{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T06:35:33Z","timestamp":1777444533031,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Data Transparency Lab"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1526353"],"award-info":[{"award-number":["CNS 1526353"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Amazon AWS Cloud Credits for Research"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978313","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"1388-1401","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":480,"title":["Online Tracking"],"prefix":"10.1145","author":[{"given":"Steven","family":"Englehardt","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, USA"}]},{"given":"Arvind","family":"Narayanan","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"issue":"1","key":"e_1_3_2_1_3_1","first-page":"143","article-title":"Zipf's law and the internet","volume":"3","author":"Adamic L. A.","year":"2002","unstructured":"L. A. Adamic and B. A. Huberman. Zipf's law and the internet. Glottometrics, 3(1):143--150, 2002.","journal-title":"Glottometrics"},{"key":"e_1_3_2_1_4_1","volume-title":"Technology Science","author":"H. C.","year":"2015","unstructured":"H. C. Altaweel I, Good N. Web privacy census. Technology Science, 2015."},{"key":"e_1_3_2_1_5_1","unstructured":"J. Angwin. What they know. The Wall Street Journal. http:\/\/online.wsj.com\/public\/page\/what-they-know-digital-privacy.html 2012."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1898390"},{"key":"e_1_3_2_1_7_1","volume-title":"Dec.","author":"Black P. E.","year":"2004","unstructured":"P. E. Black. Ratcliff\/Obershelp pattern recognition. http:\/\/xlinux.nist.gov\/dads\/HTML\/ratcliffObershelp.html, Dec. 2004."},{"key":"e_1_3_2_1_8_1","unstructured":"Bugzilla. WebRTC Internal IP Address Leakage. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=959893."},{"key":"e_1_3_2_1_9_1","volume-title":"Privacy Enhancing Technologies","author":"Datta A.","year":"2015","unstructured":"A. Datta, M. C. Tschantz, et al. Automated experiments on ad privacy settings. Privacy Enhancing Technologies, 2015."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881152"},{"key":"e_1_3_2_1_11_1","unstructured":"Electronic Frontier Foundation. Encrypting the Web. https:\/\/www.eff.org\/encrypt-the-web."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741679"},{"key":"e_1_3_2_1_13_1","unstructured":"Federal Trade Commission. Google will pay$22.5 million to settle FTC charges it misrepresented privacy assurances to users of Apple's Safari internet browser. https:\/\/www.ftc.gov\/news-events\/press-releases\/2012\/08\/google-will-pay-225-million-settle-ftc-charges-it-misrepresented 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_7"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of W2SP.","author":"Fruchter N.","year":"2015","unstructured":"N. Fruchter, H. Miao, et al. Variations in tracking in relation to geographic location. In Proceedings of W2SP. 2015."},{"key":"e_1_3_2_1_16_1","volume-title":"Web privacy census. Available at SSRN 2460547","author":"Hoofnagle C. J.","year":"2012","unstructured":"C. J. Hoofnagle and N. Good. Web privacy census. Available at SSRN 2460547, 2012."},{"key":"e_1_3_2_1_17_1","volume-title":"NDSS '15: The 2015 Network and Distributed System Security Symposium.","author":"Kranch M.","year":"2015","unstructured":"M. Kranch and J. Bonneau. Upgrading HTTPS in midair: HSTS and key pinning in practice. In NDSS '15: The 2015 Network and Distributed System Security Symposium. February 2015."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.009"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526782"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671229"},{"issue":"0","key":"e_1_3_2_1_22_1","first-page":"1932","article-title":"Exposing the invisible web: An analysis of third-party http requests on 1 million websites","volume":"9","author":"Libert T.","year":"2015","unstructured":"T. Libert. Exposing the invisible web: An analysis of third-party http requests on 1 million websites. International Journal of Communication, 9(0), 2015. ISSN 1932--8036.","journal-title":"International Journal of Communication"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"e_1_3_2_1_24_1","first-page":"7","article-title":"Survey of the use of Adobe Flash Local Shared Objects to respawn HTTP cookies, a","author":"McDonald A. M.","year":"2011","unstructured":"A. M. McDonald and L. F. Cranor. Survey of the use of Adobe Flash Local Shared Objects to respawn HTTP cookies, a. ISJLP, 7, 2011.","journal-title":"ISJLP"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of W2SP","author":"Mowery K.","year":"2012","unstructured":"K. Mowery and H. Shacham. Pixel perfect: Fingerprinting canvas in html5. Proceedings of W2SP, 2012."