{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:17:56Z","timestamp":1774023476906,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T00:00:00Z","timestamp":1524441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Marie SkBodowska-Curie Actions - European Commission","award":["690972"],"award-info":[{"award-number":["690972"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,23]]},"DOI":"10.1145\/3193111.3193117","type":"proceedings-article","created":{"date-parts":[[2018,3,28]],"date-time":"2018-03-28T12:19:35Z","timestamp":1522239575000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Exclusive"],"prefix":"10.1145","author":[{"given":"Panagiotis","family":"Papadopoulos","sequence":"first","affiliation":[{"name":"FORTH-ICS, Greece"}]},{"given":"Nicolas","family":"Kourtellis","sequence":"additional","affiliation":[{"name":"Telefonica Research, Spain"}]},{"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[{"name":"FORTH-ICS, Greece"}]}],"member":"320","published-online":{"date-parts":[[2018,4,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_2_1","volume-title":"The value of behavioral targeting. https:\/\/www.networkadvertising.org\/pdfs\/Beales_NAI_Study.pdf","author":"Beales Howard","year":"2010","unstructured":"Howard Beales . The value of behavioral targeting. https:\/\/www.networkadvertising.org\/pdfs\/Beales_NAI_Study.pdf , 2010 . Howard Beales. The value of behavioral targeting. https:\/\/www.networkadvertising.org\/pdfs\/Beales_NAI_Study.pdf, 2010."},{"key":"e_1_3_2_1_3_1","volume-title":"We get audience data at virtually no cost: Confessions of a programmatic ad buyer. https:\/\/digiday.com\/marketing\/get-audience-data-virtually-no-cost-confessions-programmatic-ad-buyer\/","author":"Benes Ross","year":"2018","unstructured":"Ross Benes . We get audience data at virtually no cost: Confessions of a programmatic ad buyer. https:\/\/digiday.com\/marketing\/get-audience-data-virtually-no-cost-confessions-programmatic-ad-buyer\/ , 2018 . Ross Benes. We get audience data at virtually no cost: Confessions of a programmatic ad buyer. https:\/\/digiday.com\/marketing\/get-audience-data-virtually-no-cost-confessions-programmatic-ad-buyer\/, 2018."},{"key":"e_1_3_2_1_4_1","unstructured":"Josh Bernoff. Turns out consumers really do care about the data you're collecting. http:\/\/adage.com\/article\/digitalnext\/turns-consumers-care-data-collecting\/232331\/ 2012.  Josh Bernoff. Turns out consumers really do care about the data you're collecting. http:\/\/adage.com\/article\/digitalnext\/turns-consumers-care-data-collecting\/232331\/ 2012."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.14"},{"key":"e_1_3_2_1_6_1","volume-title":"Brave: A browser with your interests at heart. https:\/\/brave.com\/","author":"Brave Software Inc.","year":"2018","unstructured":"Brave Software Inc. Brave: A browser with your interests at heart. https:\/\/brave.com\/ , 2018 . Brave Software Inc. Brave: A browser with your interests at heart. https:\/\/brave.com\/, 2018."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2905760.2905767"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057065"},{"key":"e_1_3_2_1_9_1","volume-title":"Data brokers and your privacy. https:\/\/www.privacyrights.org\/content\/data-brokers-and-your-privacy","author":"Clearinghouse Privacy Rights","year":"2016","unstructured":"Privacy Rights Clearinghouse . Data brokers and your privacy. https:\/\/www.privacyrights.org\/content\/data-brokers-and-your-privacy , 2016 . Privacy Rights Clearinghouse. Data brokers and your privacy. https:\/\/www.privacyrights.org\/content\/data-brokers-and-your-privacy, 2016."},{"key":"e_1_3_2_1_10_1","volume-title":"Cliqz: The no-compromise browser. https:\/\/cliqz.com\/en\/","author":"Cliqz","year":"2018","unstructured":"Cliqz GmbH. Cliqz: The no-compromise browser. https:\/\/cliqz.com\/en\/ , 2018 . Cliqz GmbH. Cliqz: The no-compromise browser. https:\/\/cliqz.com\/en\/, 2018."