{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:24:21Z","timestamp":1771457061885,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3029806.3029820","type":"proceedings-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T12:34:59Z","timestamp":1490013299000},"page":"329-336","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["Discovering Browser Extensions via Web Accessible Resources"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Sj\u00f6sten","sequence":"first","affiliation":[{"name":"Chalmers University of Technology, Gothenurg, Sweden"}]},{"given":"Steven","family":"Van Acker","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Detecting Chrome Extensions in 2013. http:\/\/gcattani.github.io\/201303\/detecting-chrome-extensions-in-2013\/.  Detecting Chrome Extensions in 2013. http:\/\/gcattani.github.io\/201303\/detecting-chrome-extensions-in-2013\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Detecting Firefox Extensions Without Javascript. http:\/\/kuza55.blogspot.co.uk\/2007\/10\/detecting-firefox-extension-without.html.  Detecting Firefox Extensions Without Javascript. http:\/\/kuza55.blogspot.co.uk\/2007\/10\/detecting-firefox-extension-without.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Detecting FireFox Extentions. http:\/\/ha.ckers.org\/blog\/20060823\/detecting-firefox-extentions\/.  Detecting FireFox Extentions. http:\/\/ha.ckers.org\/blog\/20060823\/detecting-firefox-extentions\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Sparse Bruteforce Addon Detection. http:\/\/www.skeletonscribe.net\/2011\/07\/sparse-bruteforce-addon-scanner.html.  Sparse Bruteforce Addon Detection. http:\/\/www.skeletonscribe.net\/2011\/07\/sparse-bruteforce-addon-scanner.html."},{"key":"e_1_3_2_1_5_1","unstructured":"The Evolution of Chrome Extensions Detection. http:\/\/blog.beefproject.com\/2013\/04\/the-evolution-of-chrome-extensions.html.  The Evolution of Chrome Extensions Detection. http:\/\/blog.beefproject.com\/2013\/04\/the-evolution-of-chrome-extensions.html."},{"key":"e_1_3_2_1_6_1","unstructured":"Yet Another Way to Detect Internet Explorer. http:\/\/ha.ckers.org\/blog\/20060821\/yet-another-way-to-detect-internet-explorer\/.  Yet Another Way to Detect Internet Explorer. http:\/\/ha.ckers.org\/blog\/20060821\/yet-another-way-to-detect-internet-explorer\/."},{"key":"e_1_3_2_1_7_1","volume-title":"XSS-FP: Browser fingerprinting using HTML parser quirks. Technical report","author":"Abgrall E.","year":"2012","unstructured":"E. Abgrall , Y. Traon , M. Monperrus , S. Gombault , M. Heiderich , and A. Ribault . XSS-FP: Browser fingerprinting using HTML parser quirks. Technical report , 2012 . arXiv: 1211.4812 {cs}. E. Abgrall, Y. Traon, M. Monperrus, S. Gombault, M. Heiderich, and A. Ribault. XSS-FP: Browser fingerprinting using HTML parser quirks. Technical report, 2012. arXiv:1211.4812 {cs}."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_10_1","unstructured":"AdBlock. https:\/\/chrome.google.com\/webstore\/detail\/adblock\/gighmmpiobklfepjocnamgkkbiglidom.  AdBlock. https:\/\/chrome.google.com\/webstore\/detail\/adblock\/gighmmpiobklfepjocnamgkkbiglidom."},{"key":"e_1_3_2_1_11_1","unstructured":"V. Allaire. FuckAdBlock. https:\/\/github.com\/sitexw\/FuckAdBlock.  V. Allaire. FuckAdBlock. https:\/\/github.com\/sitexw\/FuckAdBlock."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_1_13_1","unstructured":"clsr. FuckFuckFuckAdBlock. https:\/\/gist.github.com\/clsr\/3f5ca796463a0e6fc8af.  clsr. FuckFuckFuckAdBlock. https:\/\/gist.github.com\/clsr\/3f5ca796463a0e6fc8af."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20810-7_21"},{"key":"e_1_3_2_1_15_1","unstructured":"http:\/\/newsroom.fb.com\/company-info\/#statistics.  