{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:35:51Z","timestamp":1763458551813,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T00:00:00Z","timestamp":1476230400000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DHS","award":["N66001-12-C-0133"],"award-info":[{"award-number":["N66001-12-C-0133"]}]},{"name":"United States Air Force","award":["FA8650-10-C-7025"],"award-info":[{"award-number":["FA8650-10-C-7025"]}]},{"name":"ETRI","award":["MSIP\/IITP[B0101-15-0644]"],"award-info":[{"award-number":["MSIP\/IITP[B0101-15-0644]"]}]},{"name":"DARPA","award":["DARPA-15-15-TC-FP- 006"],"award-info":[{"award-number":["DARPA-15-15-TC-FP- 006"]}]},{"name":"NSF","award":["CNS-1017265 CNS-0831300 CNS-1149051 DGE-1500084"],"award-info":[{"award-number":["CNS-1017265 CNS-0831300 CNS-1149051 DGE-1500084"]}]},{"name":"ONR","award":["N000140911042 N000141512162"],"award-info":[{"award-number":["N000140911042 N000141512162"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813716","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T11:22:12Z","timestamp":1444130532000},"page":"438-449","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["UCognito"],"prefix":"10.1145","author":[{"given":"Meng","family":"Xu","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Yeongjin","family":"Jang","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Xinyu","family":"Xing","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Taesoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929828"},{"key":"e_1_3_2_1_2_1","volume-title":"Sept.","author":"Akhgari E.","year":"2008","unstructured":"E. Akhgari and M. Connor. Firefox3.1 \/ PrivateBrowsing \/ FunctionalSpec, Sept. 2008. https:\/\/wiki.mozilla.org\/PrivateBrowsing."},{"key":"e_1_3_2_1_3_1","unstructured":"P. Battre. Chrome \/ Preferences \/ Incognito-Profile May 2015. https:\/\/www.chromium.org\/developers\/design-documents\/preferences#TOC-Incognito-Profile."},{"key":"e_1_3_2_1_4_1","volume-title":"Protecting confidential data on personal computers with storage capsules","author":"Borders K.","year":"2009","unstructured":"K. Borders, E. Vander Weele, B. Lau, and A. Prakash. Protecting confidential data on personal computers with storage capsules. Aug. 2009."},{"key":"e_1_3_2_1_5_1","volume-title":"May","author":"Bremer J.","year":"2012","unstructured":"J. Bremer. Intercepting System Calls on x86_64 Windows, May 2012. http:\/\/jbremer.org\/intercepting-system-calls-on-x86_64-windows\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"e_1_3_2_1_7_1","volume-title":"July","author":"Store Chrome Web","year":"2014","unstructured":"Chrome Web Store. Page Load Time. https:\/\/chrome.google.com\/webstore\/detail\/page-load-time\/fploionmjgeclbkemipmkogoaohcdbig, July 2014. Accessed: 2015-05--16."},{"key":"e_1_3_2_1_8_1","volume-title":"Apr.","author":"Davidov M.","year":"2012","unstructured":"M. Davidov. The Double-edged Sword of HSTS Persistence and Privacy, Apr. 2012. https:\/\/www.leviathansecurity.com\/blog\/the-double-edged-sword-of-hsts-persistence-and-privacy\/."},{"key":"e_1_3_2_1_9_1","unstructured":"W. Drewry. SECure COMPuting with filters Jan. 2012. http:\/\/lwn.net\/Articles\/498231\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.37"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665953"},{"key":"e_1_3_2_1_12_1","volume-title":"May","author":"Google Inc.","year":"2015","unstructured":"Google Inc. Let others browse Chrome as a guest. https:\/\/support.google.com\/chrome\/answer\/6130773?p=ui_guest&rd=1, May 2015. Accessed: 2015-05--16."},{"key":"e_1_3_2_1_13_1","unstructured":"Google Inc. Octane 2.0 JavaScript Benchmark. http:\/\/octane-benchmark.googlecode.com\/svn\/latest\/index.html May 2015. Accessed: 2015-05--15."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831090.2831113"},{"key":"e_1_3_2_1_15_1","volume-title":"W3C","author":"Hickson I.","year":"2013","unstructured":"I. Hickson. Web storage. W3C recommendation, W3C, July 2013. http:\/\/www.w3.org\/TR\/2013\/REC-webstorage-20130730\/."},{"key":"e_1_3_2_1_16_1","volume-title":"Sept.","author":"Kamkar S.","year":"2010","unstructured":"S. Kamkar. evercookie -- never forget. http:\/\/samy.pl\/evercookie\/, Sept. 2010. Accessed: 2015-05-02."