{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:27:40Z","timestamp":1765888060829,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2017073934"],"award-info":[{"award-number":["2017073934"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Naver"},{"DOI":"10.13039\/501100010418","name":"Institute for Information and communications Technology Promotion","doi-asserted-by":"publisher","award":["2014-0-00065"],"award-info":[{"award-number":["2014-0-00065"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243867","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1731-1746","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Pride and Prejudice in Progressive Web Apps"],"prefix":"10.1145","author":[{"given":"Jiyeon","family":"Lee","sequence":"first","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, South Korea"}]},{"given":"Hayeon","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, South Korea"}]},{"given":"Junghwan","family":"Park","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, South Korea"}]},{"given":"Insik","family":"Shin","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, South Korea"}]},{"given":"Sooel","family":"Son","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"volume-title":"https:\/\/www.urbanairship.com\/ Retrieved","year":"2018","key":"e_1_3_2_1_2_1","unstructured":"Urban Airship. 2009. https:\/\/www.urbanairship.com\/ Retrieved April 25, 2018 from Urban Airship. 2009. https:\/\/www.urbanairship.com\/ Retrieved April 25, 2018 from"},{"key":"e_1_3_2_1_3_1","volume":"200","author":"Barth A.","unstructured":"A. Barth , C. Jackson , and J. Mitchell. 200 8. Securing Frame Communications in Browsers. In USENIX Security Symposium. USENIX Association. A. Barth, C. Jackson, and J. Mitchell. 2008. Securing Frame Communications in Browsers. In USENIX Security Symposium. USENIX Association.","journal-title":"J. Mitchell."},{"volume-title":"Progressive Web Apps: the Possible Web-native Unifier for Mobile Development. In International Conference on Web Information Systems and Technologies.","author":"Bi\u00f8rn-Hansen A.","key":"e_1_3_2_1_4_1","unstructured":"A. Bi\u00f8rn-Hansen , T. Majchrzak , and T. Gr\u00f8nli . 2017 . Progressive Web Apps: the Possible Web-native Unifier for Mobile Development. In International Conference on Web Information Systems and Technologies. A. Bi\u00f8rn-Hansen, T. Majchrzak, and T. Gr\u00f8nli. 2017. Progressive Web Apps: the Possible Web-native Unifier for Mobile Development. In International Conference on Web Information Systems and Technologies."},{"volume-title":"Iframe Onload Event Does Not Fire. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=444165 Retrieved","year":"2018","key":"e_1_3_2_1_5_1","unstructured":"Bugzilla. 2015. Iframe Onload Event Does Not Fire. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=444165 Retrieved April 28, 2018 from Bugzilla. 2015. Iframe Onload Event Does Not Fire. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=444165 Retrieved April 28, 2018 from"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046737"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.20"},{"volume-title":"Javascript Iframe Onerror Event. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=365457 Retrieved","year":"2018","key":"e_1_3_2_1_8_1","unstructured":"Chromium. 2014. Javascript Iframe Onerror Event. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=365457 Retrieved April 28, 2018 from Chromium. 2014. Javascript Iframe Onerror Event. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=365457 Retrieved April 28, 2018 from"},{"key":"e_1_3_2_1_9_1","unstructured":"Coinhive. 2018. Coinhive -- Monero JavaScript Mining. https:\/\/coinhive.com\/  Coinhive. 