},{"key":"e_1_3_2_1_11_1","volume-title":"Mixed content weakens https.https:\/\/developers.google.com\/web\/fundamentals\/security\/prevent-mixed-content\/what-is-mixed-content","author":"van Bergen Jo","year":"2017","unstructured":"Jo el van Bergen . Mixed content weakens https.https:\/\/developers.google.com\/web\/fundamentals\/security\/prevent-mixed-content\/what-is-mixed-content , 2017 . Jo el van Bergen. Mixed content weakens https.https:\/\/developers.google.com\/web\/fundamentals\/security\/prevent-mixed-content\/what-is-mixed-content, 2017."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_13_1","volume-title":"Half the Web Is Now Encrypted. That Makes Everyone Safer. https:\/\/www.wired.com\/2017\/01\/half-web-now-encrypted-makes-everyone-safer\/","author":"Finley Klint","year":"2017","unstructured":"Klint Finley . Half the Web Is Now Encrypted. That Makes Everyone Safer. https:\/\/www.wired.com\/2017\/01\/half-web-now-encrypted-makes-everyone-safer\/ , 2017 . Klint Finley. Half the Web Is Now Encrypted. That Makes Everyone Safer. https:\/\/www.wired.com\/2017\/01\/half-web-now-encrypted-makes-everyone-safer\/, 2017."},{"key":"e_1_3_2_1_14_1","volume-title":"The senate prepares to send internet privacy down a black hole. https:\/\/www.wired.com\/2017\/03\/senate-prepares-send-internet-privacy-black-hole\/","author":"Finley Klint","year":"2017","unstructured":"Klint Finley . The senate prepares to send internet privacy down a black hole. https:\/\/www.wired.com\/2017\/03\/senate-prepares-send-internet-privacy-black-hole\/ , 2017 . Klint Finley. The senate prepares to send internet privacy down a black hole. https:\/\/www.wired.com\/2017\/03\/senate-prepares-send-internet-privacy-black-hole\/, 2017."},{"key":"e_1_3_2_1_15_1","volume-title":"Https everywhere. https:\/\/www.eff.org\/https-everywhere","author":"Foundation Electronic Frontier","year":"2018","unstructured":"Electronic Frontier Foundation . Https everywhere. https:\/\/www.eff.org\/https-everywhere , 2018 . Electronic Frontier Foundation. Https everywhere. https:\/\/www.eff.org\/https-everywhere, 2018."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987451"},{"key":"e_1_3_2_1_17_1","unstructured":"Annabelle Green. Customer data collection increased to improve customer experience research finds. https:\/\/business-reporter.co.uk\/2016\/07\/20\/customer-data-collection-increased-improve-customer-experience-research-finds\/ 2016.  Annabelle Green. Customer data collection increased to improve customer experience research finds. https:\/\/business-reporter.co.uk\/2016\/07\/20\/customer-data-collection-increased-improve-customer-experience-research-finds\/ 2016."},{"key":"e_1_3_2_1_18_1","unstructured":"Rainey Reitman Kurt Opsahl. The disconcerting details: How facebook teams up with data brokers to show you targeted ads. https:\/\/www.eff.org\/deeplinks\/2013\/04\/disconcerting-details-how-facebook-teams-data-brokers-show-you-targeted-ads 2013.  Rainey Reitman Kurt Opsahl. The disconcerting details: How facebook teams up with data brokers to show you targeted ads. https:\/\/www.eff.org\/deeplinks\/2013\/04\/disconcerting-details-how-facebook-teams-data-brokers-show-you-targeted-ads 2013."},{"key":"e_1_3_2_1_19_1","volume-title":"Encoding sensitive information in URI's. https:\/\/tools.ietf.org\/html\/rfc2616#section-15.1.3","author":"Leach Paul J","year":"1999","unstructured":"Paul J Leach , Tim Berners-Lee , Jeffrey C Mogul , Larry Masinter , Roy T Fielding , and James Gettys . Encoding sensitive information in URI's. https:\/\/tools.ietf.org\/html\/rfc2616#section-15.1.3 , 1999 . Paul J Leach, Tim Berners-Lee, Jeffrey C Mogul, Larry Masinter, Roy T Fielding, and James Gettys. Encoding sensitive information in URI's. https:\/\/tools.ietf.org\/html\/rfc2616#section-15.1.3, 1999."