{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:36:18Z","timestamp":1771698978296,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1739966"],"award-info":[{"award-number":["1739966"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243860","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1515-1532","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["The Web's Sixth Sense"],"prefix":"10.1145","author":[{"given":"Anupam","family":"Das","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Gunes","family":"Acar","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Nikita","family":"Borisov","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Amogh","family":"Pradeep","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_3_1","unstructured":"Alex Aiken. 2018. A system for detecting software similarity. https:\/\/theory.stanford.edu\/ aiken\/moss\/.  Alex Aiken. 2018. A system for detecting software similarity. https:\/\/theory.stanford.edu\/ aiken\/moss\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991091"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614350"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2396"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11599-3_11"},{"key":"e_1_3_2_1_8_1","volume-title":"Mobile device identification via sensor fingerprinting. CoRR","author":"Bojinov Hristo","year":"2014","unstructured":"Hristo Bojinov , Yan Michalevsky , Gabi Nakibly , and Dan Boneh . 2014. Mobile device identification via sensor fingerprinting. CoRR , Vol. abs\/ 1408 .1416 ( 2014 ). http:\/\/arxiv.org\/abs\/1408.1416 Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, and Dan Boneh. 2014. Mobile device identification via sensor fingerprinting. CoRR, Vol. abs\/1408.1416 (2014). http:\/\/arxiv.org\/abs\/1408.1416"},{"key":"e_1_3_2_1_9_1","unstructured":"David J. Bradshaw. 2017. iFrame resizer. https:\/\/github.com\/davidjbradshaw\/iframe-resizer .  David J. Bradshaw. 2017. iFrame resizer. https:\/\/github.com\/davidjbradshaw\/iframe-resizer ."},{"key":"e_1_3_2_1_10_1","unstructured":"Bugzilla. 2018. 1436874 - Restrict device motion and orientation events to secure contexts. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1436874 .  Bugzilla. 2018. 1436874 - Restrict device motion and orientation events to secure contexts. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1436874 ."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994459.2994467"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_16"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23152"},{"key":"e_1_3_2_1_14_1","unstructured":"Ian Clelland. 2017. Feature policy: Draft community group report. https:\/\/wicg.github.io\/feature-policy\/.  Ian Clelland. 2017. Feature policy: Draft community group report. https:\/\/wicg.github.io\/feature-policy\/."},{"key":"e_1_3_2_1_15_1","volume-title":"A Crawl of the mobile web measuring sensor accesses","author":"Das Anupam","unstructured":"Anupam Das , Gunes Acar , and Nikita Borisov . 2018a. A Crawl of the mobile web measuring sensor accesses . University of Illinois at Urbana-Champaign. Anupam Das, Gunes Acar, and Nikita Borisov. 2018a. A Crawl of the mobile web measuring sensor accesses. University of Illinois at Urbana-Champaign."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660325"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23390"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0005"},{"key":"e_1_3_2_1_19_1","unstructured":"Apple developers. 2018. App store review guidelines. https:\/\/developer.apple.com\/app-store\/review\/guidelines\/.  Apple developers. 2018. App store review guidelines. https:\/\/developer.apple.com\/app-store\/review\/guidelines\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23059"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881152"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_23_1","unstructured":"Alex Gibson. 2015. Detecting shake in mobile device. https:\/\/github.com\/alexgibson\/shake.js\/.  Alex Gibson. 2015. Detecting shake in mobile device. https:\/\/github.com\/alexgibson\/shake.js\/."},{"key":"e_1_3_2_1_24_1","unstructured":"GitHub. 2018a. Disallow sensor access on insecure contexts. https:\/\/github.com\/brave\/browser-android-tabs\/issues\/549 .  GitHub. 2018a. Disallow sensor access on insecure contexts. https:\/\/github.com\/brave\/browser-android-tabs\/issues\/549 ."},{"key":"e_1_3_2_1_25_1","unstructured":"GitHub. 2018b. Disallow sensor access on insecure contexts. https:\/\/github.com\/mozilla-mobile\/focus-android\/issues\/2092 .  GitHub. 2018b. Disallow sensor access on insecure contexts. https:\/\/github.com\/mozilla-mobile\/focus-android\/issues\/2092 ."},{"key":"e_1_3_2_1_26_1","unstructured":"GitHub. 