2018. Coinhive -- Monero JavaScript Mining. https:\/\/coinhive.com\/"},{"volume-title":"Proceedings of the Conference on USENIX Workshop on Offensive Technologies. USENIX Association.","author":"Cova M.","key":"e_1_3_2_1_10_1","unstructured":"M. Cova , C. Kruegel , and G. Vigna . 2008. There is No Free Phish: An Analysis of \"Free\" and Live Phishing Kits . In Proceedings of the Conference on USENIX Workshop on Offensive Technologies. USENIX Association. M. Cova, C. Kruegel, and G. Vigna. 2008. There is No Free Phish: An Analysis of \"Free\" and Live Phishing Kits. In Proceedings of the Conference on USENIX Workshop on Offensive Technologies. USENIX Association."},{"volume-title":"Apple Certificates Support. https:\/\/developer.apple.com\/support\/certificates\/ Retrieved","year":"2018","key":"e_1_3_2_1_11_1","unstructured":"Apple Developer. 2016. Apple Certificates Support. https:\/\/developer.apple.com\/support\/certificates\/ Retrieved May 9, 2018 from Apple Developer. 2016. Apple Certificates Support. https:\/\/developer.apple.com\/support\/certificates\/ Retrieved May 9, 2018 from"},{"volume-title":"Chrome Extentions - Content Settings. https:\/\/developer.chrome.com\/extensions\/contentSettings#type-ContentSetting Retrieved Auguest 14","year":"2018","key":"e_1_3_2_1_12_1","unstructured":"Chrome Developer. 2018. Chrome Extentions - Content Settings. https:\/\/developer.chrome.com\/extensions\/contentSettings#type-ContentSetting Retrieved Auguest 14 , 2018 from Chrome Developer. 2018. Chrome Extentions - Content Settings. https:\/\/developer.chrome.com\/extensions\/contentSettings#type-ContentSetting Retrieved Auguest 14, 2018 from"},{"volume-title":"https:\/\/developers.google.com\/web\/showcase\/2016\/aliexpress Retrieved","year":"2018","key":"e_1_3_2_1_13_1","unstructured":"Google Developers. 2016. AliExpress. https:\/\/developers.google.com\/web\/showcase\/2016\/aliexpress Retrieved May 1, 2018 from Google Developers. 2016. AliExpress. https:\/\/developers.google.com\/web\/showcase\/2016\/aliexpress Retrieved May 1, 2018 from"},{"volume-title":"Flipkart Triples Time-on-site with Progressive Web App. https:\/\/developers.google.com\/web\/showcase\/2016\/flipkart Retrieved","year":"2018","key":"e_1_3_2_1_14_1","unstructured":"Google Developers. 2016. Flipkart Triples Time-on-site with Progressive Web App. https:\/\/developers.google.com\/web\/showcase\/2016\/flipkart Retrieved May 1, 2018 from Google Developers. 2016. Flipkart Triples Time-on-site with Progressive Web App. https:\/\/developers.google.com\/web\/showcase\/2016\/flipkart Retrieved May 1, 2018 from"},{"volume-title":"Introduction to Progressive Web Apps. https:\/\/codelabs.developers.google.com\/pwa-dev-summit Retrieved","year":"2018","key":"e_1_3_2_1_15_1","unstructured":"Google Developers. 2016. Introduction to Progressive Web Apps. https:\/\/codelabs.developers.google.com\/pwa-dev-summit Retrieved May 9, 2018 from Google Developers. 2016. Introduction to Progressive Web Apps. https:\/\/codelabs.developers.google.com\/pwa-dev-summit Retrieved May 9, 2018 from"},{"key":"e_1_3_2_1_16_1","volume-title":"http:\/\/www.codechannels.com\/video\/Chrome\/chrome\/mythbusting-https-progressive-web-app-summit-2016\/ Retrieved","author":"HTTPS.","year":"2018","unstructured":"Google Developers. 2016. Mythbusting HTTPS. http:\/\/www.codechannels.com\/video\/Chrome\/chrome\/mythbusting-https-progressive-web-app-summit-2016\/ Retrieved April 25, 2018 from Google Developers. 2016. Mythbusting HTTPS. http:\/\/www.codechannels.com\/video\/Chrome\/chrome\/mythbusting-https-progressive-web-app-summit-2016\/ Retrieved April 25, 2018 from"},{"volume-title":"Introduction to Push Notifications. https:\/\/developers.google.com\/web\/ilt\/pwa\/introduction-to-push-notifications Retrieved","year":"2018","key":"e_1_3_2_1_17_1","unstructured":"Google Developers. 