},{"key":"e_1_3_2_1_20_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Lerner Adam","year":"2016","unstructured":"Adam Lerner , Anna Kornfeld Simpson , Tadayoshi Kohno , and Franziska Roesner . Internet jones and the raiders of the lost trackers: An archaeological study of web tracking from 1996 to 2016 . In 25th USENIX Security Symposium (USENIX Security 16) , Austin, TX , 2016 . USENIX Association. Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner. Internet jones and the raiders of the lost trackers: An archaeological study of web tracking from 1996 to 2016. In 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, 2016. USENIX Association."},{"key":"e_1_3_2_1_21_1","unstructured":"Brian Morrissey. Forbes starts blocking ad-block users. http:\/\/digiday.com\/publishers\/forbes-ad-blocking\/ 2015.  Brian Morrissey. Forbes starts blocking ad-block users. http:\/\/digiday.com\/publishers\/forbes-ad-blocking\/ 2015."},{"key":"e_1_3_2_1_22_1","volume-title":"They Want Privacy. https:\/\/www.nytimes.com\/2018\/01\/04\/business\/china-alibaba-privacy.html","author":"Mozur Paul","year":"2018","unstructured":"Paul Mozur . Internet Users in China Expect to Be Tracked. Now , They Want Privacy. https:\/\/www.nytimes.com\/2018\/01\/04\/business\/china-alibaba-privacy.html , 2018 . Paul Mozur. Internet Users in China Expect to Be Tracked. Now, They Want Privacy. https:\/\/www.nytimes.com\/2018\/01\/04\/business\/china-alibaba-privacy.html, 2018."},{"key":"e_1_3_2_1_23_1","volume-title":"Web bugs: A study of the presence and growth rate of web bugs on the internet","author":"Murray Brian H","year":"2001","unstructured":"Brian H Murray and James J Cowart . Web bugs: A study of the presence and growth rate of web bugs on the internet . Cyveillance Inc , 2001 . Brian H Murray and James J Cowart. Web bugs: A study of the presence and growth rate of web bugs on the internet. Cyveillance Inc, 2001."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674991"},{"key":"e_1_3_2_1_25_1","unstructured":"Netimperative. Ad-blocking soars 10% in just 3 months. http:\/\/www.netimperative.com\/2016\/01\/ad-blocking-soars-10-in-just-3-months\/.  Netimperative. Ad-blocking soars 10% in just 3 months. http:\/\/www.netimperative.com\/2016\/01\/ad-blocking-soars-10-in-just-3-months\/."},{"key":"e_1_3_2_1_26_1","volume-title":"If you want a vpn to protect your privacy, start here. https:\/\/www.wired.com\/2017\/03\/want-use-vpn-protect-privacy-start\/","author":"Newman Lily Hay","year":"2017","unstructured":"Lily Hay Newman . If you want a vpn to protect your privacy, start here. https:\/\/www.wired.com\/2017\/03\/want-use-vpn-protect-privacy-start\/ , 2017 . Lily Hay Newman. If you want a vpn to protect your privacy, start here. https:\/\/www.wired.com\/2017\/03\/want-use-vpn-protect-privacy-start\/, 2017."},{"key":"e_1_3_2_1_27_1","volume-title":"21st Annual NDSS'14","author":"Olejnik Lukasz","year":"2014","unstructured":"Lukasz Olejnik , Minh-Dung Tran , and Claude Castelluccia . Selling off user privacy at auction . In 21st Annual NDSS'14 , 2014 . Lukasz Olejnik, Minh-Dung Tran, and Claude Castelluccia. Selling off user privacy at auction. In 21st Annual NDSS'14, 2014."},{"key":"e_1_3_2_1_28_1","unstructured":"Opera Software. Free VPN in Opera browser. Surf the web with enhanced privacy. http:\/\/www.opera.com\/computer\/features\/free-vpn 2018.  Opera Software. Free VPN in Opera browser. Surf the web with enhanced privacy. http:\/\/www.opera.com\/computer\/features\/free-vpn 2018."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052691"},{"key":"e_1_3_2_1_30_1","volume-title":"The cost of digital advertisement: Comparing user and advertiser views","author":"Papadopoulos Panagiotis","year":"2018","unstructured":"Panagiotis Papadopoulos , Nicolas Kourtellis , and Evangelos P. Markatos . The cost of digital advertisement: Comparing user and advertiser views , 2018 . Panagiotis Papadopoulos, Nicolas Kourtellis, and Evangelos P. Markatos. The cost of digital advertisement: Comparing user and advertiser views, 2018."