2018c. Firefox Focus is making sensor APIs available to cross-origin iFrames. https:\/\/github.com\/mozilla-mobile\/focus-android\/issues\/2044 .  GitHub. 2018c. Firefox Focus is making sensor APIs available to cross-origin iFrames. https:\/\/github.com\/mozilla-mobile\/focus-android\/issues\/2044 ."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 4th International Conference on Communication Systems and Networks (COMSNETS). 1--9.","author":"Han Jun","unstructured":"Jun Han , E. Owusu , L. T. Nguyen , A. Perrig , and J. Zhang . 2012. ACComplice: Location inference using accelerometers on smartphones . In Proceedings of the 4th International Conference on Communication Systems and Networks (COMSNETS). 1--9. Jun Han, E. Owusu, L. T. Nguyen, A. Perrig, and J. Zhang. 2012. ACComplice: Location inference using accelerometers on smartphones. In Proceedings of the 4th International Conference on Communication Systems and Networks (COMSNETS). 1--9."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2611489"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818032"},{"key":"e_1_3_2_1_30_1","unstructured":"Jonathan Kingston. 2018. Bug 1359076 - Disable devicelight deviceproximity and userproximity events. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?format=default&id=1359076 .  Jonathan Kingston. 2018. Bug 1359076 - Disable devicelight deviceproximity and userproximity events. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?format=default&id=1359076 ."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_2_1_32_1","unstructured":"Oleg Korsunsky. 2018. Polyfill for CSS position: sticky. https:\/\/github.com\/wilddeer\/stickyfill .  Oleg Korsunsky. 2018. Polyfill for CSS position: sticky. https:\/\/github.com\/wilddeer\/stickyfill ."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0027"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_7"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_36_1","volume-title":"a pamphleteer\": Internet anonymity in the age of Web 2.0. Undergraduate Senior Thesis","author":"Mayer Jonathan R","year":"2009","unstructured":"Jonathan R Mayer . 2009. \" Any person... a pamphleteer\": Internet anonymity in the age of Web 2.0. Undergraduate Senior Thesis , Princeton University ( 2009 ). Jonathan R Mayer. 2009. \"Any person... a pamphleteer\": Internet anonymity in the age of Web 2.0. Undergraduate Senior Thesis, Princeton University (2009)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714650"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.26"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium. 1053--1067","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky , Dan Boneh , and Gabi Nakibly . 2014 . Gyrophone: Recognizing speech from gyroscope signals . In Proceedings of the 23rd USENIX Conference on Security Symposium. 1053--1067 . Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing speech from gyroscope signals. In Proceedings of the 23rd USENIX Conference on Security Symposium. 1053--1067."},{"key":"e_1_3_2_1_41_1","unstructured":"Modernizr. 2018. Respond to your user's browser features. https:\/\/modernizr.com\/.  Modernizr. 2018. Respond to your user's browser features. https:\/\/modernizr.com\/."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749287"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of Web 2.0 Security and Privacy Workshop (W2SP) .","author":"Mowery Keaton","year":"2012","unstructured":"Keaton Mowery and Hovav Shacham . 2012 . Pixel perfect: Fingerprinting canvas in HTML5 . In Proceedings of Web 2.0 Security and Privacy Workshop (W2SP) . Keaton Mowery and Hovav Shacham. 2012. Pixel perfect: Fingerprinting canvas in HTML5. In Proceedings of Web 2.0 Security and Privacy Workshop (W2SP) ."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382274"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741090"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_47_1","unstructured":"Lukasz Olejnik. 2017. Stealing sensitive browser data with the W3C ambient light sensor API. https:\/\/blog.lukaszolejnik.com\/stealing-sensitive-browser-data-with-the-w3c-ambient-light-sensor-api\/.  Lukasz Olejnik. 2017. Stealing sensitive browser data with the W3C ambient light sensor API. https:\/\/blog.lukaszolejnik.com\/stealing-sensitive-browser-data-with-the-w3c-ambient-light-sensor-api\/."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29883-2_18"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_50_1","unstructured":"Mike Perry Erinn Clark Steven Murdoch and George Koppen. 2018. The design and implementation of the Tor browser (DRAFT). https:\/\/www.torproject.org\/projects\/torbrowser\/design\/.  Mike Perry Erinn Clark Steven Murdoch and George Koppen. 2018. The design and implementation of the Tor browser (DRAFT). https:\/\/www.torproject.org\/projects\/torbrowser\/design\/."