2018. Introduction to Push Notifications. https:\/\/developers.google.com\/web\/ilt\/pwa\/introduction-to-push-notifications Retrieved May 9, 2018 from Google Developers. 2018. Introduction to Push Notifications. https:\/\/developers.google.com\/web\/ilt\/pwa\/introduction-to-push-notifications Retrieved May 9, 2018 from"},{"volume-title":"PWA Case Studies. https:\/\/developers.google.com\/web\/showcase Retrieved","year":"2018","key":"e_1_3_2_1_18_1","unstructured":"Google Developers. 2018. PWA Case Studies. https:\/\/developers.google.com\/web\/showcase Retrieved April 26, 2018 from Google Developers. 2018. PWA Case Studies. https:\/\/developers.google.com\/web\/showcase Retrieved April 26, 2018 from"},{"volume-title":"Web Push Protocol. https:\/\/developers.google.com\/web\/fundamentals\/push-notifications\/web-push-protocol Retrieved","year":"2018","key":"e_1_3_2_1_19_1","unstructured":"Google Developers. 2018. Web Push Protocol. https:\/\/developers.google.com\/web\/fundamentals\/push-notifications\/web-push-protocol Retrieved May 9, 2018 from Google Developers. 2018. Web Push Protocol. https:\/\/developers.google.com\/web\/fundamentals\/push-notifications\/web-push-protocol Retrieved May 9, 2018 from"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"volume-title":"Do Service Workers live forever? https:\/\/github.com\/chromium\/chromium\/blob\/master\/docs\/security\/service-worker-security-faq.md#do-service-workers-live-forever Retrieved Auguest 14","year":"2018","key":"e_1_3_2_1_21_1","unstructured":"Chromium Documents. 2018. Do Service Workers live forever? https:\/\/github.com\/chromium\/chromium\/blob\/master\/docs\/security\/service-worker-security-faq.md#do-service-workers-live-forever Retrieved Auguest 14 , 2018 from Chromium Documents. 2018. Do Service Workers live forever? https:\/\/github.com\/chromium\/chromium\/blob\/master\/docs\/security\/service-worker-security-faq.md#do-service-workers-live-forever Retrieved Auguest 14, 2018 from"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352606"},{"volume-title":"1st USENIX Workshop on Hot Topics in Security. USENIX Association.","author":"Florencio D.","key":"e_1_3_2_1_23_1","unstructured":"D. Florencio and C. Herley . 2006. Password Rescue: A New Approach to Phishing Prevention . In 1st USENIX Workshop on Hot Topics in Security. USENIX Association. D. Florencio and C. Herley. 2006. Password Rescue: A New Approach to Phishing Prevention. In 1st USENIX Workshop on Hot Topics in Security. USENIX Association."},{"volume-title":"https:\/\/letsencrypt.org\/ Retrieved","year":"2018","key":"e_1_3_2_1_24_1","unstructured":"Linux Foundation. 2018. Let's Encrypt. https:\/\/letsencrypt.org\/ Retrieved April 25, 2018 from Linux Foundation. 2018. Let's Encrypt. https:\/\/letsencrypt.org\/ Retrieved April 25, 2018 from"},{"volume-title":"https:\/\/www.foxpush.com\/ Retrieved","year":"2018","key":"e_1_3_2_1_25_1","unstructured":"FoxPush. 2016. https:\/\/www.foxpush.com\/ Retrieved April 25, 2018 from FoxPush. 2016. https:\/\/www.foxpush.com\/ Retrieved April 25, 2018 from"},{"volume-title":"Request and Conquer: Exposing Cross-Origin Resource Size. In USENIX Security Symposium. USENIX Association.","author":"Goethem T.V.","key":"e_1_3_2_1_26_1","unstructured":"T.V. Goethem , M. Vanhoef , F. Piessens , and W. Joosen . 2016 . Request and Conquer: Exposing Cross-Origin Resource Size. In USENIX Security Symposium. USENIX Association. T.V. Goethem, M. Vanhoef, F. Piessens, and W. Joosen. 2016. Request and Conquer: Exposing Cross-Origin Resource Size. In USENIX Security Symposium. USENIX Association."},{"volume-title":"Google Safe Browsing. https:\/\/developers.google.com\/safe-browsing\/ Retrieved Auguest 11","year":"2018","key":"e_1_3_2_1_27_1","unstructured":"Google. 