{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:14:48Z","timestamp":1750997688020,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1463968"],"award-info":[{"award-number":["CNS-1463968"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3139550.3139567","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"153-164","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Exploring ADINT"],"prefix":"10.1145","author":[{"given":"Paul","family":"Vines","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Franziska","family":"Roesner","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Tadayoshi","family":"Kohno","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_2_1","unstructured":"Rebecca Balebako Pedro Leon Richard Shay Blase Ur Yang Wang and L. Cranor. 2012. Measuring the effectiveness of privacy tools for limiting behavioral advertising Web 2.0 Security and Privacy. Rebecca Balebako Pedro Leon Richard Shay Blase Ur Yang Wang and L. Cranor. 2012. Measuring the effectiveness of privacy tools for limiting behavioral advertising Web 2.0 Security and Privacy."},{"key":"e_1_3_2_1_3_1","unstructured":"Hal Berghel. 2001. Caustic Cookies. (2001). http:\/\/www.berghel.net\/col-edit\/digital_village\/apr-01\/dv_4-01.pdf. Hal Berghel. 2001. Caustic Cookies. (2001). http:\/\/www.berghel.net\/col-edit\/digital_village\/apr-01\/dv_4-01.pdf."},{"key":"e_1_3_2_1_4_1","unstructured":"Interactive Advertising Bureau. 2015. IAB Tech Lab Content Taxonomy. (2015). https:\/\/www.iab.com\/guidelines\/iab-quality-assurance-guidelines-qag-taxonomy\/. Interactive Advertising Bureau. 2015. IAB Tech Lab Content Taxonomy. (2015). https:\/\/www.iab.com\/guidelines\/iab-quality-assurance-guidelines-qag-taxonomy\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Interactive Advertising Bureau. 2017. IAB Interactive Advertising Wiki. (2017). https:\/\/wiki.iab.com\/index.php\/Category:Glossary. Interactive Advertising Bureau. 2017. IAB Interactive Advertising Wiki. (2017). https:\/\/wiki.iab.com\/index.php\/Category:Glossary."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2456411.2456478"},{"key":"e_1_3_2_1_7_1","first-page":"47","article-title":"Perspectives on Intelligence Collection. The intelligencer","volume":"20","author":"Clark Robert M.","year":"2013","unstructured":"Robert M. Clark . 2013 . Perspectives on Intelligence Collection. The intelligencer . Journal of US Intelligence Studies , Vol. 20 , 2 (2013), 47 -- 53 . Robert M. Clark. 2013. Perspectives on Intelligence Collection. The intelligencer. Journal of US Intelligence Studies, Vol. 20, 2 (2013), 47--53.","journal-title":"Journal of US Intelligence Studies"},{"key":"e_1_3_2_1_8_1","volume-title":"We kill people based on metadata","author":"Cole David","year":"2014","unstructured":"David Cole . 2014. We kill people based on metadata . The New York Review of Books Vol . 10 ( 2014 ), 2014. David Cole. 2014. We kill people based on metadata. The New York Review of Books Vol. 10 (2014), 2014."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594391"},{"key":"e_1_3_2_1_10_1","unstructured":"Doug DePerry Tom Ritter and Andrew Rahimi. 2013. Cloning with a Compromised CDMA Femtocell. (2013). https:\/\/www.defcon.org\/images\/defcon-21\/dc-21-presentations\/DePerry-Ritter\/DEFCON-21-DePerry-Ritter-Femtocell-Updated.pdf. Doug DePerry Tom Ritter and Andrew Rahimi. 2013. Cloning with a Compromised CDMA Femtocell. (2013). https:\/\/www.defcon.org\/images\/defcon-21\/dc-21-presentations\/DePerry-Ritter\/DEFCON-21-DePerry-Ritter-Femtocell-Updated.pdf."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/developers.google.com\/ads\/","author":"Developers Google","year":"2017","unstructured":"Google Developers . 2017. Google Ads . ( 2017 ). https:\/\/developers.google.com\/ads\/ . Google Developers. 2017. Google Ads. (2017). https:\/\/developers.google.com\/ads\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Steven Englehardt and Arvind Narayanan. 2016. Online tracking: A 1-million-site measurement and analysis Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM 1388--1401. Steven Englehardt and Arvind Narayanan. 