http:\/\/newsroom.fb.com\/company-info\/#statistics."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_7"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2014.102"},{"key":"e_1_3_2_1_18_1","unstructured":"Google. Chrome web store. https:\/\/chrome.google.com\/webstore\/category\/extensions?hl=en-GB&_feature=free.  Google. Chrome web store. https:\/\/chrome.google.com\/webstore\/category\/extensions?hl=en-GB&_feature=free."},{"key":"e_1_3_2_1_19_1","unstructured":"Google. chrome.browserAction. https:\/\/developer.chrome.com\/extensions\/browserAction.  Google. chrome.browserAction. https:\/\/developer.chrome.com\/extensions\/browserAction."},{"key":"e_1_3_2_1_20_1","unstructured":"Google. chrome.pageAction. https:\/\/developer.chrome.com\/extensions\/pageAction.  Google. chrome.pageAction. https:\/\/developer.chrome.com\/extensions\/pageAction."},{"key":"e_1_3_2_1_21_1","unstructured":"Google. Content Scripts. https:\/\/developer.chrome.com\/extensions\/content_scripts.  Google. Content Scripts. https:\/\/developer.chrome.com\/extensions\/content_scripts."},{"key":"e_1_3_2_1_22_1","unstructured":"Google. Manifest - Web Accessible Resources. https:\/\/developer.chrome.com\/extensions\/manifest\/web_accessible_resources.  Google. Manifest - Web Accessible Resources. https:\/\/developer.chrome.com\/extensions\/manifest\/web_accessible_resources."},{"key":"e_1_3_2_1_23_1","unstructured":"Google. Manifest File Format. https:\/\/developer.chrome.com\/extensions\/manifest.  Google. Manifest File Format. https:\/\/developer.chrome.com\/extensions\/manifest."},{"key":"e_1_3_2_1_24_1","unstructured":"Google. Message Passing. https:\/\/developer.chrome.com\/extensions\/messaging.  Google. Message Passing. https:\/\/developer.chrome.com\/extensions\/messaging."},{"key":"e_1_3_2_1_25_1","unstructured":"Google. Overview. https:\/\/developer.chrome.com\/extensions\/overview.  Google. Overview. https:\/\/developer.chrome.com\/extensions\/overview."},{"key":"e_1_3_2_1_26_1","unstructured":"Google Cast. https:\/\/chrome.google.com\/webstore\/detail\/google-cast\/boadgeojelhgndaghljhdicfkmllpafd.  Google Cast. https:\/\/chrome.google.com\/webstore\/detail\/google-cast\/boadgeojelhgndaghljhdicfkmllpafd."},{"key":"e_1_3_2_1_27_1","volume-title":"http:\/\/www.cacert.at\/svn\/sourcerer\/CAcert\/SecureClient.pdf","author":"G\u00fchring P.","year":"2006","unstructured":"P. G\u00fchring . Concepts against man-in-the-browser attacks. http:\/\/www.cacert.at\/svn\/sourcerer\/CAcert\/SecureClient.pdf , 2006 . P. G\u00fchring. Concepts against man-in-the-browser attacks. http:\/\/www.cacert.at\/svn\/sourcerer\/CAcert\/SecureClient.pdf, 2006."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_14"},{"key":"e_1_3_2_1_29_1","unstructured":"How to detect Adblock on my website? http:\/\/stackoverflow.com\/questions\/4869154\/how-to-detect-adblock-on-my-website.  How to detect Adblock on my website? http:\/\/stackoverflow.com\/questions\/4869154\/how-to-detect-adblock-on-my-website."},{"key":"e_1_3_2_1_30_1","unstructured":"INRIA. Browser Extension Experiment. https:\/\/extensions.inrialpes.fr.  INRIA. Browser Extension Experiment. https:\/\/extensions.inrialpes.fr."},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Sec.","author":"Jagpal N.","year":"2015","unstructured":"N. Jagpal , E. Dingle , J. Gravel , P. Mavrommatis , N. Provos , M. A. Rajab , and K. Thomas . Trends and lessons from three years fighting malicious extensions . In USENIX Sec. , 2015 . N. Jagpal, E. Dingle, J. Gravel, P. Mavrommatis, N. Provos, M. A. Rajab, and K. Thomas. Trends and lessons from three years fighting malicious extensions. In USENIX Sec., 2015."