2018. Google Safe Browsing. https:\/\/developers.google.com\/safe-browsing\/ Retrieved Auguest 11 , 2018 from Google. 2018. Google Safe Browsing. https:\/\/developers.google.com\/safe-browsing\/ Retrieved Auguest 11, 2018 from"},{"key":"e_1_3_2_1_28_1","volume-title":"Content Security Policy Level 3. https:\/\/www.w3.org\/TR\/CSP3\/ Retrieved","author":"W3C Groups","year":"2018","unstructured":"W3C Groups . 2016. Content Security Policy Level 3. https:\/\/www.w3.org\/TR\/CSP3\/ Retrieved May 9, 2018 from W3C Groups. 2016. Content Security Policy Level 3. https:\/\/www.w3.org\/TR\/CSP3\/ Retrieved May 9, 2018 from"},{"key":"e_1_3_2_1_29_1","volume-title":"https:\/\/w3c.github.io\/workers\/ Retrieved","author":"W3C Groups","year":"2017","unstructured":"W3C Groups . 2017. Web Workers. https:\/\/w3c.github.io\/workers\/ Retrieved April 24, 2017 from W3C Groups. 2017. Web Workers. https:\/\/w3c.github.io\/workers\/ Retrieved April 24, 2017 from"},{"key":"e_1_3_2_1_30_1","volume-title":"https:\/\/w3c.github.io\/push-api\/ Retrieved","author":"W3C Groups","year":"2018","unstructured":"W3C Groups . 2018. Push API. https:\/\/w3c.github.io\/push-api\/ Retrieved May 9, 2018 from W3C Groups. 2018. Push API. https:\/\/w3c.github.io\/push-api\/ Retrieved May 9, 2018 from"},{"key":"e_1_3_2_1_31_1","volume-title":"Service Workers Nightly. https:\/\/w3c.github.io\/ServiceWorker\/ Retrieved","author":"W3C Groups","year":"2018","unstructured":"W3C Groups . 2018. Service Workers Nightly. https:\/\/w3c.github.io\/ServiceWorker\/ Retrieved April 24, 2018 from W3C Groups. 2018. Service Workers Nightly. https:\/\/w3c.github.io\/ServiceWorker\/ Retrieved April 24, 2018 from"},{"key":"e_1_3_2_1_32_1","volume-title":"the Notification API. https:\/\/notifications.spec.whatwg.org\/ Retrieved","author":"W3C Groups","year":"2018","unstructured":"W3C Groups . 2018. the Notification API. https:\/\/notifications.spec.whatwg.org\/ Retrieved May 7, 2018 from W3C Groups. 2018. the Notification API. https:\/\/notifications.spec.whatwg.org\/ Retrieved May 7, 2018 from"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978330"},{"volume-title":"https:\/\/www.izooto.com\/ Retrieved","year":"2018","key":"e_1_3_2_1_34_1","unstructured":"Izooto. 2016. https:\/\/www.izooto.com\/ Retrieved April 25, 2018 from Izooto. 2016. https:\/\/www.izooto.com\/ Retrieved April 25, 2018 from"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"volume-title":"{n. d.}. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft","author":"Jakobsson M.","key":"e_1_3_2_1_36_1","unstructured":"M. Jakobsson and S. Myers . {n. d.}. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft . Wiley-Interscience . M. Jakobsson and S. Myers. {n. d.}. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft .Wiley-Interscience."},{"volume-title":"Clickjacking: Attacks and Defenses. In USENIX Security Symposium. USENIX Association.","author":"Moshchuk L, A.","key":"e_1_3_2_1_37_1","unstructured":"Huang L, A. Moshchuk , H. J. Wang , S. Schecter , and C. Jackson . 2012 . Clickjacking: Attacks and Defenses. In USENIX Security Symposium. USENIX Association. Huang L, A. Moshchuk, H. J. Wang, S. Schecter, and C. Jackson. 2012. Clickjacking: Attacks and Defenses. In USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_1_38_1","volume":"201","author":"Lee S.","unstructured":"S. Lee , H. Kim , and J. Kim. 201 5. Identifying Cross-origin Resource Status using Application Cache. In Proceedings of the Annual Network and Distributed System Security Symposium. S. Lee, H. Kim, and J. Kim. 2015. Identifying Cross-origin Resource Status using Application Cache. In Proceedings of the Annual Network and Distributed System Security Symposium.","journal-title":"J. Kim."