{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:33Z","timestamp":1750306473772,"version":"3.41.0"},"reference-count":14,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2015,9,30]],"date-time":"2015-09-30T00:00:00Z","timestamp":1443571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Narus Fellow Research Program"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2015,9,30]]},"abstract":"<jats:p>Individuals lack proper means to supervise the services they contact and the information they exchange when surfing the web. This security task has become challenging due to the complexity of the modern web, of the data delivering technology, and even to the adoption of encryption, which, while improving privacy, makes in-network services ineffective. The implications are serious, from a person contacting undesired services or unwillingly exposing private information, to a company being unable to control the flow of its information to the outside world. To empower transparency and the capability of taking informed choices in the web, we propose CROWDSURF, a system for comprehensive and collaborative auditing of data exchanged with Internet services. Similarly to crowdsourced efforts, we enable users to contribute in building awareness, supported by the semi-automatic analysis of data offered by a cloud-based system. The result is the creation of \"suggestions\" that individuals can transform in enforceable \"rules\" to customize their web browsing policy. CROWDSURF provides the core infrastructure to let individuals and enterprises regain visibility and control on their web activity. Preliminary results obtained executing a prototype implementation demonstrate the feasibility and potential of CROWDSURF.<\/jats:p>","DOI":"10.1145\/2831347.2831349","type":"journal-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T12:03:14Z","timestamp":1443700994000},"page":"5-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["CrowdSurf"],"prefix":"10.1145","volume":"45","author":[{"given":"Hassan","family":"Metwalley","sequence":"first","affiliation":[{"name":"Politecnico di Torino, Torino, Italy"}]},{"given":"Stefano","family":"Traverso","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Torino, Italy"}]},{"given":"Marco","family":"Mellia","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Torino, Italy"}]},{"given":"Stanislav","family":"Miskovic","sequence":"additional","affiliation":[{"name":"Symantec Corp., Mountain View, CA, USA"}]},{"given":"Mario","family":"Baldi","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Torino, Italy"}]}],"member":"320","published-online":{"date-parts":[[2015,9,30]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674991"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_2_1_3_1","volume-title":"Privacy leakage vs. Protection measures: the growing disconnect,\" in W2SP","author":"Krishnamurthy B.","year":"2011","unstructured":"B. Krishnamurthy , K. Naryshkin , and C. E. Wills , \" Privacy leakage vs. Protection measures: the growing disconnect,\" in W2SP , 2011 . B. Krishnamurthy, K. Naryshkin, and C. E. Wills, \"Privacy leakage vs. Protection measures: the growing disconnect,\" in W2SP, 2011."},{"key":"e_1_2_1_4_1","volume-title":"Host Fingerprinting and Tracking on the Web: Privacy and Security Implications,\" in NDSS","author":"Yen T.-F.","year":"2012","unstructured":"T.-F. Yen , Y. Xie , F. Yu , R. P. Yu , and M. Abadi , \" Host Fingerprinting and Tracking on the Web: Privacy and Security Implications,\" in NDSS , 2012 . T.-F. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi, \"Host Fingerprinting and Tracking on the Web: Privacy and Security Implications,\" in NDSS, 2012."},{"key":"e_1_2_1_5_1","volume-title":"The online tracking horde: a view from passive measurements,\" in TMA","author":"Metwalley H.","year":"2015","unstructured":"H. Metwalley , S. Traverso , M. Mellia , S. Miskovic , and M. Baldi , \" The online tracking horde: a view from passive measurements,\" in TMA , 2015 . H. Metwalley, S. Traverso, M. Mellia, S. Miskovic, and M. Baldi, \"The online tracking horde: a view from passive measurements,\" in TMA, 2015."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868453"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070575"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_2_1_9_1","volume-title":"Feb.","author":"Metwalley H.","year":"2015","unstructured":"H. Metwalley , S. Traverso , M. Mellia , S. Miskovic , and M. Baldi , \" CrowdSurf: Empowering Informed Choices in the Web,\" ArXiv e-prints , Feb. 2015 . H. Metwalley, S. Traverso, M. Mellia, S. Miskovic, and M. Baldi, \"CrowdSurf: Empowering Informed Choices in the Web,\" ArXiv e-prints, Feb. 2015."},{"key":"e_1_2_1_10_1","unstructured":"Hackers steal vast eBay user database including passwords http:\/\/www.bdlive.co.za\/world\/americas\/2014\/05\/23\/hackers-steal-vast-ebay-user-database-including-passwords.  Hackers steal vast eBay user database including passwords http:\/\/www.bdlive.co.za\/world\/americas\/2014\/05\/23\/hackers-steal-vast-ebay-user-database-including-passwords."},{"key":"e_1_2_1_11_1","volume-title":"Unsupervised detection of web trackers,\" in IEEE GLOBECOM","author":"Metwalley H.","year":"2015","unstructured":"H. Metwalley , S. Traverso , and M. Marco , \" Unsupervised detection of web trackers,\" in IEEE GLOBECOM , 2015 . H. Metwalley, S. Traverso, and M. Marco, \"Unsupervised detection of web trackers,\" in IEEE GLOBECOM, 2015."},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"D. J. Newman \"The double dixie cup problem \" American Mathematical Monthly 1960.  D. J. Newman \"The double dixie cup problem \" American Mathematical Monthly 1960.","DOI":"10.2307\/2308930"},{"key":"e_1_2_1_13_1","first-page":"1","volume-title":"Privee: an architecture for automatically analyzing web privacy policies,\" in Proceedings of the 23rd USENIX conference on Security Symposium","author":"Zimmeck S.","year":"2014","unstructured":"S. Zimmeck and S. M. Bellovin , \" Privee: an architecture for automatically analyzing web privacy policies,\" in Proceedings of the 23rd USENIX conference on Security Symposium , pp. 1 -- 16 , USENIX Association , 2014 . S. Zimmeck and S. M. Bellovin, \"Privee: an architecture for automatically analyzing web privacy policies,\" in Proceedings of the 23rd USENIX conference on Security Symposium, pp. 1--16, USENIX Association, 2014."},{"key":"e_1_2_1_14_1","unstructured":"Google Microsoft and Amazon are paying to get around Adblock Plus http:\/\/www.theverge.com\/2015\/2\/2\/7963577\/google-ads-get-through-adblock.  Google Microsoft and Amazon are paying to get around Adblock Plus http:\/\/www.theverge.com\/2015\/2\/2\/7963577\/google-ads-get-through-adblock."}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2831347.2831349","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2831347.2831349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:12Z","timestamp":1750225692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2831347.2831349"}},"subtitle":["Empowering Transparency in the Web"],"short-title":[],"issued":{"date-parts":[[2015,9,30]]},"references-count":14,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,9,30]]}},"alternative-id":["10.1145\/2831347.2831349"],"URL":"https:\/\/doi.org\/10.1145\/2831347.2831349","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2015,9,30]]},"assertion":[{"value":"2015-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}