{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:29:12Z","timestamp":1766449752107,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CPS-1739809, CNS-1553437 and CNS-1704105."],"award-info":[{"award-number":["CPS-1739809, CNS-1553437 and CNS-1704105."]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354198","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"131-147","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Watching You Watch"],"prefix":"10.1145","author":[{"given":"Hooman","family":"Mohajeri Moghaddam","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Gunes","family":"Acar","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Ben","family":"Burgess","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Arunesh","family":"Mathur","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Danny Yuxing","family":"Huang","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"Princeton University &amp; University of Chicago, Princeton, NJ, USA"}]},{"given":"Edward W.","family":"Felten","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Prateek","family":"Mittal","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Arvind","family":"Narayanan","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229568"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"volume-title":"Fire TV Apps. https:\/\/www.amazon.com\/Fire-TV-Apps-All-Models\/b?ie=UTF8&node=10208590011 Retrieved","year":"2019","key":"e_1_3_2_2_3_1","unstructured":"Amazon. 2019. Fire TV Apps. https:\/\/www.amazon.com\/Fire-TV-Apps-All-Models\/b?ie=UTF8&node=10208590011 Retrieved August 25, 2019 from Amazon. 2019. Fire TV Apps. https:\/\/www.amazon.com\/Fire-TV-Apps-All-Models\/b?ie=UTF8&node=10208590011 Retrieved August 25, 2019 from"},{"volume-title":"Fire TV Documentation. https:\/\/developer.amazon.com\/docs\/fire-tv\/advertising-id.html Retrieved","year":"2019","key":"e_1_3_2_2_4_1","unstructured":"Amazon. 2019. Fire TV Documentation. https:\/\/developer.amazon.com\/docs\/fire-tv\/advertising-id.html Retrieved August 25, 2019 from Amazon. 2019. Fire TV Documentation. https:\/\/developer.amazon.com\/docs\/fire-tv\/advertising-id.html Retrieved August 25, 2019 from"},{"volume-title":"Fire TV Stick. https:\/\/www.amazon.com\/dp\/B0791TX5P5?ref=ODS_v2_FS_SMP_TVStick Retrieved","year":"2019","key":"e_1_3_2_2_5_1","unstructured":"Amazon. 2019. Fire TV Stick. https:\/\/www.amazon.com\/dp\/B0791TX5P5?ref=ODS_v2_FS_SMP_TVStick Retrieved August 25, 2019 from Amazon. 2019. Fire TV Stick. https:\/\/www.amazon.com\/dp\/B0791TX5P5?ref=ODS_v2_FS_SMP_TVStick Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_7_1","unstructured":"Piergiovanni Cipolloni. 2017. Universal Android SSL Pinning bypass with Frida. https:\/\/techblog.mediaservice.net\/2017\/07\/universal-android-ssl-pinning-bypass-with-frida\/  Piergiovanni Cipolloni. 2017. Universal Android SSL Pinning bypass with Frida. https:\/\/techblog.mediaservice.net\/2017\/07\/universal-android-ssl-pinning-bypass-with-frida\/"},{"volume-title":"Roku Leads OTT Streaming Devices in Household Market Share. https:\/\/www.comscore.com\/ita\/Public-Relations\/Blog\/Roku-Leads-OTT-Streaming-Devices-in-Household-Market-Share Retrieved","year":"2019","key":"e_1_3_2_2_8_1","unstructured":"Comscore. 2016. Roku Leads OTT Streaming Devices in Household Market Share. https:\/\/www.comscore.com\/ita\/Public-Relations\/Blog\/Roku-Leads-OTT-Streaming-Devices-in-Household-Market-Share Retrieved August 25, 2019 from Comscore. 2016. Roku Leads OTT Streaming Devices in Household Market Share. https:\/\/www.comscore.com\/ita\/Public-Relations\/Blog\/Roku-Leads-OTT-Streaming-Devices-in-Household-Market-Share Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Dave Cooper. 2008. Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. (2008). https:\/\/tools.ietf.org\/html\/rfc5280  Dave Cooper. 2008. Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. (2008). https:\/\/tools.ietf.org\/html\/rfc5280","DOI":"10.17487\/rfc5280"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243860"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660325"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23390"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0005"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502681"},{"key":"e_1_3_2_2_15_1","unstructured":"Disconnect. 2018. Disconnect defends the digital you. https:\/\/disconnect.me\/.  Disconnect. 2018. Disconnect defends the digital you. https:\/\/disconnect.me\/."},{"key":"e_1_3_2_2_16_1","unstructured":"EasyList. 2019. Overview. https:\/\/easylist.to\/.  EasyList. 2019. Overview. https:\/\/easylist.to\/."},{"key":"e_1_3_2_2_17_1","unstructured":"EasyPrivacy. 2019. EasyPrivacy. https:\/\/easylist.to\/tag\/easyprivacy.html.  EasyPrivacy. 2019. EasyPrivacy. https:\/\/easylist.to\/tag\/easyprivacy.html."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881152"},{"volume-title":"US Connected TV Users, by Brand","year":"2018","key":"e_1_3_2_2_19_1","unstructured":"eMarketer. 2018. US Connected TV Users, by Brand , 2018 & 2022. https:\/\/www.emarketer.com\/Chart\/US-Connected-TV-Users-by-Brand-2018--2022-of-connected-TV-users\/220767 Retrieved August 25, 2019 from eMarketer. 2018. US Connected TV Users, by Brand, 2018 & 2022. https:\/\/www.emarketer.com\/Chart\/US-Connected-TV-Users-by-Brand-2018--2022-of-connected-TV-users\/220767 Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_20_1","volume-title":"Roku is winning the connected TV race, and Amazon probably won't catch up anytime soon. https:\/\/www.businessinsider.com\/roku-is-winning-the-connected-tv-race-ahead-of-amazon-2018--7 Retrieved","author":"Enberg Jasmine","year":"2019","unstructured":"Jasmine Enberg . 2018. Roku is winning the connected TV race, and Amazon probably won't catch up anytime soon. https:\/\/www.businessinsider.com\/roku-is-winning-the-connected-tv-race-ahead-of-amazon-2018--7 Retrieved August 25, 2019 from Jasmine Enberg. 2018. Roku is winning the connected TV race, and Amazon probably won't catch up anytime soon. https:\/\/www.businessinsider.com\/roku-is-winning-the-connected-tv-race-ahead-of-amazon-2018--7 Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0006"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741679"},{"key":"e_1_3_2_2_25_1","volume-title":"State of OTT: An in-depth look at today's over-the-top content consumption and device usage. https:\/\/www.aaaa.org\/wp-content\/uploads\/2017\/07\/ComScore-State-of-OTT.pdf Retrieved","author":"Engleson Susan","year":"2019","unstructured":"Susan Engleson . 2018. State of OTT: An in-depth look at today's over-the-top content consumption and device usage. https:\/\/www.aaaa.org\/wp-content\/uploads\/2017\/07\/ComScore-State-of-OTT.pdf Retrieved August 25, 2019 from Susan Engleson. 2018. State of OTT: An in-depth look at today's over-the-top content consumption and device usage. https:\/\/www.aaaa.org\/wp-content\/uploads\/2017\/07\/ComScore-State-of-OTT.pdf Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_2_2_27_1","volume-title":"Fingerprinting Web Users Through Font Metrics. In International Conference on Financial Cryptography and Data Security. Springer, 107--124","author":"Fifield David","year":"2015","unstructured":"David Fifield and Serge Egelman . 2015 . Fingerprinting Web Users Through Font Metrics. In International Conference on Financial Cryptography and Data Security. Springer, 107--124 . David Fifield and Serge Egelman. 2015. Fingerprinting Web Users Through Font Metrics. In International Conference on Financial Cryptography and Data Security. Springer, 107--124."