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131397"},{"key":"e_1_3_2_1_32_1","volume-title":"How and why you should use a VPN any time you hop on the internet. https:\/\/www.techhive.com\/article\/3158192\/privacy\/howand-whyyou-should-use-a-vpn-any-time-you-hop-on-the-internet.html","author":"Paul Ian","year":"2017","unstructured":"Ian Paul . How and why you should use a VPN any time you hop on the internet. https:\/\/www.techhive.com\/article\/3158192\/privacy\/howand-whyyou-should-use-a-vpn-any-time-you-hop-on-the-internet.html , 2017 . Ian Paul. How and why you should use a VPN any time you hop on the internet. https:\/\/www.techhive.com\/article\/3158192\/privacy\/howand-whyyou-should-use-a-vpn-any-time-you-hop-on-the-internet.html, 2017."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0006"},{"key":"e_1_3_2_1_34_1","volume-title":"STUN IP Address requests for WebRTC. https:\/\/github.com\/diafygi\/webrtc-ips","author":"Roesler Daniel","year":"2015","unstructured":"Daniel Roesler . STUN IP Address requests for WebRTC. https:\/\/github.com\/diafygi\/webrtc-ips , 2015 . Daniel Roesler. STUN IP Address requests for WebRTC. https:\/\/github.com\/diafygi\/webrtc-ips, 2015."},{"key":"e_1_3_2_1_35_1","volume-title":"evercookie - virtually irrevocable persistent cookies","year":"2014","unstructured":"samy.pl. evercookie - virtually irrevocable persistent cookies , 2014 . samy.pl. evercookie - virtually irrevocable persistent cookies, 2014."},{"key":"e_1_3_2_1_36_1","volume-title":"NSA uses Google cookies to pinpoint targets for hacking. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/12\/10\/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking\/","author":"Soltani Ashkan","year":"2013","unstructured":"Ashkan Soltani , Andrea Peterson , and Barton Gellman . NSA uses Google cookies to pinpoint targets for hacking. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/12\/10\/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking\/ , 2013 . Ashkan Soltani, Andrea Peterson, and Barton Gellman. NSA uses Google cookies to pinpoint targets for hacking. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/12\/10\/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking\/, 2013."},{"key":"e_1_3_2_1_37_1","volume-title":"Same origin policy. https:\/\/www.w3.org\/Security\/wiki\/Same_Origin_Policy","author":"World Wide Web Consortium (W3C).","year":"2010","unstructured":"World Wide Web Consortium (W3C). Same origin policy. https:\/\/www.w3.org\/Security\/wiki\/Same_Origin_Policy , 2010 . World Wide Web Consortium (W3C). Same origin policy. https:\/\/www.w3.org\/Security\/wiki\/Same_Origin_Policy, 2010."}],"event":{"name":"EuroSys '18: Thirteenth EuroSys Conference 2018","location":"Porto Portugal","acronym":"EuroSys '18","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 11th European Workshop on Systems Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3193111.3193117","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3193111.3193117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:09Z","timestamp":1750213569000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3193111.3193117"}},"subtitle":["How the (synced) Cookie Monster breached my encrypted VPN session"],"short-title":[],"issued":{"date-parts":[[2018,4,23]]},"references-count":37,"alternative-id":["10.1145\/3193111.3193117","10.1145\/3193111"],"URL":"https:\/\/doi.org\/10.1145\/3193111.3193117","relation":{},"subject":[],"published":{"date-parts":[[2018,4,23]]},"assertion":[{"value":"2018-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}