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2535461.2535478"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_4"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455526.1455527"},{"key":"e_1_3_2_1_20_1","volume-title":"http:\/\/xmailserver.org\/flcow.html","author":"Libenzi D.","year":"2013","unstructured":"D. Libenzi. FL-COW 0.10. http:\/\/xmailserver.org\/flcow.html. January 2013."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23108"},{"volume-title":"Dec.","year":"2013","key":"e_1_3_2_1_22_1","unstructured":"Mozilla. app.telemetry page speed monitor. https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/apptelemetry\/, Dec. 2013. Accessed: 2015-05--16."},{"volume-title":"Private browsing mode warning doesn't mention that newly-installed client certificates are not cleared when exiting private browsing mode. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=475881","year":"2015","key":"e_1_3_2_1_23_1","unstructured":"Mozilla. Private browsing mode warning doesn't mention that newly-installed client certificates are not cleared when exiting private browsing mode. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=475881, 2015. Accessed: 2015-05-02."},{"key":"e_1_3_2_1_24_1","unstructured":"Mozilla. Kraken JavaScript Benchmark (version 1.1). http:\/\/krakenbenchmark.mozilla.org\/ May 2015. Accessed: 2015-05--15."},{"key":"e_1_3_2_1_25_1","volume-title":"Web 2.0 Workshop on Security and Privacy (W2SP)","author":"Mulazzani M.","year":"2013","unstructured":"M. Mulazzani, P. Reschl, M. Huber, M. Leithner, S. Schrittwieser, E. Weippl, and F. Wien. Fast and reliable browser identification with javascript engine fingerprinting. In Web 2.0 Workshop on Security and Privacy (W2SP), volume 5, 2013."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.24"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23163"},{"key":"e_1_3_2_1_29_1","volume-title":"W3C","author":"Popescu A.","year":"2013","unstructured":"A. Popescu. Geolocation API specification. W3C recommendation, W3C, Oct. 2013. http:\/\/www.w3.org\/TR\/2013\/REC-geolocation-API-20131024\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228315"},{"key":"e_1_3_2_1_31_1","volume-title":"http:\/\/qubes-os.org","author":"Rutkowska J.","year":"2013","unstructured":"J. Rutkowska. Qubes OS. http:\/\/qubes-os.org. January 2013."},{"key":"e_1_3_2_1_32_1","unstructured":"J. Uekawa. Cowdancer: copy-on-write data access completely in userland. http:\/\/www.netfort.gr.jp\/dancer\/software\/cowdancer.html.en. January 2013."},{"key":"e_1_3_2_1_33_1","volume-title":"Aug.","author":"Ulmer H.","year":"2010","unstructured":"H. Ulmer. Understanding private browsing, Aug. 2010.URLhttps:\/\/blog.mozilla.org\/metrics\/2010\/08\/23\/understanding-private-browsing\/."},{"key":"e_1_3_2_1_34_1","first-page":"w3","author":"van Kesteren A.","year":"2013","unstructured":"A. van Kesteren and J. Gregg. Web notifications. Last call WD, W3C, Sept. 2013. http:\/\/www.w3.org\/TR\/2013\/WD-notifications-20130912\/.","journal-title":"Web notifications. Last call WD, W3C"},{"key":"e_1_3_2_1_35_1","volume-title":"Apr.","author":"Villalobos J.","year":"2015","unstructured":"J. Villalobos and K. Maglione. AMO review policies, Apr. 2015. https:\/\/developer.mozilla.org\/en-US\/Add-ons\/AMO\/Policy\/Reviews."},{"key":"e_1_3_2_1_36_1","volume-title":"Apr.","author":"Voung J.","year":"2011","unstructured":"J. Voung. PNaCl Translation Caching: In Javascript or In Browser, Apr. 2011. https:\/\/code.google.com\/p\/nativeclient\/wiki\/PNaClTranslationCache."},{"key":"e_1_3_2_1_37_1","volume-title":"Oct.","author":"Warren T.","year":"2013","unstructured":"T. Warren. Chrome for iOS' incognito mode isn't private, bug reveals, Oct. 2013. http:\/\/www.theverge.com\/2013\/10\/3\/4797968\/chrome-for-ios-incognito-mode-not-private-bug."},{"key":"e_1_3_2_1_38_1","volume-title":"May","author":"JavaScript Benchmark SunSpider","year":"2015","unstructured":"WebKit.org. SunSpider 1.0.2 JavaScript Benchmark. https:\/\/www.webkit.org\/perf\/sunspider\/sunspider.html, May 2015. Accessed: 2015-05--15."}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813716","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813716","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:31:41Z","timestamp":1763458301000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813716"}},"subtitle":["Private Browsing without Tears"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":38,"alternative-id":["10.1145\/2810103.2813716","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813716","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}