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695908"},{"key":"e_1_3_2_1_52_1","unstructured":"Florian Scholz et al. 2017. Devicemotion - web APIs | MDN. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Events\/devicemotion .  Florian Scholz et al. 2017. Devicemotion - web APIs | MDN. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Events\/devicemotion ."},{"key":"e_1_3_2_1_53_1","unstructured":"Connor Shea et al. 2018. DeviceLightEvent - web APIs | MDN. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/DeviceLightEvent .  Connor Shea et al. 2018. DeviceLightEvent - web APIs | MDN. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/DeviceLightEvent ."},{"key":"e_1_3_2_1_54_1","unstructured":"Connor Shea et al. 2018. DeviceProximityEvent - web APIs | MDN. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/DeviceProximityEvent .  Connor Shea et al. 2018. DeviceProximityEvent - web APIs | MDN. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/DeviceProximityEvent ."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.3390\/s140610146"},{"key":"e_1_3_2_1_56_1","unstructured":"Ronnie Simpson. 2016. Mobile and tablet internet usage exceeds desktop for first time worldwide | StatCounter Global Stats. http:\/\/gs.statcounter.com\/press\/mobile-and-tablet-internet-usage-exceeds-desktop-for-first-time-worldwide .  Ronnie Simpson. 2016. Mobile and tablet internet usage exceeds desktop for first time worldwide | StatCounter Global Stats. http:\/\/gs.statcounter.com\/press\/mobile-and-tablet-internet-usage-exceeds-desktop-for-first-time-worldwide ."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751323.2751329"},{"key":"e_1_3_2_1_58_1","unstructured":"Emily Stark Mike Hamburg and Dan Boneh. 2017. Stanford JavaScript Crypto Library. https:\/\/github.com\/bitwiseshiftleft\/sjcl\/blob\/master\/sjcl.js .  Emily Stark Mike Hamburg and Dan Boneh. 2017. Stanford JavaScript Crypto Library. https:\/\/github.com\/bitwiseshiftleft\/sjcl\/blob\/master\/sjcl.js ."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.18"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2014.6838194"},{"key":"e_1_3_2_1_61_1","volume-title":"Steve Block, and Andrei Popescu","author":"Tibbett Rich","year":"2018","unstructured":"Rich Tibbett , Tim Volodine , Steve Block, and Andrei Popescu . 2018 . DeviceOrientation event specification. https:\/\/w3c.github.io\/deviceorientation\/ Rich Tibbett, Tim Volodine, Steve Block, and Andrei Popescu. 2018. DeviceOrientation event specification. https:\/\/w3c.github.io\/deviceorientation\/"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_1"},{"key":"e_1_3_2_1_63_1","volume-title":"Proceeding of the 11th USENIX Workshop on Offensive Technologies (WOOT).","author":"Goethem Tom Van","year":"2017","unstructured":"Tom Van Goethem and Wouter Joosen . 2017 . One side-channel to bring them all and in the darkness bind them: Associating isolated browsing sessions . In Proceeding of the 11th USENIX Workshop on Offensive Technologies (WOOT). Tom Van Goethem and Wouter Joosen. 2017. One side-channel to bring them all and in the darkness bind them: Associating isolated browsing sessions. In Proceeding of the 11th USENIX Workshop on Offensive Technologies (WOOT)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30806-7_7"},{"key":"e_1_3_2_1_65_1","unstructured":"Valentin Vasilyev. 2018. fingerprintjs2: Modern & flexible browser fingerprinting library. https:\/\/github.com\/Valve\/fingerprintjs2 .  Valentin Vasilyev. 2018. fingerprintjs2: Modern & flexible browser fingerprinting library. https:\/\/github.com\/Valve\/fingerprintjs2 ."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00008"},{"key":"e_1_3_2_1_67_1","unstructured":"Matthew Wagerfield. 2017. Parallax.js. https:\/\/github.com\/wagerfield\/parallax .  Matthew Wagerfield. 2017. Parallax.js. https:\/\/github.com\/wagerfield\/parallax ."},{"key":"e_1_3_2_1_68_1","unstructured":"Rick Waldron Mikhail Pozdnyakov and Alexander Shalamov. 2017. Sensor use cases: W3C Note. https:\/\/w3c.github.io\/sensors\/usecases.html .  Rick Waldron Mikhail Pozdnyakov and Alexander Shalamov. 2017. Sensor use cases: W3C Note. https:\/\/w3c.github.io\/sensors\/usecases.html ."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660300"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243860","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243860","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:47Z","timestamp":1750208267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243860"}},"subtitle":["A Study of Scripts Accessing Smartphone Sensors"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":70,"alternative-id":["10.1145\/3243734.3243860","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243860","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}