},{"key":"e_1_3_2_1_32_1","volume-title":"SEAMS","author":"Laperdrix P.","year":"2015","unstructured":"P. Laperdrix , W. Rudametkin , and B. Baudry . Mitigating browser fingerprint tracking: Multi-level reconfiguration and diversification . In SEAMS , 2015 . P. Laperdrix, W. Rudametkin, and B. Baudry. Mitigating browser fingerprint tracking: Multi-level reconfiguration and diversification. In SEAMS, 2015."},{"key":"e_1_3_2_1_33_1","unstructured":"I read that LastPass is vulnerable to phishing attacks - should I be concerned? https:\/\/lastpass.com\/support.php?cmd=showfaq&id=10072.  I read that LastPass is vulnerable to phishing attacks - should I be concerned? https:\/\/lastpass.com\/support.php?cmd=showfaq&id=10072."},{"key":"e_1_3_2_1_34_1","unstructured":"LastPass. https:\/\/lastpass.com\/.  LastPass. https:\/\/lastpass.com\/."},{"key":"e_1_3_2_1_35_1","unstructured":"LostPass. https:\/\/www.seancassidy.me\/lostpass.html.  LostPass. https:\/\/www.seancassidy.me\/lostpass.html."},{"key":"e_1_3_2_1_36_1","unstructured":"L. Masinter. The \"data\" URL scheme. http:\/\/tools.ietf.org\/html\/rfc2397.   L. Masinter. The \"data\" URL scheme. http:\/\/tools.ietf.org\/html\/rfc2397."},{"key":"e_1_3_2_1_37_1","unstructured":"Mechazawa. FuckFuckAdBlock. https:\/\/github.com\/Mechazawa\/FuckFuckAdblock.  Mechazawa. FuckFuckAdBlock. https:\/\/github.com\/Mechazawa\/FuckFuckAdblock."},{"key":"e_1_3_2_1_38_1","volume-title":"W2SP","author":"Mowery K.","year":"2011","unstructured":"K. Mowery , D. Bogenreif , S. Yilek , and H. Shacham . Fingerprinting information in JavaScript implementations . In W2SP , 2011 . K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham. Fingerprinting information in JavaScript implementations. In W2SP, 2011."},{"key":"e_1_3_2_1_39_1","volume-title":"W2SP","author":"Mowery K.","year":"2012","unstructured":"K. Mowery and H. Shacham . Pixel perfect: Fingerprinting canvas in HTML5 . In W2SP , 2012 . K. Mowery and H. Shacham. Pixel perfect: Fingerprinting canvas in HTML5. In W2SP, 2012."},{"key":"e_1_3_2_1_40_1","unstructured":"Mozilla. Chrome registration. https:\/\/developer.mozilla.org\/en-US\/docs\/Chrome_Registration.  Mozilla. Chrome registration. https:\/\/developer.mozilla.org\/en-US\/docs\/Chrome_Registration."},{"key":"e_1_3_2_1_41_1","unstructured":"Mozilla. Communicating using \"port\". https:\/\/developer.mozilla.org\/en-US\/Add-ons\/SDK\/Guides\/Content_Scripts\/using_port.  Mozilla. Communicating using \"port\". https:\/\/developer.mozilla.org\/en-US\/Add-ons\/SDK\/Guides\/Content_Scripts\/using_port."},{"key":"e_1_3_2_1_42_1","unstructured":"Mozilla. Communicating using \"postmessage\". https:\/\/developer.mozilla.org\/en-US\/Add-ons\/SDK\/Guides\/Content_Scripts\/using_postMessage.  Mozilla. Communicating using \"postmessage\". https:\/\/developer.mozilla.org\/en-US\/Add-ons\/SDK\/Guides\/Content_Scripts\/using_postMessage."},{"key":"e_1_3_2_1_43_1","unstructured":"Mozilla. Manifest Files. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Tech\/XUL\/Tutorial\/Manifest_Files.  Mozilla. Manifest Files. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Tech\/XUL\/Tutorial\/Manifest_Files."},{"key":"e_1_3_2_1_44_1","unstructured":"Mozilla. Most Popular Extensions. https:\/\/addons.mozilla.org\/en-US\/firefox\/extensions\/'sort=users.  Mozilla. Most Popular Extensions. https:\/\/addons.mozilla.org\/en-US\/firefox\/extensions\/'sort=users."},{"key":"e_1_3_2_1_45_1","unstructured":"Mozilla. options\\_ui. https:\/\/developer.mozilla.org\/en-US\/Add-ons\/WebExtensions\/manifest.json\/options_ui.  