{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:06:03Z","timestamp":1775815563211,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Office of Naval Research","award":["N00014-17-S-B001"],"award-info":[{"award-number":["N00014-17-S-B001"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1703375"],"award-info":[{"award-number":["1703375"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243823","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1687-1700","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Mystique"],"prefix":"10.1145","author":[{"given":"Quan","family":"Chen","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Alexandros","family":"Kapravelos","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"VEX: Vetting Browser Extensions for Security Vulnerabilities. In USENIX Security Symposium","volume":"10","author":"Bandhakavi Sruthi","year":"2010"},{"key":"e_1_3_2_2_2_1","volume-title":"Prateek Saxena, and Aaron Boodman.","author":"Barth Adam","year":"2010"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Lujo Bauer Shaoying Cai Limin Jia Timothy Passaro Michael Stroucken and Yuan Tian. 2015. Run-time Monitoring and Formal Analysis of Information Flows in Chromium.. In NDSS.  Lujo Bauer Shaoying Cai Limin Jia Timothy Passaro Michael Stroucken and Yuan Tian. 2015. Run-time Monitoring and Formal Analysis of Information Flows in Chromium.. In NDSS.","DOI":"10.14722\/ndss.2015.23295"},{"key":"e_1_3_2_2_4_1","unstructured":"Per Nikolaj D Bukh. 1992. The art of computer systems performance analysis techniques for experimental design measurement simulation and modeling.  Per Nikolaj D Bukh. 1992. The art of computer systems performance analysis techniques for experimental design measurement simulation and modeling."},{"key":"e_1_3_2_2_5_1","unstructured":"Catapult Project. 2018. Web Page Replay. https:\/\/github.com\/catapult-project\/catapult\/tree\/master\/web_page_replay_go.  Catapult Project. 2018. Web Page Replay. https:\/\/github.com\/catapult-project\/catapult\/tree\/master\/web_page_replay_go."},{"key":"e_1_3_2_2_6_1","unstructured":"Chrome Web Store. 2018. Web of Trust. https:\/\/chrome.google.com\/webstore\/detail\/wot-web-of-trust-website\/bhmmomiinigofkjcapegjjndpbikblnp?hl=en-US.  Chrome Web Store. 2018. Web of Trust. https:\/\/chrome.google.com\/webstore\/detail\/wot-web-of-trust-website\/bhmmomiinigofkjcapegjjndpbikblnp?hl=en-US."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813684"},{"key":"e_1_3_2_2_8_1","unstructured":"Jay Conrod. 2018. A tour of V8: Crankshaft the optimizing compiler. http:\/\/www.jayconrod.com\/posts\/54\/a-tour-of-v8-crankshaft-the-optimizing-compiler.  Jay Conrod. 2018. A tour of V8: Crankshaft the optimizing compiler. http:\/\/www.jayconrod.com\/posts\/54\/a-tour-of-v8-crankshaft-the-optimizing-compiler."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382275"},{"key":"e_1_3_2_2_10_1","unstructured":"Detectify Labs. 2018. Chrome Extensions - AKA Total Absence of Privacy. https:\/\/labs.detectify.com\/2015\/11\/19\/chrome-extensions-aka-total-absence-of-privacy\/.  Detectify Labs. 2018. Chrome Extensions - AKA Total Absence of Privacy. https:\/\/labs.detectify.com\/2015\/11\/19\/chrome-extensions-aka-total-absence-of-privacy\/."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.43"},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Djeric Vladan","year":"2010"},{"key":"e_1_3_2_2_13_1","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation.","author":"Enck William","year":"2010"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414461"},{"key":"e_1_3_2_2_15_1","unstructured":"Google. 2018. Chrome V8. https:\/\/developers.google.com\/v8\/.  Google. 2018. Chrome V8. https:\/\/developers.google.com\/v8\/."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.36"},{"key":"e_1_3_2_2_17_1","volume-title":"Warning: Your Browser Extensions Are Spying On You. https:\/\/www.howtogeek.com\/180175\/warning-your-browser-extensions-are-spying-on-you\/.","year":"2018"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.50"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866339"},{"key":"e_1_3_2_2_20_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Kapravelos Alexandros","year":"2014"},{"key":"e_1_3_2_2_21_1","unstructured":"Kubernetes. 