},{"key":"e_1_3_2_1_39_1","volume-title":"How Bitcoins Became Worth $10,000. https:\/\/arstechnica.com\/tech-policy\/2017\/11\/how-bitcoins-became-worth-10000\/ Retrieved","author":"Lee T.","year":"2017","unstructured":"T. Lee . 2017. How Bitcoins Became Worth $10,000. https:\/\/arstechnica.com\/tech-policy\/2017\/11\/how-bitcoins-became-worth-10000\/ Retrieved May 9, 2017 from T. Lee. 2017. How Bitcoins Became Worth $10,000. https:\/\/arstechnica.com\/tech-policy\/2017\/11\/how-bitcoins-became-worth-10000\/ Retrieved May 9, 2017 from"},{"volume-title":"Hawaii International Conference on System Sciences.","author":"Majchrzak T.","key":"e_1_3_2_1_40_1","unstructured":"T. Majchrzak , A. Bi\u00f8rn-Hansen , and T. Gr\u00f8nli . 2018. Progressive Web Apps: the Definite Approach to Cross-Platform Development? . In Hawaii International Conference on System Sciences. T. Majchrzak, A. Bi\u00f8rn-Hansen, and T. Gr\u00f8nli. 2018. Progressive Web Apps: the Definite Approach to Cross-Platform Development?. In Hawaii International Conference on System Sciences."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3001854.3001863"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.7"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741657"},{"volume-title":"https:\/\/mitmproxy.org\/ Retrieved","year":"2018","key":"e_1_3_2_1_44_1","unstructured":"mitmproxy. 2018. https:\/\/mitmproxy.org\/ Retrieved April 25, 2018 from mitmproxy. 2018. https:\/\/mitmproxy.org\/ Retrieved April 25, 2018 from"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"T. Moore and R. Clayton. 2012. Discovering Phishing Dropboxes using Email Metadata. In eCrime Researchers Summit.  T. Moore and R. Clayton. 2012. Discovering Phishing Dropboxes using Email Metadata. In eCrime Researchers Summit.","DOI":"10.1109\/eCrime.2012.6489515"},{"volume-title":"HSTS - Strict Transport Security. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Headers\/Strict-Transport-Security Retrieved","year":"2018","key":"e_1_3_2_1_46_1","unstructured":"Mozilla Developer Network. 2016. HSTS - Strict Transport Security. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Headers\/Strict-Transport-Security Retrieved April 25, 2018 from Mozilla Developer Network. 2016. HSTS - Strict Transport Security. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Headers\/Strict-Transport-Security Retrieved April 25, 2018 from"},{"volume-title":"CSP: frame-ancestors - HTTP. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Headers\/Content-Security-Policy\/frame-ancestors Retrieved","year":"2018","key":"e_1_3_2_1_47_1","unstructured":"Mozilla Developer Network. 2017. CSP: frame-ancestors - HTTP. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Headers\/Content-Security-Policy\/frame-ancestors Retrieved May 9, 2018 from Mozilla Developer Network. 2017. CSP: frame-ancestors - HTTP. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Headers\/Content-Security-Policy\/frame-ancestors Retrieved May 9, 2018 from"},{"volume-title":"AppCache is deprecated. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTML\/Using_the_application_cache Retrieved","year":"2018","key":"e_1_3_2_1_48_1","unstructured":"Mozilla Developer Network. 2018. AppCache is deprecated. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTML\/Using_the_application_cache Retrieved May 9, 2018 from Mozilla Developer Network. 2018. AppCache is deprecated. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTML\/Using_the_application_cache Retrieved May 9, 2018 from"},{"volume-title":"Cache - Web APIs. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Cache Retrieved","year":"2018","key":"e_1_3_2_1_49_1","unstructured":"Mozilla Developer Network. 2018. Cache - Web APIs. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Cache Retrieved May 9, 2018 from Mozilla Developer Network. 2018. Cache - Web APIs. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Cache Retrieved May 9, 2018 from"},{"volume-title":"HTTP caching. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Caching Retrieved","year":"2018","key":"e_1_3_2_1_50_1","unstructured":"Mozilla Developer Network. 2018. HTTP caching. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Caching Retrieved April 25, 2018 from Mozilla Developer Network. 2018. HTTP caching. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Caching Retrieved April 25, 2018 from"},{"volume-title":"https:\/\/developer.mozilla.org\/en-US\/docs\/WebAssembly Retrieved","year":"2018","key":"e_1_3_2_1_51_1","unstructured":"Mozilla Developer Network. 2018. WebAssembly. https:\/\/developer.mozilla.org\/en-US\/docs\/WebAssembly Retrieved April 25, 2018 from Mozilla Developer Network. 2018. WebAssembly. https:\/\/developer.mozilla.org\/en-US\/docs\/WebAssembly Retrieved April 25, 2018 from"},{"volume-title":"Web of Trust - Website reputation and review service. https:\/\/www.mywot.com\/ Retrieved Auguest 11","year":"2018","key":"e_1_3_2_1_52_1","unstructured":"Web of Trust. 2018. Web of Trust - Website reputation and review service. https:\/\/www.mywot.com\/ Retrieved Auguest 11 , 2018 from Web of Trust. 2018. Web of Trust - Website reputation and review service. https:\/\/www.mywot.com\/ Retrieved Auguest 11, 2018 from"},{"volume-title":"https:\/\/onesignal.com\/ Retrieved","year":"2018","key":"e_1_3_2_1_53_1","unstructured":"OneSignal. 2018. https:\/\/onesignal.com\/ Retrieved April 25, 2018 from OneSignal. 2018. https:\/\/onesignal.com\/ Retrieved April 25, 2018 from"},{"volume-title":"https:\/\/pushcrew.com\/ Retrieved","year":"2018","key":"e_1_3_2_1_54_1","unstructured":"pushcrew. 2015. https:\/\/pushcrew.com\/ Retrieved April 25, 2018 from pushcrew. 2015. https:\/\/pushcrew.com\/ Retrieved April 25, 2018 from"},{"volume-title":"https:\/\/www.pushengage.com\/ Retrieved","year":"2018","key":"e_1_3_2_1_55_1","unstructured":"PushEngage. 2015. https:\/\/www.pushengage.com\/ Retrieved April 25, 2018 from PushEngage. 2015. https:\/\/www.pushengage.com\/ Retrieved April 25, 2018 from"},{"volume-title":"https:\/\/www.pushwoosh.com\/ Retrieved","year":"2018","key":"e_1_3_2_1_56_1","unstructured":"PushWoosh. 2018. https:\/\/www.pushwoosh.com\/ Retrieved April 25, 2018 from PushWoosh. 2018. https:\/\/www.pushwoosh.com\/ Retrieved April 25, 2018 from"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"key":"e_1_3_2_1_58_1","volume-title":"HTTP Header Field X-Frame-Options. https:\/\/tools.ietf.org\/html\/rfc7034 Retrieved","author":"Ross D.","year":"2018","unstructured":"D. Ross . 2013. HTTP Header Field X-Frame-Options. https:\/\/tools.ietf.org\/html\/rfc7034 Retrieved May 9, 2018 from D. Ross. 2013. HTTP Header Field X-Frame-Options. https:\/\/tools.ietf.org\/html\/rfc7034 Retrieved May 9, 2018 from"},{"key":"e_1_3_2_1_59_1","volume-title":"CryptoNote v 2.0. https:\/\/cryptonote.org\/whitepaper.pdf Retrieved","author":"Saberhagen N.V.","year":"2018","unstructured":"N.V. Saberhagen . 2013. CryptoNote v 2.0. https:\/\/cryptonote.org\/whitepaper.pdf Retrieved May 9, 2018 from N.V. Saberhagen. 2013. CryptoNote v 2.0. https:\/\/cryptonote.org\/whitepaper.pdf Retrieved May 9, 2018 from"},{"key":"e_1_3_2_1_60_1","volume":"201","author":"Saride G.","unstructured":"G. Saride , J. Aaron , and J. Bose. 201 6. Secure Web Push System. In International Conference on Communication Systems and Networks. G. Saride, J. Aaron, and J. Bose. 2016. Secure Web Push System. In International Conference on Communication Systems and Networks.","journal-title":"J. Bose."},{"volume-title":"Beauty and the Burst: Remote Identification of Encrypted Video Streams. In USENIX Security Symposium. USENIX Association.","author":"Schuster R.","key":"e_1_3_2_1_61_1","unstructured":"R. Schuster , V. Shmatikov , and E. Tromer . 