{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:25Z","timestamp":1773511225642,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/spw54247.2022.9833863","type":"proceedings-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:14:47Z","timestamp":1658780087000},"page":"335-341","source":"Crossref","is-referenced-by-count":3,"title":["Interactive History Sniffing with Dynamically-Generated QR Codes and CSS Difference Blending"],"prefix":"10.1109","author":[{"given":"Keith","family":"O'Neal","sequence":"first","affiliation":[{"name":"University of St. Thomas,St. Paul,USA"}]},{"given":"Scott","family":"Yilek","sequence":"additional","affiliation":[{"name":"University of St. Thomas,St. Paul,USA"}]}],"member":"263","reference":[{"key":"ref31","article-title":"QR Code generator library","author":"nayuki","year":"2021"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.84"},{"key":"ref10","article-title":"Browser history re: visited","author":"smith","year":"2018","journal-title":"12th USENIX Workshop on Offensive Technologies WOOT 2018"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","article-title":"CAPTCHA: using hard AI problems for security","volume":"2656","author":"von ahn","year":"2003","journal-title":"Advances in Cryptology-EUROCRYPT 2003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2016.109"},{"key":"ref13","article-title":"History theft with css boolean algebra","author":"zalewski","year":"2013"},{"key":"ref14","article-title":"Css mix-blend-mode is bad for your browsing history","author":"zalewski","year":"2016"},{"key":"ref15","article-title":"Information technology &#x2013; Automatic identification and data capture techniques &#x2013; QR Code bar code symbology specification","year":"2015","journal-title":"Tech Rep"},{"key":"ref16","article-title":"Qr code scams are making a comeback","author":"arntz","year":"2020"},{"key":"ref17","article-title":"Qart codes","author":"cox","year":"2012"},{"key":"ref18","article-title":"Compositing and blending level 1","author":"cabanier","year":"2015","journal-title":"W3C Candidate Recommendation"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352606"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_14"},{"key":"ref27","article-title":"Phishing on mobile devices","author":"felt","year":"2011","journal-title":"Proceedings of W2SP 2011"},{"key":"ref3","article-title":"Preventing attacks on a user&#x2019;s history through css :visited selectors","author":"baron","year":"2010"},{"key":"ref6","article-title":"Plugging the css history leak","author":"stamm","year":"2010","journal-title":"Mozilla Security Blog"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484357"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866339"},{"key":"ref8","article-title":"Link visitedness can be detected by redraw","author":"stone","year":"2013","journal-title":"Mozilla bug report"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.23"},{"key":"ref2","article-title":":visited support allows queries into global history","author":"baron","year":"2002","journal-title":"Mozilla Bugzilla"},{"key":"ref9","article-title":"Stealing sensitive browser data with the W3C Ambient Light Sensor API","author":"janc","year":"2017"},{"key":"ref1","article-title":"Css visited pages disclosure","author":"clover","year":"2002","journal-title":"Bugtraq mailing list"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813632"},{"key":"ref22","article-title":"Offline web applications","author":"van kesteren","year":"2008","journal-title":"W3C Working Group Note"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991080"},{"key":"ref24","article-title":"Service workers 1","author":"russell","year":"2014","journal-title":"W3C Working Group Draft"},{"key":"ref23","article-title":"Quota management api","author":"yasuda","year":"2016","journal-title":"W3C Working Group Note"},{"key":"ref26","first-page":"12","article-title":"A study of malicious QR codes","volume":"3","author":"sharma","year":"2012","journal-title":"International Journal of Computational Intelligence and Information Security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1971519.1971593"}],"event":{"name":"2022 IEEE Security and Privacy Workshops (SPW)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833855\/9833856\/09833863.pdf?arnumber=9833863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T20:02:34Z","timestamp":1660593754000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833863\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/spw54247.2022.9833863","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}