},{"key":"e_1_3_2_2_28_1","volume-title":"Public Suffix List. https:\/\/publicsuffix.org\/ Retrieved","author":"Foundation Mozilla","year":"2019","unstructured":"Mozilla Foundation . 2019. Public Suffix List. https:\/\/publicsuffix.org\/ Retrieved August 25, 2019 from Mozilla Foundation. 2019. Public Suffix List. https:\/\/publicsuffix.org\/ Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_29_1","unstructured":"Frida. 2019. A world-class dynamic instrumentation framework. https:\/\/www.frida.re\/  Frida. 2019. A world-class dynamic instrumentation framework. https:\/\/www.frida.re\/"},{"volume-title":"Ghostery Makes the Web Cleaner, Faster and Safer! https:\/\/www.ghostery.com\/ Retrieved","year":"2019","key":"e_1_3_2_2_30_1","unstructured":"Ghostery. 2019. Ghostery Makes the Web Cleaner, Faster and Safer! https:\/\/www.ghostery.com\/ Retrieved August 25, 2019 from Ghostery. 2019. Ghostery Makes the Web Cleaner, Faster and Safer! https:\/\/www.ghostery.com\/ Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0051"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_2_33_1","unstructured":"Apple Inc. 2019. Preventing Insecure Network Connections | Apple Developer Documentation. https:\/\/developer.apple.com\/documentation\/security\/preventing_insecure_network_connections.  Apple Inc. 2019. Preventing Insecure Network Connections | Apple Developer Documentation. https:\/\/developer.apple.com\/documentation\/security\/preventing_insecure_network_connections."},{"key":"e_1_3_2_2_34_1","unstructured":"KAFEINE. 2016. Home Routers Under Attack via Malvertising on Windows Android Devices. https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/home-routers-under-attack-malvertising-windows-android-devices.  KAFEINE. 2016. Home Routers Under Attack via Malvertising on Windows Android Devices. https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/home-routers-under-attack-malvertising-windows-android-devices."},{"key":"e_1_3_2_2_35_1","unstructured":"Samy Kamkar. 2019. evercookie - virtually irrevocable persistent cookies. https:\/\/samy.pl\/evercookie\/.  Samy Kamkar. 2019. evercookie - virtually irrevocable persistent cookies. https:\/\/samy.pl\/evercookie\/."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526782"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0027"},{"key":"e_1_3_2_2_38_1","volume-title":"Roku's Advertising Revenue Will Surpass Its Player Revenue This Year. https:\/\/www.fool.com\/investing\/2018\/03\/26\/rokus-advertising-revenue-will-surpass-its-player.aspx Retrieved","author":"Levy Adam","year":"2019","unstructured":"Adam Levy . 2018. Roku's Advertising Revenue Will Surpass Its Player Revenue This Year. https:\/\/www.fool.com\/investing\/2018\/03\/26\/rokus-advertising-revenue-will-surpass-its-player.aspx Retrieved August 25, 2019 from Adam Levy. 2018. Roku's Advertising Revenue Will Surpass Its Player Revenue This Year. https:\/\/www.fool.com\/investing\/2018\/03\/26\/rokus-advertising-revenue-will-surpass-its-player.aspx Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_39_1","volume-title":"International Journal of Communication","author":"Libert Timothy","year":"2015","unstructured":"Timothy Libert . 2015. Exposing the Hidden Web: An Analysis of Third-Party HTTP Requests on One Million Websites . International Journal of Communication ( 2015 ). Timothy Libert. 2015. Exposing the Hidden Web: An Analysis of Third-Party HTTP Requests on One Million Websites. International Journal of Communication (2015)."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139938"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2018.23016"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"e_1_3_2_2_43_1","unstructured":"mitmproxy. 