{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:24:08Z","timestamp":1771457048369,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3267323.3268959","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"14-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["To Extend or not to Extend"],"prefix":"10.1145","author":[{"given":"Gabor Gyorgy","family":"Gulyas","sequence":"first","affiliation":[{"name":"INRIA, Grenoble, France"}]},{"given":"Doliere Francis","family":"Some","sequence":"additional","affiliation":[{"name":"INRIA, Sophia Antipolis, France"}]},{"given":"Nataliia","family":"Bielova","sequence":"additional","affiliation":[{"name":"INRIA, Sophia Antipolis, France"}]},{"given":"Claude","family":"Castelluccia","sequence":"additional","affiliation":[{"name":"INRIA, Grenoble, France"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AdBlock Official website. https:\/\/getadblock.com\/.  AdBlock Official website. https:\/\/getadblock.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Adblockplus official website. https:\/\/adblockplus.org\/.  Adblockplus official website. https:\/\/adblockplus.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Brave browser. https:\/\/brave.com\/.  Brave browser. https:\/\/brave.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Chrome Extensions API. https:\/\/developer.chrome.com\/extensions.  Chrome Extensions API. https:\/\/developer.chrome.com\/extensions."},{"key":"e_1_3_2_1_5_1","unstructured":"Content security policy (csp).  Content security policy (csp)."},{"key":"e_1_3_2_1_6_1","unstructured":"Disconnect Official website. https:\/\/disconnect.me\/.  Disconnect Official website. https:\/\/disconnect.me\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Faceboook website. https:\/\/www.facebook.com\/.  Faceboook website. https:\/\/www.facebook.com\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Ghostery Official website. https:\/\/www.ghostery.com\/.  Ghostery Official website. https:\/\/www.ghostery.com\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Google Chrome browser. https:\/\/www.google.com\/chrome\/.  Google Chrome browser. https:\/\/www.google.com\/chrome\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Google. manifest - web accessible resources.  Google. manifest - web accessible resources."},{"key":"e_1_3_2_1_11_1","unstructured":"Google. manifest file format.  Google. manifest file format."},{"key":"e_1_3_2_1_12_1","unstructured":"Google website. https:\/\/www.google.com\/.  Google website. https:\/\/www.google.com\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Google's Gmail. https:\/\/gmail.com.  Google's Gmail. https:\/\/gmail.com."},{"key":"e_1_3_2_1_14_1","unstructured":"Lastpass official website. https:\/\/www.lastpass.com\/business.  Lastpass official website. https:\/\/www.lastpass.com\/business."},{"key":"e_1_3_2_1_15_1","unstructured":"Linkedin website. https:\/\/www.linkedin.com\/.  Linkedin website. https:\/\/www.linkedin.com\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Opera browser. http:\/\/www.opera.com\/.  Opera browser. http:\/\/www.opera.com\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Privacy Badger - Electronic Frontier Foundation. https:\/\/www.eff.org\/fr\/ privacybadger.  Privacy Badger - Electronic Frontier Foundation. https:\/\/www.eff.org\/fr\/ privacybadger."},{"key":"e_1_3_2_1_18_1","unstructured":"Same Origin Policy. https:\/\/www.w3.org\/Security\/wiki\/Same_Origin_Policy.  Same Origin Policy. https:\/\/www.w3.org\/Security\/wiki\/Same_Origin_Policy."},{"key":"e_1_3_2_1_19_1","unstructured":"WebExtensions web_accessible_resources. https:\/\/developer.mozilla.org\/en-US\/ Add-ons\/WebExtensions\/manifest.json\/web_accessible_resources.  WebExtensions web_accessible_resources. https:\/\/developer.mozilla.org\/en-US\/ Add-ons\/WebExtensions\/manifest.json\/web_accessible_resources."},{"key":"e_1_3_2_1_20_1","unstructured":"Youtube website. https:\/\/www.youtube.com\/.  