2018. Production-Grade Container Orchestration. https:\/\/kubernetes.io\/.  Kubernetes. 2018. Production-Grade Container Orchestration. https:\/\/kubernetes.io\/."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516703"},{"key":"e_1_3_2_2_23_1","volume-title":"Recent Advances in Intrusion Detection","author":"Li Zhuowei"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"William Melicher Anupam Das Mahmood Sharif Lujo Bauer and Limin Jia. 2018. Riding out DOMsday: Toward Detecting and Preventing DOM Cross-Site Scripting. (2018).  William Melicher Anupam Das Mahmood Sharif Lujo Bauer and Limin Jia. 2018. Riding out DOMsday: Toward Detecting and Preventing DOM Cross-Site Scripting. (2018).","DOI":"10.14722\/ndss.2018.23309"},{"key":"e_1_3_2_2_25_1","unstructured":"Mozilla. 2018. Modifying a web page. https:\/\/developer.mozilla.org\/en-US\/Add-ons\/WebExtensions\/Modify_a_web_page.  Mozilla. 2018. Modifying a web page. https:\/\/developer.mozilla.org\/en-US\/Add-ons\/WebExtensions\/Modify_a_web_page."},{"key":"e_1_3_2_2_26_1","unstructured":"Mozilla. 2018. SpiderMonkey. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Projects\/SpiderMonkey.  Mozilla. 2018. SpiderMonkey. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Projects\/SpiderMonkey."},{"key":"e_1_3_2_2_27_1","unstructured":"PC Magazine. 2018. 'Web Of Trust' Browser Extension Cannot Be Trusted. http:\/\/www.pcmag.com\/news\/349328\/web-of-trust-browser-extension-cannot-be-trusted.  PC Magazine. 2018. 'Web Of Trust' Browser Extension Cannot Be Trusted. http:\/\/www.pcmag.com\/news\/349328\/web-of-trust-browser-extension-cannot-be-trusted."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.38"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052596"},{"key":"e_1_3_2_2_30_1","unstructured":"StatCounter. 2018. Browser Market Share Worldwide. http:\/\/gs.statcounter.com\/.  StatCounter. 2018. Browser Market Share Worldwide. http:\/\/gs.statcounter.com\/."},{"key":"e_1_3_2_2_31_1","volume-title":"USENIX Security Symposium.","author":"Stock Ben","year":"2014"},{"key":"e_1_3_2_2_32_1","unstructured":"V8 Project. 2018. Launching Ignition and TurboFan. https:\/\/v8project.blogspot.com\/2017\/05\/launching-ignition-and-turbofan.html.  V8 Project. 2018. Launching Ignition and TurboFan. https:\/\/v8project.blogspot.com\/2017\/05\/launching-ignition-and-turbofan.html."},{"key":"e_1_3_2_2_33_1","volume-title":"NDSS","volume":"2007","author":"Vogt Philipp","year":"2007"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33383-5_12"},{"key":"e_1_3_2_2_35_1","unstructured":"WebProNews. 2018. The Chromium-Powered Opera Is Finally Here. https:\/\/www.webpronews.com\/the-chromium-powered-opera-is-finally-here\/.  WebProNews. 2018. The Chromium-Powered Opera Is Finally Here. https:\/\/www.webpronews.com\/the-chromium-powered-opera-is-finally-here\/."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.23"},{"key":"e_1_3_2_2_37_1","unstructured":"Michael Weissbacher. 2018. These Chrome extensions spy on 8 million users. http:\/\/mweissbacher.com\/blog\/2016\/03\/31\/these-chrome-extensions-spy-on-8-million-users\/.  Michael Weissbacher. 2018. These Chrome extensions spy on 8 million users. http:\/\/mweissbacher.com\/blog\/2016\/03\/31\/these-chrome-extensions-spy-on-8-million-users\/."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134632"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243823","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:19Z","timestamp":1750212499000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243823"}},"subtitle":["Uncovering Information Leakage from Browser Extensions"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":38,"alternative-id":["10.1145\/3243734.3243823","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243823","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}