2019. How mitmproxy works. https:\/\/docs.mitmproxy.org\/stable\/concepts-howmitmproxyworks\/.  mitmproxy. 2019. How mitmproxy works. https:\/\/docs.mitmproxy.org\/stable\/concepts-howmitmproxyworks\/."},{"key":"e_1_3_2_2_44_1","volume-title":"Proceedings of W2SP","volume":"2","author":"Mowery Keaton","year":"2011","unstructured":"Keaton Mowery , Dillon Bogenreif , Scott Yilek , and Hovav Shacham . 2011 . Fingerprinting Information in JavaScript Implementations . In Proceedings of W2SP , Vol. 2 . Keaton Mowery, Dillon Bogenreif, Scott Yilek, and Hovav Shacham. 2011. Fingerprinting Information in JavaScript Implementations. In Proceedings of W2SP, Vol. 2."},{"key":"e_1_3_2_2_45_1","volume-title":"Proceedings of Web 2.0 Security and Privacy Workshop (W2SP) .","author":"Mowery Keaton","year":"2012","unstructured":"Keaton Mowery and Hovav Shacham . 2012 . Pixel perfect: Fingerprinting canvas in HTML5 . In Proceedings of Web 2.0 Security and Privacy Workshop (W2SP) . Keaton Mowery and Hovav Shacham. 2012. Pixel perfect: Fingerprinting canvas in HTML5. In Proceedings of Web 2.0 Security and Privacy Workshop (W2SP) ."},{"key":"e_1_3_2_2_46_1","volume-title":"2019 a. NSS Key Log Format. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Projects\/NSS\/Key_Log_Format Retrieved","author":"Web Docs Mozilla MDN","year":"2019","unstructured":"MDN Web Docs Mozilla . 2019 a. NSS Key Log Format. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Projects\/NSS\/Key_Log_Format Retrieved August 25, 2019 from MDN Web Docs Mozilla. 2019 a. NSS Key Log Format. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Projects\/NSS\/Key_Log_Format Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_47_1","volume-title":"2019 b. Same-origin policy. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Security\/Same-origin_policy Retrieved","author":"Web Docs Mozilla MDN","year":"2019","unstructured":"MDN Web Docs Mozilla . 2019 b. Same-origin policy. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Security\/Same-origin_policy Retrieved August 25, 2019 from MDN Web Docs Mozilla. 2019 b. Same-origin policy. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Security\/Same-origin_policy Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.31"},{"key":"e_1_3_2_2_49_1","unstructured":"Inc. Netflix. 2018. DIAL. http:\/\/www.dial-multiscreen.org\/.  Inc. Netflix. 2018. DIAL. http:\/\/www.dial-multiscreen.org\/."},{"key":"e_1_3_2_2_50_1","unstructured":"Lily Hay Newman. 2019. Millions of Google Roku and Sonos Devices Are Vulnerable to a Web Attack | WIRED. https:\/\/www.wired.com\/story\/chromecast-roku-sonos-dns-rebinding-vulnerability\/.  Lily Hay Newman. 2019. Millions of Google Roku and Sonos Devices Are Vulnerable to a Web Attack | WIRED. https:\/\/www.wired.com\/story\/chromecast-roku-sonos-dns-rebinding-vulnerability\/."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382274"},{"key":"e_1_3_2_2_52_1","volume-title":"Roku Is Beefing Up Ad Targeting in a Big Way. https:\/\/www.fool.com\/investing\/2018\/06\/27\/roku-is-beefing-up-ad-targeting-in-a-big-way.aspx Retrieved","author":"Niu Evan","year":"2019","unstructured":"Evan Niu . 2018. Roku Is Beefing Up Ad Targeting in a Big Way. https:\/\/www.fool.com\/investing\/2018\/06\/27\/roku-is-beefing-up-ad-targeting-in-a-big-way.aspx Retrieved August 25, 2019 from Evan Niu. 2018. Roku Is Beefing Up Ad Targeting in a Big Way. https:\/\/www.fool.com\/investing\/2018\/06\/27\/roku-is-beefing-up-ad-targeting-in-a-big-way.aspx Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_53_1","unstructured":"Lukasz Olejnik. 2017. Stealing sensitive browser data with the W3C Ambient Light Sensor API. https:\/\/blog.lukaszolejnik.com\/stealing-sensitive-browser-data-with-the-w3c-ambient-light-sensor-api\/.  