2017 . Beauty and the Burst: Remote Identification of Encrypted Video Streams. In USENIX Security Symposium. USENIX Association. R. Schuster, V. Shmatikov, and E. Tromer. 2017. Beauty and the Burst: Remote Identification of Encrypted Video Streams. In USENIX Security Symposium. USENIX Association."},{"volume-title":"https:\/\/sendpulse.com\/ Retrieved","year":"2018","key":"e_1_3_2_1_62_1","unstructured":"SendPulse. 2015. https:\/\/sendpulse.com\/ Retrieved April 25, 2018 from SendPulse. 2015. https:\/\/sendpulse.com\/ Retrieved April 25, 2018 from"},{"volume-title":"Password Managers: Attacks and Defenses. In USENIX Security Symposium. USENIX Association.","author":"Silver D.","key":"e_1_3_2_1_63_1","unstructured":"D. Silver , S. Jana , E. Chen , C. Jackson , and D. Boneh . 2014 . Password Managers: Attacks and Defenses. In USENIX Security Symposium. USENIX Association. D. Silver, S. Jana, E. Chen, C. Jackson, and D. Boneh. 2014. Password Managers: Attacks and Defenses. In USENIX Security Symposium. USENIX Association."},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium. Internet Society.","author":"Son S.","key":"e_1_3_2_1_64_1","unstructured":"S. Son , D. Kim , and V. Shmatikov . 2010. What Mobile Ads Know About Mobile Users . In Proceedings of the Network and Distributed System Security Symposium. Internet Society. S. Son, D. Kim, and V. Shmatikov. 2010. What Mobile Ads Know About Mobile Users. In Proceedings of the Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188742"},{"volume-title":"How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security. In USENIX Security Symposium. USENIX Association.","author":"Stock B.","key":"e_1_3_2_1_66_1","unstructured":"B. Stock , M. Johns , M. Steffens ,, and M. Backes . 2017 . How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security. In USENIX Security Symposium. USENIX Association. B. Stock, M. Johns, M. Steffens,, and M. Backes. 2017. How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security. In USENIX Security Symposium. USENIX Association."},{"volume-title":"Proceedings of the Conference on Large-scale Exploits and Emergent Threats. USENIX Association.","author":"Stone-Gross B.","key":"e_1_3_2_1_67_1","unstructured":"B. Stone-Gross , T. Holz , G. Stringhini , and G. Vigna . 2011. The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-scale Spam Campaigns . In Proceedings of the Conference on Large-scale Exploits and Emergent Threats. USENIX Association. B. Stone-Gross, T. Holz, G. Stringhini, and G. Vigna. 2011. The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-scale Spam Campaigns. In Proceedings of the Conference on Large-scale Exploits and Emergent Threats. USENIX Association."},{"key":"e_1_3_2_1_68_1","unstructured":"Symantec. 2013. Elliptic Curve Cryptography Certificates Performance Analysis. https:\/\/www.websecurity.symantec.com\/content\/dam\/websitesecurity\/digitalassets\/desktop\/pdfs\/whitepaper\/Elliptic_Curve_Cryptography_ECC_WP_en_us.pdf Retrieved May 9 2018 from  Symantec. 2013. Elliptic Curve Cryptography Certificates Performance Analysis. https:\/\/www.websecurity.symantec.com\/content\/dam\/websitesecurity\/digitalassets\/desktop\/pdfs\/whitepaper\/Elliptic_Curve_Cryptography_ECC_WP_en_us.pdf Retrieved May 9 2018 from"},{"volume-title":"Introduction to Monero (XMR) Coins. https:\/\/monero.org\/ Retrieved","year":"2018","key":"e_1_3_2_1_69_1","unstructured":"Monero.org Team. 2018. Introduction to Monero (XMR) Coins. https:\/\/monero.org\/ Retrieved May 9, 2018 from Monero.org Team. 2018. Introduction to Monero (XMR) Coins. https:\/\/monero.org\/ Retrieved May 9, 2018 from"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134067"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium. Internet Society.","author":"Vadrevu P.","key":"e_1_3_2_1_71_1","unstructured":"P. Vadrevu , J. Liu , B. Li , B. Rahbarinia , K. Lee , and R. Perdisci . 