Mozilla. options\\_ui. https:\/\/developer.mozilla.org\/en-US\/Add-ons\/WebExtensions\/manifest.json\/options_ui."},{"key":"e_1_3_2_1_46_1","unstructured":"Mozilla. Porting a Google Chrome extension. https:\/\/developer.mozilla.org\/en-US\/Add-ons\/WebExtensions\/Porting_a_Google_Chrome_extension.  Mozilla. Porting a Google Chrome extension. https:\/\/developer.mozilla.org\/en-US\/Add-ons\/WebExtensions\/Porting_a_Google_Chrome_extension."},{"key":"e_1_3_2_1_47_1","unstructured":"Mozilla. web_accessible_resources. https:\/\/developer.mozilla.org\/en-US\/Add-ons\/WebExtensions\/manifest.json\/web_accessible_resources.  Mozilla. web_accessible_resources. https:\/\/developer.mozilla.org\/en-US\/Add-ons\/WebExtensions\/manifest.json\/web_accessible_resources."},{"key":"e_1_3_2_1_48_1","unstructured":"Mozilla. WebExtensions. https:\/\/developer.mozilla.org\/en-US\/Add-ons\/WebExtensions.  Mozilla. WebExtensions. https:\/\/developer.mozilla.org\/en-US\/Add-ons\/WebExtensions."},{"key":"e_1_3_2_1_49_1","unstructured":"Mozilla. XUL Overlays. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Tech\/XUL\/Overlays.  Mozilla. XUL Overlays. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Tech\/XUL\/Overlays."},{"key":"e_1_3_2_1_50_1","volume-title":"W2SP","author":"Mulazzani M.","year":"2013","unstructured":"M. Mulazzani , P. Reschl , M. Huber , M. Leithner , S. Schrittwieser , E. Weippl , and F. Wien . Fast and reliable browser identification with JavaScript engine fingerprinting . In W2SP , 2013 . M. Mulazzani, P. Reschl, M. Huber, M. Leithner, S. Schrittwieser, E. Weippl, and F. Wien. Fast and reliable browser identification with JavaScript engine fingerprinting. In W2SP, 2013."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741090"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_53_1","volume-title":"HotPETs","author":"Olejnik L.","year":"2012","unstructured":"L. Olejnik , C. Castelluccia , and A. Janc . Why johnny can't browse in peace: On the uniqueness of web browsing history patterns . In HotPETs , 2012 . L. Olejnik, C. Castelluccia, and A. Janc. Why johnny can't browse in peace: On the uniqueness of web browsing history patterns. In HotPETs, 2012."},{"key":"e_1_3_2_1_54_1","unstructured":"Panopticlick. https:\/\/panopticlick.eff.org\/.  Panopticlick. https:\/\/panopticlick.eff.org\/."},{"key":"e_1_3_2_1_55_1","unstructured":"A. Sj\u00f6sten S. Van Acker and A. Sabelfeld. Discovering Browser Extensions via Web Accessible Resources. Full version and code. http:\/\/www.cse.chalmers.se\/research\/group\/security\/extensions.  A. Sj\u00f6sten S. Van Acker and A. Sabelfeld. Discovering Browser Extensions via Web Accessible Resources. Full version and code. http:\/\/www.cse.chalmers.se\/research\/group\/security\/extensions."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.17"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_1"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2015.7266460"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2701126.2701210"}],"event":{"name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","location":"Scottsdale Arizona USA","acronym":"CODASPY '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029806.3029820","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3029806.3029820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:29Z","timestamp":1750218629000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029806.3029820"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":59,"alternative-id":["10.1145\/3029806.3029820","10.1145\/3029806"],"URL":"https:\/\/doi.org\/10.1145\/3029806.3029820","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}