Lukasz Olejnik. 2017. Stealing sensitive browser data with the W3C Ambient Light Sensor API. https:\/\/blog.lukaszolejnik.com\/stealing-sensitive-browser-data-with-the-w3c-ambient-light-sensor-api\/."},{"key":"e_1_3_2_2_54_1","volume-title":"International Workshop on Data Privacy Management. 254--263","author":"Olejnik Lukasz","year":"2015","unstructured":"Lukasz Olejnik , Gunes Acar , Claude Castelluccia , and Claudia Diaz . 2015 . The leaking battery A privacy analysis of the HTML5 Battery Status API . In International Workshop on Data Privacy Management. 254--263 . Lukasz Olejnik, Gunes Acar, Claude Castelluccia, and Claudia Diaz. 2015. The leaking battery A privacy analysis of the HTML5 Battery Status API. In International Workshop on Data Privacy Management. 254--263."},{"key":"e_1_3_2_2_55_1","volume-title":"Certificate and Public Key Pinning. https:\/\/www.owasp.org\/index.php\/Certificate_and_Public_Key_Pinning Retrieved","author":"Application Security Open Web","year":"2019","unstructured":"Open Web Application Security Project (OWASP). 2019. Certificate and Public Key Pinning. https:\/\/www.owasp.org\/index.php\/Certificate_and_Public_Key_Pinning Retrieved August 25, 2019 from Open Web Application Security Project (OWASP). 2019. Certificate and Public Key Pinning. https:\/\/www.owasp.org\/index.php\/Certificate_and_Public_Key_Pinning Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_56_1","volume-title":"Taking the smarts out of smart TVs would make them more expensive. https:\/\/www.theverge.com\/2019\/1\/7\/18172397\/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019 Retrieved","author":"Pate Nilay","year":"2019","unstructured":"Nilay Pate . 2019. Taking the smarts out of smart TVs would make them more expensive. https:\/\/www.theverge.com\/2019\/1\/7\/18172397\/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019 Retrieved August 25, 2019 from Nilay Pate. 2019. Taking the smarts out of smart TVs would make them more expensive. https:\/\/www.theverge.com\/2019\/1\/7\/18172397\/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019 Retrieved August 25, 2019 from"},{"volume-title":"Pi-hole\u00ae: A black hole for Internet advertisements. https:\/\/pi-hole.net\/.","year":"2019","key":"e_1_3_2_2_57_1","unstructured":"Pi-hole\u00ae. 2019 . Pi-hole\u00ae: A black hole for Internet advertisements. https:\/\/pi-hole.net\/. Pi-hole\u00ae. 2019. Pi-hole\u00ae: A black hole for Internet advertisements. https:\/\/pi-hole.net\/."},{"key":"e_1_3_2_2_59_1","unstructured":"Abbas Razaghpanah Rishab Nithyanand Narseo Vallina-Rodriguez Srikanth Sundaresan Mark Allman and Christian Kreibich Phillipa Gill. 2018. Apps Trackers Privacy and Regulators. (2018).  Abbas Razaghpanah Rishab Nithyanand Narseo Vallina-Rodriguez Srikanth Sundaresan Mark Allman and Christian Kreibich Phillipa Gill. 2018. Apps Trackers Privacy and Regulators. (2018)."},{"key":"e_1_3_2_2_60_1","unstructured":"FTC Press Releases. 2017. VIZIO to Pay $2.2 Million to FTC State of New Jersey to Settle Charges It Collected Viewing Histories on 11 Million Smart Televisions without Users' Consent.  FTC Press Releases. 2017. VIZIO to Pay $2.2 Million to FTC State of New Jersey to Settle Charges It Collected Viewing Histories on 11 Million Smart Televisions without Users' Consent."