2017. Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots . In Proceedings of the Network and Distributed System Security Symposium. Internet Society. P. Vadrevu, J. Liu, B. Li, B. Rahbarinia, K. Lee, and R. Perdisci. 2017. Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots. In Proceedings of the Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.23"},{"volume-title":"Proceedings of the Graphics Interface. ACM.","author":"Whalen T.","key":"e_1_3_2_1_73_1","unstructured":"T. Whalen and K. Inkpen . 2005. Gathering evidence: use of visual security cues in web browsers . In Proceedings of the Graphics Interface. ACM. T. Whalen and K. Inkpen. 2005. Gathering evidence: use of visual security cues in web browsers. In Proceedings of the Graphics Interface. ACM."},{"key":"e_1_3_2_1_74_1","volume-title":"HTML Living Standard. https:\/\/html.spec.whatwg.org\/multipage\/iframe-embed-object.html#the-iframe-element Retrieved","author":"WG.","year":"2018","unstructured":"WHAT WG. 2018. HTML Living Standard. https:\/\/html.spec.whatwg.org\/multipage\/iframe-embed-object.html#the-iframe-element Retrieved May 8, 2018 from WHATWG. 2018. HTML Living Standard. https:\/\/html.spec.whatwg.org\/multipage\/iframe-embed-object.html#the-iframe-element Retrieved May 8, 2018 from"},{"key":"e_1_3_2_1_75_1","volume-title":"Offline Web Applications. https:\/\/html.spec.whatwg.org\/multipage\/offline.html Retrieved","author":"WG.","year":"2018","unstructured":"WHAT WG. 2018. Offline Web Applications. https:\/\/html.spec.whatwg.org\/multipage\/offline.html Retrieved April 26, 2018 from WHATWG. 2018. Offline Web Applications. https:\/\/html.spec.whatwg.org\/multipage\/offline.html Retrieved April 26, 2018 from"},{"key":"e_1_3_2_1_76_1","volume-title":"the WebSocket API. https:\/\/html.spec.whatwg.org\/multipage\/web-sockets.html Retrieved","author":"WG.","year":"2018","unstructured":"WHAT WG. 2018. the WebSocket API. https:\/\/html.spec.whatwg.org\/multipage\/web-sockets.html Retrieved May 7, 2018 from WHATWG. 2018. the WebSocket API. https:\/\/html.spec.whatwg.org\/multipage\/web-sockets.html Retrieved May 7, 2018 from"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"volume-title":"Proceedings of the Conference on USENIX Workshop on Offensive Technologies.","author":"Xu Z.","key":"e_1_3_2_1_78_1","unstructured":"Z. Xu and S. Zhu . 2012. Abusing Notification Services on Smartphones for Phishing and Spamming . In Proceedings of the Conference on USENIX Workshop on Offensive Technologies. Z. Xu and S. Zhu. 2012. Abusing Notification Services on Smartphones for Phishing and Spamming. In Proceedings of the Conference on USENIX Workshop on Offensive Technologies."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","unstructured":"S. Zawoad A. Dutta A. Sprague R. Hasan J. Britt and G. Warner. 2013. Phish-Net: Investigating Phish Clusters using Drop Email Addresses. In APWG eCrime Researchers Summit.  S. Zawoad A. Dutta A. Sprague R. Hasan J. Britt and G. Warner. 2013. Phish-Net: Investigating Phish Clusters using Drop Email Addresses. In APWG eCrime Researchers Summit.","DOI":"10.1109\/eCRS.2013.6805777"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243867","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:47Z","timestamp":1750208267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243867"}},"subtitle":["Abusing Native App-like Features in Web Applications"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":79,"alternative-id":["10.1145\/3243734.3243867","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243867","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}