{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T22:46:35Z","timestamp":1771541195346,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1409738"],"award-info":[{"award-number":["CNS-1409738"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N008448\/1"],"award-info":[{"award-number":["EP\/N008448\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134632","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"590-602","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Ex-Ray"],"prefix":"10.1145","author":[{"given":"Michael","family":"Weissbacher","sequence":"first","affiliation":[{"name":"Northeastern University"}]},{"given":"Enrico","family":"Mariconti","sequence":"additional","affiliation":[{"name":"University College London"}]},{"given":"Guillermo","family":"Suarez-Tangil","sequence":"additional","affiliation":[{"name":"University College London"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"University College London"}]},{"given":"William","family":"Robertson","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Engin","family":"Kirda","sequence":"additional","affiliation":[{"name":"Northeastern University"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_19"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"47","DOI":"10.7551\/mitpress\/3874.003.0008","volume-title":"Beyond concern: Understanding net users' attitudes about online privacy. The Internet upheaval: raising questions, seeking answers in communications policy","author":"Cranor L. F.","year":"2000","unstructured":"L. F. Cranor , J. Reagle , and M. S. Ackerman . Beyond concern: Understanding net users' attitudes about online privacy. The Internet upheaval: raising questions, seeking answers in communications policy , pages 47 -- 70 , 2000 . L. F. Cranor, J. Reagle, and M. S. Ackerman. Beyond concern: Understanding net users' attitudes about online privacy. The Internet upheaval: raising questions, seeking answers in communications policy, pages 47--70, 2000."},{"key":"e_1_3_2_1_3_1","volume-title":"Chrome extensions - aka total absence of privacy. https:\/\/labs.detectify.com\/2015\/ll\/19\/chrome-extensions-aka-total-absence-of-privacy\/","year":"2015","unstructured":"detectify labs. Chrome extensions - aka total absence of privacy. https:\/\/labs.detectify.com\/2015\/ll\/19\/chrome-extensions-aka-total-absence-of-privacy\/ . 2015 . detectify labs. Chrome extensions - aka total absence of privacy. https:\/\/labs.detectify.com\/2015\/ll\/19\/chrome-extensions-aka-total-absence-of-privacy\/. 2015."},{"key":"e_1_3_2_1_4_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Egele M.","year":"2011","unstructured":"M. Egele , C. Kruegel , E. Kirda , and G. Vigna . PiOS: Detecting Privacy Leaks in iOS Applications . In Network and Distributed System Security Symposium (NDSS) , San Diego, CA , 2011 . M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2011."},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX annual technical conference (ATC)","author":"Egele M.","year":"2007","unstructured":"M. Egele , C. Kruegel , E. Kirda , H. Yin , and D. X. Song . Dynamic spyware analysis . In USENIX annual technical conference (ATC) , 2007 . M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. X. Song. Dynamic spyware analysis. In USENIX annual technical conference (ATC), 2007."},{"key":"e_1_3_2_1_6_1","volume-title":"Jan.","author":"Fern\u00e1ndez-Delgado M.","year":"2014","unstructured":"M. Fern\u00e1ndez-Delgado , E. Cernadas , S. Barro , and D. Amorim . Do we need hundreds of classifiers to solve real world classification problems? The Journal of Machine Learning Research (JMLR), 15(1):3133--3181 , Jan. 2014 . M. Fern\u00e1ndez-Delgado, E. Cernadas, S. Barro, and D. Amorim. Do we need hundreds of classifiers to solve real world classification problems? The Journal of Machine Learning Research (JMLR), 15(1):3133--3181, Jan. 2014."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.36"},{"key":"e_1_3_2_1_9_1","volume-title":"Kartause Ittingen. Switzerland","author":"Heule S.","year":"2015","unstructured":"S. Heule , D. Rifkin , A. Russo , and D. Stefan . The most dangerous code in the browser. In USENIX Hot Topics in Operating Systems (HotOS) , Kartause Ittingen. Switzerland , 2015 . S. Heule, D. Rifkin, A. Russo, and D. Stefan. The most dangerous code in the browser. In USENIX Hot Topics in Operating Systems (HotOS), Kartause Ittingen. Switzerland, 2015."},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Security Symposium","author":"Kapravelos A.","year":"2014","unstructured":"A. Kapravelos , C. Grier , N. Chachra , C. Kruegel , G. Vigna , and V. Paxson . Hulk: Eliciting malicious behavior in browser extensions . In USENIX Security Symposium , San Diego, CA , 2014 . A. Kapravelos, C. Grier, N. Chachra, C. Kruegel, G. Vigna, and V. Paxson. Hulk: Eliciting malicious behavior in browser extensions. In USENIX Security Symposium, San Diego, CA, 2014."},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Security Symposium","author":"Lerner A.","year":"2016","unstructured":"A. Lerner , A. K. Simpson , T. Kohno , and F. Roesner . Internet jones and the raiders of the lost trackers: An archaeological study of web tracking from 1996 to 2016 . In USENIX Security Symposium , Austin, TX , 2016 . A. Lerner, A. K. Simpson, T. Kohno, and F. Roesner. Internet jones and the raiders of the lost trackers: An archaeological study of web tracking from 1996 to 2016. In USENIX Security Symposium, Austin, TX, 2016."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.59"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00262950"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_18"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Workshop on Cyber Security Experimentation and Test (CSET)","author":"Mariconti E.","year":"2017","unstructured":"E. Mariconti , J. Onaolapo , G. Ross , and G. Stringhini . The cause of all evils: Assessing causality between user actions and malware activity . In USENIX Workshop on Cyber Security Experimentation and Test (CSET) , 2017 . E. Mariconti, J. Onaolapo, G. Ross, and G. Stringhini. The cause of all evils: Assessing causality between user actions and malware activity. In USENIX Workshop on Cyber Security Experimentation and Test (CSET), 2017."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382274"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39940-9_565"},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Roesner F.","year":"2012","unstructured":"F. Roesner , T. Kohno , and D. Wetherall . Detecting and defending against third-party tracking on the web . In USENIX Symposium on Networked Systems Design and Implementation (NSDI) , San Jose, CA , 2012 . F. Roesner, T. Kohno, and D. Wetherall. Detecting and defending against third-party tracking on the web. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, 2012."},{"key":"e_1_3_2_1_21_1","volume-title":"Linear regression analysis","author":"Seber G. A.","year":"2012","unstructured":"G. A. Seber and A.J. Lee . Linear regression analysis . John Wiley & Sons , 2012 . G. A. Seber and A.J. Lee. Linear regression analysis. John Wiley & Sons, 2012."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:STCO.0000035301.49549.88"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2005.12.002"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052596"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830544"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.17"},{"key":"e_1_3_2_1_27_1","unstructured":"M. Weissbacher. These chrome extensions spy on 8 million users. http:\/\/mweissbacher.com\/blog\/2016\/03\/31\/these-chrome-extensions-spy-on-8-million-users\/ 2016. M. Weissbacher. These chrome extensions spy on 8 million users. http:\/\/mweissbacher.com\/blog\/2016\/03\/31\/these-chrome-extensions-spy-on-8-million-users\/ 2016."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517316"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741630"}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","location":"Orlando FL USA","acronym":"ACSAC 2017"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134632","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134632","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134632"}},"subtitle":["Detection of History-Leaking Browser Extensions"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":29,"alternative-id":["10.1145\/3134600.3134632","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134632","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}