Youtube website. https:\/\/www.youtube.com\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808138.2808146"},{"key":"e_1_3_2_1_24_1","unstructured":"T. Anthony. Detect if visitors are logged into twitter facebook or google+. http:\/\/www.tomanthony.co.uk\/blog\/detect-visitor-social-networks\/ 2012.  T. Anthony. Detect if visitors are logged into twitter facebook or google+. http:\/\/www.tomanthony.co.uk\/blog\/detect-visitor-social-networks\/ 2012."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29615-4_4"},{"key":"e_1_3_2_1_26_1","unstructured":"M. Bryant. Dirty browser enumeration tricks - using chrome:\/\/ and about: to detect firefox and addons. https:\/\/thehackerblog.com\/ dirty-browser-enumeration-tricks-using-chrome-and-about-to-detect-firefox-plugins\/ index.html 2014.  M. Bryant. Dirty browser enumeration tricks - using chrome:\/\/ and about: to detect firefox and addons. https:\/\/thehackerblog.com\/ dirty-browser-enumeration-tricks-using-chrome-and-about-to-detect-firefox-plugins\/ index.html 2014."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23152"},{"key":"e_1_3_2_1_28_1","unstructured":"G. Cattani. The evolution of chrome extensions detection. http:\/\/blog.beefproject. com\/2013\/04\/the-evolution-of-chrome-extensions.html 2013.  G. Cattani. The evolution of chrome extensions detection. http:\/\/blog.beefproject. com\/2013\/04\/the-evolution-of-chrome-extensions.html 2013."},{"key":"e_1_3_2_1_29_1","volume-title":"Unique in the crowd: The privacy bounds of human mobility. Scientific Reports, 3:1376 EP --","author":"de Montjoye Y.-A.","year":"2013","unstructured":"Y.-A. de Montjoye , C. A. Hidalgo , M. Verleysen , and V. D. Blondel . Unique in the crowd: The privacy bounds of human mobility. Scientific Reports, 3:1376 EP -- , 2013 . Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel. Unique in the crowd: The privacy bounds of human mobility. Scientific Reports, 3:1376 EP --, 2013."},{"key":"e_1_3_2_1_30_1","first-page":"1","volume-title":"10th International Symposium, PETS 2010, Berlin, Germany, July 21--23, 2010. Proceedings","author":"Eckersley P.","year":"2010","unstructured":"P. Eckersley . How unique is your web browser? In Privacy Enhancing Technologies , 10th International Symposium, PETS 2010, Berlin, Germany, July 21--23, 2010. Proceedings , pages 1 -- 18 , 2010 . P. Eckersley. How unique is your web browser? In Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21--23, 2010. Proceedings, pages 1--18, 2010."},{"key":"e_1_3_2_1_31_1","volume-title":"Novel techniques for user deanonymization attacks. https:\/\/0xsobky. github.io\/novel-deanonymization-techniques\/","author":"Elsobky A.","year":"2016","unstructured":"A. Elsobky . Novel techniques for user deanonymization attacks. https:\/\/0xsobky. github.io\/novel-deanonymization-techniques\/ , 2016 . A. Elsobky. Novel techniques for user deanonymization attacks. https:\/\/0xsobky. github.io\/novel-deanonymization-techniques\/, 2016."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430552"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186097"},{"key":"e_1_3_2_1_35_1","unstructured":"J. Grossman. I know what you've got (firefox extensions). http:\/\/blog. jeremiahgrossman.com\/2006\/08\/i-know-what-youve-got-firefox.html 2006.  J. Grossman. I know what you've got (firefox extensions). http:\/\/blog. jeremiahgrossman.com\/2006\/08\/i-know-what-youve-got-firefox.html 2006."},{"key":"e_1_3_2_1_36_1","volume-title":"Login detection, whose problem is it? http:\/\/blog.jeremiahgrossman. com\/2008\/03\/login-detection-whose-problem-is-it.html","author":"Grossman J.","year":"2008","unstructured":"J. Grossman . Login detection, whose problem is it? http:\/\/blog.jeremiahgrossman. com\/2008\/03\/login-detection-whose-problem-is-it.html , 2008 . J. Grossman. Login detection, whose problem is it? http:\/\/blog.jeremiahgrossman. com\/2008\/03\/login-detection-whose-problem-is-it.html, 2008."