-title":"Flexible box layout","key":"ref35"},{"volume-title":"Lazy loading","key":"ref36"},{"volume-title":"Anonymous iframe","key":"ref37"},{"volume-title":"Anonymous iframe","year":"2022","key":"ref38"},{"volume-title":"Cross-origin embedder policy","key":"ref39"},{"volume-title":"iframe: The inline frame element","key":"ref40"},{"volume-title":"Origin","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7970-4"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"volume-title":"Web workers api","key":"ref44"},{"key":"ref45","first-page":"131","article-title":"Protecting users by confining javascript with cowl","volume-title":"Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation (OSDI \u201914)","author":"Stefan"},{"volume-title":"Tokio - an asynchronous rust runtime","key":"ref46"},{"volume-title":"Web audio api","key":"ref47"},{"volume-title":"Web audio dj","key":"ref48"},{"volume-title":"Nexus web audio interfaces","author":"Taylor","key":"ref49"},{"volume-title":"perf: Linux profiling with performance counters","year":"2022","key":"ref50"},{"year":"2015","key":"ref51","article-title":"Deep memory profiler"},{"volume-title":"About valgrind","year":"2022","key":"ref52"},{"volume-title":"4. memcheck: a memory error detector","year":"2022","key":"ref53"},{"volume-title":"No-javascript fingerprinting","year":"2022","key":"ref54"},{"volume-title":"Cross-origin resource sharing","key":"ref55"},{"volume-title":"Window. sessionstorage","key":"ref56"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2023,5,21]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179385.pdf?arnumber=10179385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:17:07Z","timestamp":1721452627000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179385\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179385","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}