2016. Online tracking: A 1-million-site measurement and analysis Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM 1388--1401.","DOI":"10.1145\/2976749.2978313"},{"volume-title":"Cookies that give you away: The surveillance implications of web tracking Proceedings of the 24th International Conference on World Wide Web. ACM, 289--299","author":"Englehardt Steven","key":"e_1_3_2_1_13_1","unstructured":"Steven Englehardt , Dillon Reisman , Christian Eubank , Peter Zimmerman , Jonathan Mayer , Arvind Narayanan , and Edward W Felten . 2015. Cookies that give you away: The surveillance implications of web tracking Proceedings of the 24th International Conference on World Wide Web. ACM, 289--299 . Steven Englehardt, Dillon Reisman, Christian Eubank, Peter Zimmerman, Jonathan Mayer, Arvind Narayanan, and Edward W Felten. 2015. Cookies that give you away: The surveillance implications of web tracking Proceedings of the 24th International Conference on World Wide Web. ACM, 289--299."},{"volume-title":"https:\/\/www.go2mobi.com","year":"2017","key":"e_1_3_2_1_14_1","unstructured":"Go2mobi 2017. ( 2017 ). https:\/\/www.go2mobi.com . Go2mobi 2017. (2017). https:\/\/www.go2mobi.com."},{"key":"e_1_3_2_1_15_1","volume-title":"2010 IEEE International Conference on. IEEE, 474--482","author":"Korolova Aleksandra","year":"2010","unstructured":"Aleksandra Korolova . 2010 . Privacy violations using microtargeted ads: A case study Data Mining Workshops (ICDMW) , 2010 IEEE International Conference on. IEEE, 474--482 . Aleksandra Korolova. 2010. Privacy violations using microtargeted ads: A case study Data Mining Workshops (ICDMW), 2010 IEEE International Conference on. IEEE, 474--482."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Zhou Li Kehuan Zhang Yinglian Xie Fang Yu and XiaoFeng Wang. 2012. Knowing your enemy: understanding and detecting malicious web advertising Proceedings of the 2012 ACM conference on Computer and communications security. ACM 674--686. Zhou Li Kehuan Zhang Yinglian Xie Fang Yu and XiaoFeng Wang. 2012. Knowing your enemy: understanding and detecting malicious web advertising Proceedings of the 2012 ACM conference on Computer and communications security. ACM 674--686.","DOI":"10.1145\/2382196.2382267"},{"key":"e_1_3_2_1_17_1","unstructured":"Nicolas Lidzborski. 2014. Staying at the forefront of email security and reliability: HTTPS-only and 99.978 percent availability. (2014). https:\/\/googleblog.blogspot.co.uk\/2014\/03\/staying-at-forefront-of-email-security.html. Nicolas Lidzborski. 2014. Staying at the forefront of email security and reliability: HTTPS-only and 99.978 percent availability. (2014). https:\/\/googleblog.blogspot.co.uk\/2014\/03\/staying-at-forefront-of-email-security.html."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(15)30098-2"},{"key":"e_1_3_2_1_19_1","unstructured":"Jeffrey Meisner. 2014. Advancing our encryption and transparency efforts. (2014). https:\/\/blogs.technet.microsoft.com\/microsoft_on_the_issues\/2014\/07\/01\/advancing-our-encryption-and-transparency-efforts\/. Jeffrey Meisner. 2014. Advancing our encryption and transparency efforts. (2014). https:\/\/blogs.technet.microsoft.com\/microsoft_on_the_issues\/2014\/07\/01\/advancing-our-encryption-and-transparency-efforts\/."},{"key":"e_1_3_2_1_20_1","volume-title":"Could using gay dating app Grindr get you arrested in Egypt?","author":"Noack Rick","year":"2014","unstructured":"Rick Noack . 2014. Could using gay dating app Grindr get you arrested in Egypt? ( 2014 ). https:\/\/www.washingtonpost.com\/news\/worldviews\/wp\/2014\/09\/12\/could-using-gay-dating-app-grindr-get-you-arrested-in-egypt\/. Rick Noack. 2014. Could using gay dating app Grindr get you arrested in Egypt? (2014). https:\/\/www.washingtonpost.com\/news\/worldviews\/wp\/2014\/09\/12\/could-using-gay-dating-app-grindr-get-you-arrested-in-egypt\/."},{"key":"e_1_3_2_1_21_1","volume-title":"Detecting and Defending Against Third-Party Tracking on the Web USENIX Symposium on Networked Systems Design and Implementation.","author":"Roesner Franziska","year":"2012","unstructured":"Franziska Roesner , Tadayoshi Kohno , and David Wetherall . 