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906392"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0021"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228315"},{"key":"e_1_3_2_2_64_1","volume-title":"https:\/\/developer.roku.com\/docs\/references\/brightscript\/interfaces\/ifdeviceinfo.md#getrida-as-dynamic Retrieved","author":"Documentation Developers","year":"2019","unstructured":"Roku. 2019. Developers Documentation . https:\/\/developer.roku.com\/docs\/references\/brightscript\/interfaces\/ifdeviceinfo.md#getrida-as-dynamic Retrieved August 25, 2019 from Roku. 2019. Developers Documentation. https:\/\/developer.roku.com\/docs\/references\/brightscript\/interfaces\/ifdeviceinfo.md#getrida-as-dynamic Retrieved August 25, 2019 from"},{"volume-title":"External Control Protocol (ECP). https:\/\/developer.roku.com\/docs\/developer-program\/discovery\/external-control-api.md Retrieved","year":"2019","key":"e_1_3_2_2_65_1","unstructured":"Roku. 2019. External Control Protocol (ECP). https:\/\/developer.roku.com\/docs\/developer-program\/discovery\/external-control-api.md Retrieved August 25, 2019 from Roku. 2019. External Control Protocol (ECP). https:\/\/developer.roku.com\/docs\/developer-program\/discovery\/external-control-api.md Retrieved August 25, 2019 from"},{"volume-title":"Integrating the Roku Advertising Framework. https:\/\/developer.roku.com\/docs\/developer-program\/advertising\/integrating-roku-advertising-framework.md Retrieved","year":"2019","key":"e_1_3_2_2_66_1","unstructured":"Roku. 2019. Integrating the Roku Advertising Framework. https:\/\/developer.roku.com\/docs\/developer-program\/advertising\/integrating-roku-advertising-framework.md Retrieved August 25, 2019 from Roku. 2019. Integrating the Roku Advertising Framework. https:\/\/developer.roku.com\/docs\/developer-program\/advertising\/integrating-roku-advertising-framework.md Retrieved August 25, 2019 from"},{"volume-title":"Roku Channel Store. https:\/\/channelstore.roku.com\/browse Retrieved","year":"2019","key":"e_1_3_2_2_67_1","unstructured":"Roku. 2019. Roku Channel Store. https:\/\/channelstore.roku.com\/browse Retrieved August 25, 2019 from Roku. 2019. Roku Channel Store. https:\/\/channelstore.roku.com\/browse Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_68_1","volume-title":"https:\/\/developer.roku.com\/develop\/platform-features\/compliance Retrieved","author":"Compliance Roku","year":"2019","unstructured":"Roku. 2019. Roku Compliance . https:\/\/developer.roku.com\/develop\/platform-features\/compliance Retrieved August 25, 2019 from Roku. 2019. Roku Compliance. https:\/\/developer.roku.com\/develop\/platform-features\/compliance Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_69_1","volume-title":"https:\/\/www.roku.com\/products\/roku-express Retrieved","author":"Express Roku","year":"2019","unstructured":"Roku. 2019. Roku Express . https:\/\/www.roku.com\/products\/roku-express Retrieved August 25, 2019 from Roku. 2019. Roku Express. https:\/\/www.roku.com\/products\/roku-express Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_70_1","unstructured":"Elias Saba. 2019. Amazon Fire TV Stick 2 has been Rooted for the first time. http:\/\/www.aftvnews.com\/amazon-fire-tv-stick-2-has-been-rooted-for-the-first-time\/ Retrieved August 25 2019 from  Elias Saba. 2019. Amazon Fire TV Stick 2 has been Rooted for the first time. http:\/\/www.aftvnews.com\/amazon-fire-tv-stick-2-has-been-rooted-for-the-first-time\/ Retrieved August 25 2019 from"},{"volume-title":"Selenium - Web Browser Automation. https:\/\/www.seleniumhq.org\/ Retrieved","year":"2019","key":"e_1_3_2_2_71_1","unstructured":"Selenium. 2019. Selenium - Web Browser Automation. https:\/\/www.seleniumhq.org\/ Retrieved August 25, 2019 from Selenium. 2019. Selenium - Web Browser Automation. https:\/\/www.seleniumhq.org\/ Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_72_1","unstructured":"Sensepost. 2019. sensepost\/objection. https:\/\/github.com\/sensepost\/objection  Sensepost. 