},{"key":"e_1_3_2_1_26_1","unstructured":"Mozilla Developer Network. Mixed content - Security. https:\/\/developer.mozilla.org\/en-US\/docs\/Security\/Mixed_content."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813656"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382274"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2011.28"},{"key":"e_1_3_2_1_31_1","unstructured":"L. Olejnik G. Acar et al. The leaking battery. Cryptology ePrint Archive Report 2015\/616 2015."},{"key":"e_1_3_2_1_32_1","unstructured":"Phantom JS. Supported web standards. http:\/\/www.webcitation.org\/6hI3iptm5 2016."},{"key":"e_1_3_2_1_33_1","volume-title":"Network and Distributed System Security (NDSS).","author":"Rafique M. Z.","year":"2016","unstructured":"M. Z. Rafique, T. Van Goethem, et al. It's free for a reason: Exploring the ecosystem of free live streaming services. In Network and Distributed System Security (NDSS). 2016."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660460.2660471"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228315"},{"key":"e_1_3_2_1_36_1","volume-title":"On the ubiquity of web tracking: Insights from a billion-page web crawl. arXiv preprint arXiv:1607.07403","author":"Schelter S.","year":"2016","unstructured":"S. Schelter and J. Kunegis. On the ubiquity of web tracking: Insights from a billion-page web crawl. arXiv preprint arXiv:1607.07403, 2016."},{"key":"e_1_3_2_1_37_1","volume-title":"Selenium faq. https:\/\/code.google.com\/p\/selenium\/wiki\/FrequentlyAskedQuestions","author":"Automation Selenium Browser","year":"2014","unstructured":"Selenium Browser Automation. Selenium faq. https:\/\/code.google.com\/p\/selenium\/wiki\/FrequentlyAskedQuestions, 2014."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.35"},{"key":"e_1_3_2_1_39_1","volume-title":"AAAI Spring Symposium: Intelligent Information Privacy Management.","author":"Soltani A.","year":"2010","unstructured":"A. Soltani, S. Canty, et al. Flash cookies and privacy. In AAAI Spring Symposium: Intelligent Information Privacy Management. 2010."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2882992"},{"key":"e_1_3_2_1_41_1","volume-title":"We're Going HTTPS: Here's How WIRED Is Tackling a Huge Security Upgrade. https:\/\/www.wired.com\/2016\/04\/wired-launching-https-security-upgrade\/","author":"Tollman Z.","year":"2016","unstructured":"Z. Tollman. We're Going HTTPS: Here's How WIRED Is Tackling a Huge Security Upgrade. https:\/\/www.wired.com\/2016\/04\/wired-launching-https-security-upgrade\/, 2016."},{"key":"e_1_3_2_1_42_1","unstructured":"J. Uberti. New proposal for IP address handling in WebRTC. https:\/\/www.ietf.org\/mail-archive\/web\/rtcweb\/current\/msg14494.html."},{"key":"e_1_3_2_1_43_1","unstructured":"J. Uberti and G. wei Shieh. WebRTC IP Address Handling Recommendations. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-rtcweb-ip-handling\/."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699118"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414462"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660279"},{"key":"e_1_3_2_1_47_1","volume-title":"Moving the Washington Post to HTTPS. https:\/\/developer.washingtonpost.com\/pb\/blog\/post\/2015\/12\/10\/moving-the-washington-post-to-https\/","author":"Wazer W. V.","year":"2015","unstructured":"W. V. Wazer. Moving the Washington Post to HTTPS. https:\/\/developer.washingtonpost.com\/pb\/blog\/post\/2015\/12\/10\/moving-the-washington-post-to-https\/, 2015."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741630"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2460383.2460386"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663719"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978313","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978313","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:24:48Z","timestamp":1763457888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978313"}},"subtitle":["A 1-million-site Measurement and Analysis"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":50,"alternative-id":["10.1145\/2976749.2978313","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978313","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}