},{"key":"e_1_3_2_1_37_1","volume-title":"Code repository for paper titled 'near-optimal fingerprinting with constraints'. https:\/\/github.com\/gaborgulyas\/ constrainted_fingerprinting","author":"Guly\u00e1s G. G.","year":"2016","unstructured":"G. G. Guly\u00e1s , G. Acs , and C. Castelluccia . Code repository for paper titled 'near-optimal fingerprinting with constraints'. https:\/\/github.com\/gaborgulyas\/ constrainted_fingerprinting , 2016 . G. G. Guly\u00e1s, G. Acs, and C. Castelluccia. Code repository for paper titled 'near-optimal fingerprinting with constraints'. https:\/\/github.com\/gaborgulyas\/ constrainted_fingerprinting, 2016."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0051"},{"key":"e_1_3_2_1_39_1","unstructured":"J. Haag. Modern and flexible browser fingerprinting library. https:\/\/github.com\/ Valve\/fingerprintjs2.  J. Haag. Modern and flexible browser fingerprinting library. https:\/\/github.com\/ Valve\/fingerprintjs2."},{"key":"e_1_3_2_1_40_1","volume-title":"Uniquely me! how much information does it take to single out one person among billions? 102:106--109","author":"Hayes B.","year":"2014","unstructured":"B. Hayes . Uniquely me! how much information does it take to single out one person among billions? 102:106--109 , 2014 . B. Hayes. Uniquely me! how much information does it take to single out one person among billions? 102:106--109, 2014."},{"key":"e_1_3_2_1_41_1","volume-title":"http:\/\/homakov.blogspot.fr\/ 2014\/01\/using-content-security-policy-for-evil.html","author":"Homakov E.","year":"2014","unstructured":"E. Homakov . Using content-security-policy for evil. http:\/\/homakov.blogspot.fr\/ 2014\/01\/using-content-security-policy-for-evil.html , 2014 . E. Homakov. Using content-security-policy for evil. http:\/\/homakov.blogspot.fr\/ 2014\/01\/using-content-security-policy-for-evil.html, 2014."},{"key":"e_1_3_2_1_42_1","volume-title":"Profilejacking - legal tricks to detect user profile. https:\/\/sakurity. com\/blog\/2015\/03\/10\/Profilejacking.html","author":"Homakov E.","year":"2015","unstructured":"E. Homakov . Profilejacking - legal tricks to detect user profile. https:\/\/sakurity. com\/blog\/2015\/03\/10\/Profilejacking.html , 2015 . E. Homakov. Profilejacking - legal tricks to detect user profile. https:\/\/sakurity. com\/blog\/2015\/03\/10\/Profilejacking.html, 2015."},{"key":"e_1_3_2_1_43_1","unstructured":"K. Kotowitz. Intro to chrome addons hacking: fingerprinting. http:\/\/blog.kotowicz. net\/2012\/02\/intro-to-chrome-addons-hacking.html 2012.  K. Kotowitz. Intro to chrome addons hacking: fingerprinting. http:\/\/blog.kotowicz. net\/2012\/02\/intro-to-chrome-addons-hacking.html 2012."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_46_1","volume-title":"Your social media fingerprint. https:\/\/robinlinus.github.io\/ socialmedia-leak\/","author":"Linus R.","year":"2016","unstructured":"R. Linus . Your social media fingerprint. https:\/\/robinlinus.github.io\/ socialmedia-leak\/ , 2016 . R. Linus. Your social media fingerprint. https:\/\/robinlinus.github.io\/ socialmedia-leak\/, 2016."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.26"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of W2SP 2012","author":"Mowery K.","year":"2012","unstructured":"K. Mowery and H. Shacham . Pixel perfect: Fingerprinting canvas in HTML5. In M. Fredrikson, editor , Proceedings of W2SP 2012 . IEEE Computer Society , May 2012 . K. Mowery and H. Shacham. Pixel perfect: Fingerprinting canvas in HTML5. In M. Fredrikson, editor, Proceedings of W2SP 2012. IEEE Computer Society, May 2012."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_50_1","volume-title":"Hot Topics in Privacy Enhancing Technologies (HotPETs","author":"Castelluccia C.","year":"2012","unstructured":"Olejnik, C. Castelluccia , and A. Janc . Why johnny can't browse in peace: On the uniqueness of web browsing history patterns . In Hot Topics in Privacy Enhancing Technologies (HotPETs 2012 ), 07 2012. Olejnik, C. Castelluccia, and A. Janc. Why johnny can't browse in peace: On the uniqueness of web browsing history patterns. In Hot Topics in Privacy Enhancing Technologies (HotPETs 2012), 07 2012."