2019. sensepost\/objection. https:\/\/github.com\/sensepost\/objection"},{"key":"e_1_3_2_2_73_1","volume-title":"Inside Roku's battle to control the future of TV advertising - and why it better watch out for Amazon. https:\/\/www.businessinsider.com\/roku-wants-to-control-the-future-of-tv-ads Retrieved","author":"Shields Mike","year":"2019","unstructured":"Mike Shields . 2018. Inside Roku's battle to control the future of TV advertising - and why it better watch out for Amazon. https:\/\/www.businessinsider.com\/roku-wants-to-control-the-future-of-tv-ads Retrieved August 25, 2019 from Mike Shields. 2018. Inside Roku's battle to control the future of TV advertising - and why it better watch out for Amazon. https:\/\/www.businessinsider.com\/roku-wants-to-control-the-future-of-tv-ads Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_74_1","series-title":"In 2010 AAAI Spring Symposium Series","volume-title":"Flash cookies and privacy","author":"Soltani Ashkan","unstructured":"Ashkan Soltani , Shannon Canty , Quentin Mayo , Lauren Thomas , and Chris Jay Hoofnagle . 2010. Flash cookies and privacy . In 2010 AAAI Spring Symposium Series . Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas, and Chris Jay Hoofnagle. 2010. Flash cookies and privacy. In 2010 AAAI Spring Symposium Series ."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77048-0_38"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052596"},{"key":"e_1_3_2_2_77_1","volume-title":"Over One Third of US Households Will Cut the Cord by","author":"Tingley Brett","year":"2020","unstructured":"Brett Tingley . 2018. Over One Third of US Households Will Cut the Cord by 2020 . https:\/\/www.streamingobserver.com\/over-one-third-of-us-households-will-cut-the-cord-by-2020\/ Retrieved August 25, 2019 from Brett Tingley. 2018. Over One Third of US Households Will Cut the Cord by 2020. https:\/\/www.streamingobserver.com\/over-one-third-of-us-households-will-cut-the-cord-by-2020\/ Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_78_1","volume-title":"Remote Control Input. https:\/\/developer.amazon.com\/docs\/fire-tv\/remote-input.html Retrieved","author":"Amazon Fire TV.","year":"2019","unstructured":"Amazon Fire TV. 2019. Remote Control Input. https:\/\/developer.amazon.com\/docs\/fire-tv\/remote-input.html Retrieved August 25, 2019 from Amazon Fire TV. 2019. Remote Control Input. https:\/\/developer.amazon.com\/docs\/fire-tv\/remote-input.html Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_79_1","unstructured":"Daniel Veditz. 2011. Rizzo\/Duong chosen plaintext attack (BEAST) on SSL\/TLS 1.0 (facilitated by websockets -76). Technical Report. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=665814  Daniel Veditz. 2011. Rizzo\/Duong chosen plaintext attack (BEAST) on SSL\/TLS 1.0 (facilitated by websockets -76). Technical Report. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=665814"},{"volume-title":"WiGLE: Wireless Network Mapping. https:\/\/wigle.net\/ Retrieved","year":"2019","key":"e_1_3_2_2_80_1","unstructured":"WiGLE.net. 2019. WiGLE: Wireless Network Mapping. https:\/\/wigle.net\/ Retrieved August 25, 2019 from WiGLE.net. 2019. WiGLE: Wireless Network Mapping. https:\/\/wigle.net\/ Retrieved August 25, 2019 from"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139939"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486008"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354198","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354198","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:02Z","timestamp":1750202642000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354198"}},"subtitle":["The Tracking Ecosystem of Over-the-Top TV Streaming Devices"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":80,"alternative-id":["10.1145\/3319535.3354198","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354198","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}