2012 . Detecting and Defending Against Third-Party Tracking on the Web USENIX Symposium on Networked Systems Design and Implementation. Franziska Roesner, Tadayoshi Kohno, and David Wetherall. 2012. Detecting and Defending Against Third-Party Tracking on the Web USENIX Symposium on Networked Systems Design and Implementation."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23407"},{"key":"e_1_3_2_1_23_1","unstructured":"Mark Joseph Stern. 2016. This Daily Beast Grindr Stunt Is Sleazy Dangerous and Wildly Unethical. (2016). http:\/\/www.slate.com\/blogs\/future_tense\/2016\/08\/11\/the_daily_beast_s_olympics_grindr_stunt_is_dangerous_and_unethical.html. Mark Joseph Stern. 2016. This Daily Beast Grindr Stunt Is Sleazy Dangerous and Wildly Unethical. (2016). http:\/\/www.slate.com\/blogs\/future_tense\/2016\/08\/11\/the_daily_beast_s_olympics_grindr_stunt_is_dangerous_and_unethical.html."},{"key":"e_1_3_2_1_24_1","unstructured":"Ryan Stevens Clint Gibler Jon Crussell Jeremy Erickson and Hao Chen. 2012. Investigating user privacy in android ad libraries Workshop on Mobile Security Technologies (MoST). 10. Ryan Stevens Clint Gibler Jon Crussell Jeremy Erickson and Hao Chen. 2012. Investigating user privacy in android ad libraries Workshop on Mobile Security Technologies (MoST). 10."},{"key":"e_1_3_2_1_25_1","unstructured":"Ratko Vidakovic. 2013. The Mechanics Of Real-Time Bidding. (2013). http:\/\/marketingland.com\/the-mechanics-of-real-time-bidding-31622. Ratko Vidakovic. 2013. The Mechanics Of Real-Time Bidding. (2013). http:\/\/marketingland.com\/the-mechanics-of-real-time-bidding-31622."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381969"},{"key":"e_1_3_2_1_27_1","volume-title":"Miller","author":"Yeh Tom","year":"2009","unstructured":"Tom Yeh , Tsung-Hsiang Chang , and Robert C . Miller . 2009 . Sikuli: using GUI screenshots for search and automation Proceedings of the 22nd annual ACM symposium on User interface software and technology. ACM , 183--192. Tom Yeh, Tsung-Hsiang Chang, and Robert C. Miller. 2009. Sikuli: using GUI screenshots for search and automation Proceedings of the 22nd annual ACM symposium on User interface software and technology. ACM, 183--192."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Apostolis Zarras Alexandros Kapravelos Gianluca Stringhini Thorsten Holz Christopher Kruegel and Giovanni Vigna. 2014. The dark alleys of madison avenue: Understanding malicious advertisements Proceedings of the 2014 Conference on Internet Measurement Conference. ACM 373--380. Apostolis Zarras Alexandros Kapravelos Gianluca Stringhini Thorsten Holz Christopher Kruegel and Giovanni Vigna. 2014. The dark alleys of madison avenue: Understanding malicious advertisements Proceedings of the 2014 Conference on Internet Measurement Conference. ACM 373--380.","DOI":"10.1145\/2663716.2663719"},{"key":"e_1_3_2_1_29_1","volume-title":"2013 Sixth International Symposium on","volume":"2","author":"Zhang Tiliang","year":"2013","unstructured":"Tiliang Zhang , Hua Zhang , and Fei Gao . 2013 . A Malicious Advertising Detection Scheme Based on the Depth of URL Strategy Computational Intelligence and Design (ISCID) , 2013 Sixth International Symposium on , Vol. Vol. 2 . IEEE, 57--60. Tiliang Zhang, Hua Zhang, and Fei Gao. 2013. A Malicious Advertising Detection Scheme Based on the Depth of URL Strategy Computational Intelligence and Design (ISCID), 2013 Sixth International Symposium on, Vol. Vol. 2. IEEE, 57--60."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 on Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139550.3139567","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139550.3139567","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139550.3139567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T20:20:21Z","timestamp":1750969221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139550.3139567"}},"subtitle":["Using Ad Targeting for Surveillance on a Budget - or - How Alice Can Buy Ads to Track Bob"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":29,"alternative-id":["10.1145\/3139550.3139567","10.1145\/3139550"],"URL":"https:\/\/doi.org\/10.1145\/3139550.3139567","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}