},{"key":"e_1_3_2_1_51_1","unstructured":"I. Paul. Firefox will stop supporting plugins by end of 2016 following chrome's lead. https:\/\/www.pcworld.com\/article\/2990991\/browsers\/ firefox-will-stop-supporting-npapi-plugins-by-end-of-2016-following-chromes-lead. html.  I. Paul. Firefox will stop supporting plugins by end of 2016 following chrome's lead. https:\/\/www.pcworld.com\/article\/2990991\/browsers\/ firefox-will-stop-supporting-npapi-plugins-by-end-of-2016-following-chromes-lead. html."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029210"},{"key":"e_1_3_2_1_53_1","volume-title":"On continuous user authentication via typing behavior. 23(10):4611--4624","author":"Roth J.","year":"2014","unstructured":"J. Roth , X. Liu , and D. Metaxas . On continuous user authentication via typing behavior. 23(10):4611--4624 , 2014 . J. Roth, X. Liu, and D. Metaxas. On continuous user authentication via typing behavior. 23(10):4611--4624, 2014."},{"key":"e_1_3_2_1_54_1","first-page":"679","volume-title":"26th USENIX Security Symposium","author":"S\u00e1nchez-Rola I.","year":"2017","unstructured":"I. S\u00e1nchez-Rola , I. Santos , and D. Balzarotti . Extension breakdown: Security analysis of browsers extension resources control policies . In 26th USENIX Security Symposium , pages 679 -- 694 , 2017 . I. S\u00e1nchez-Rola, I. Santos, and D. Balzarotti. Extension breakdown: Security analysis of browsers extension resources control policies. In 26th USENIX Security Symposium, pages 679--694, 2017."},{"key":"e_1_3_2_1_55_1","volume-title":"September","author":"Schuh J.","year":"2013","unstructured":"J. Schuh . Canvas DefendeSaying Goodbye to Our Old Friend NPAPI , September 2013 . https:\/\/blog.chromium.org\/2013\/09\/ saying-goodbye-to-our-old-friend-npapi.html. J. Schuh. Canvas DefendeSaying Goodbye to Our Old Friend NPAPI, September 2013. https:\/\/blog.chromium.org\/2013\/09\/ saying-goodbye-to-our-old-friend-npapi.html."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029820"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772784"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.18"},{"key":"e_1_3_2_1_59_1","volume-title":"FP-STALKER: Tracking Browser Fingerprint Evolutions. In 39th IEEE Symposium on Security and Privacy (S&P 2018)","author":"Vastel A.","year":"2018","unstructured":"A. Vastel , P. Laperdrix , W. Rudametkin , and R. Rouvoy . FP-STALKER: Tracking Browser Fingerprint Evolutions. In 39th IEEE Symposium on Security and Privacy (S&P 2018) , 2018 . A. Vastel, P. Laperdrix, W. Rudametkin, and R. Rouvoy. FP-STALKER: Tracking Browser Fingerprint Evolutions. In 39th IEEE Symposium on Security and Privacy (S&P 2018), 2018."},{"key":"e_1_3_2_1_60_1","volume-title":"Content Security Policy Level 2. W3C Candidate Recommendation","author":"West M.","year":"2015","unstructured":"M. West , A. Barth , and D. Veditz . Content Security Policy Level 2. W3C Candidate Recommendation , 2015 . M.West, A. Barth, and D. Veditz. Content Security Policy Level 2. W3C Candidate Recommendation, 2015."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2012.6239225"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267323.3268959","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3267323.3268959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:43Z","timestamp":1750208263000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267323.3268959"}},"subtitle":["On the Uniqueness of Browser Extensions and Web Logins"],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":60,"alternative-id":["10.1145\/3267323.3268959","10.1145\/3267323"],"URL":"https:\/\/doi.org\/10.1145\/3267323.3268959","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}