{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T22:36:18Z","timestamp":1777674978126,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1703375"],"award-info":[{"award-number":["CNS-1703375"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-17-1-2541"],"award-info":[{"award-number":["N00014-17-1-2541"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-19-C-0003"],"award-info":[{"award-number":["FA8750-19-C-0003"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3355369.3355599","type":"proceedings-article","created":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T12:57:15Z","timestamp":1571403435000},"page":"393-405","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["VisibleV8"],"prefix":"10.1145","author":[{"given":"Jordan","family":"Jueckstock","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"Alexandros","family":"Kapravelos","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Understanding web","year":"2014","unstructured":"2014. Understanding web pages better. https:\/\/webmasters.googleblog.com\/ 2014 \/05\/understanding-web-pages-better.html. (2014). Accessed : 2019-8-19. 2014. Understanding web pages better. https:\/\/webmasters.googleblog.com\/2014\/05\/understanding-web-pages-better.html. (2014). Accessed: 2019-8-19."},{"key":"e_1_3_2_1_2_1","unstructured":"2016. javascript - Can a website detect when you are using selenium with chromedriver? https:\/\/stackoverflow.com\/a\/41220267. (2016). Accessed: 2018-11-15.  2016. javascript - Can a website detect when you are using selenium with chromedriver? https:\/\/stackoverflow.com\/a\/41220267. (2016). Accessed: 2018-11-15."},{"key":"e_1_3_2_1_3_1","unstructured":"2017. Bug 1424176. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1424176. (2017). Accessed: 2018-11-15.  2017. Bug 1424176. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1424176. (2017). Accessed: 2018-11-15."},{"key":"e_1_3_2_1_4_1","unstructured":"2017. Issue 793217. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=793217. (2017). Accessed: 2018-11-15.  2017. Issue 793217. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=793217. (2017). Accessed: 2018-11-15."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. marmelab\/gremlins.js: Monkey testing library for web apps and Node.js. https:\/\/github.com\/marmelab\/gremlins.js. (2018). Accessed: 2018-11-15.  2018. marmelab\/gremlins.js: Monkey testing library for web apps and Node.js. https:\/\/github.com\/marmelab\/gremlins.js. (2018). Accessed: 2018-11-15."},{"key":"e_1_3_2_1_6_1","volume-title":"The State of the Octoverse: top programming languages of","year":"2018","unstructured":"2018. The State of the Octoverse: top programming languages of 2018 . https:\/\/github.blog\/2018-11-15-state-of-the-octoverse-top-programming-languages\/. (2018). Accessed: 2019-5-8. 2018. The State of the Octoverse: top programming languages of 2018. https:\/\/github.blog\/2018-11-15-state-of-the-octoverse-top-programming-languages\/. (2018). Accessed: 2019-5-8."},{"key":"e_1_3_2_1_7_1","unstructured":"2018. WebIDL Level 1. https:\/\/www.w3.org\/TR\/WebIDL-1\/. (2018). Accessed: 2018-11-15.  2018. WebIDL Level 1. https:\/\/www.w3.org\/TR\/WebIDL-1\/. (2018). Accessed: 2018-11-15."},{"key":"e_1_3_2_1_8_1","unstructured":"2019. BrowserBench.org. https:\/\/browserbench.org\/. (2019). Accessed: 2019-1-25.  2019. BrowserBench.org. https:\/\/browserbench.org\/. (2019). Accessed: 2019-1-25."},{"key":"e_1_3_2_1_9_1","unstructured":"2019. Dromaeo. http:\/\/dromaeo.com\/?recommended. (2019). Accessed: 2019-1-25.  2019. Dromaeo. http:\/\/dromaeo.com\/?recommended. (2019). Accessed: 2019-1-25."},{"key":"e_1_3_2_1_10_1","volume-title":"PhantomJS - Scriptable Headless Browser","unstructured":"2019. PhantomJS - Scriptable Headless Browser . http:\/\/phantomjs.org\/. (2019). Accessed: 2019-2-1. 2019. PhantomJS - Scriptable Headless Browser. http:\/\/phantomjs.org\/. (2019). Accessed: 2019-2-1."},{"key":"e_1_3_2_1_11_1","unstructured":"2019. Selenium - Web Browser Automation. https:\/\/docs.seleniumhq.org\/. (2019). Accessed: 2019-2-1.  2019. Selenium - Web Browser Automation. https:\/\/docs.seleniumhq.org\/. (2019). Accessed: 2019-2-1."},{"key":"e_1_3_2_1_12_1","volume-title":"The RedMonk Programming Language Rankings","year":"2019","unstructured":"2019. The RedMonk Programming Language Rankings : January 2019 . https:\/\/redmonk.com\/sogrady\/2019\/03\/20\/language-rankings-1-19\/. (2019). Accessed: 2019-5-8. 2019. The RedMonk Programming Language Rankings: January 2019. https:\/\/redmonk.com\/sogrady\/2019\/03\/20\/language-rankings-1-19\/. (2019). Accessed: 2019-5-8."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420952"},{"key":"e_1_3_2_1_15_1","volume-title":"Computer Security Technology Planning Study","author":"Anderson James P","unstructured":"James P Anderson . 1972. Computer Security Technology Planning Study . Volume 2 . Technical Report. Anderson (James P) and Co Fort Washington PA. James P Anderson. 1972. Computer Security Technology Planning Study. Volume 2. Technical Report. Anderson (James P) and Co Fort Washington PA."},{"key":"e_1_3_2_1_16_1","unstructured":"Marc Andreessen. 2011. Why Software is Eating the World. https:\/\/www.wsj.com\/articles\/SB10001424053111903480904576512250915629460. (2011). Accessed: 2018-04-20.  Marc Andreessen. 2011. Why Software is Eating the World. https:\/\/www.wsj.com\/articles\/SB10001424053111903480904576512250915629460. (2011). Accessed: 2018-04-20."},{"key":"e_1_3_2_1_17_1","volume-title":"Deterministic Browser. In Proceedings of the ACM Conference on Computer and Communications Security (CCS).","author":"Cao Yinzhi","year":"2017","unstructured":"Yinzhi Cao , Zhanhao Chen , Song Li , and Shujiang Wu . 2017 . Deterministic Browser. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). Yinzhi Cao, Zhanhao Chen, Song Li, and Shujiang Wu. 2017. Deterministic Browser. In Proceedings of the ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414460"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243823"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813684"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243860"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.50"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Jacob Gregoire","year":"2012","unstructured":"Gregoire Jacob , Engin Kirda , Christopher Kruegel , and Giovanni Vigna . 2012 . PUBCRAWL: Protecting Users and Businesses from CRAWLers . In Proceedings of the USENIX Security Symposium. Gregoire Jacob, Engin Kirda, Christopher Kruegel, and Giovanni Vigna. 2012. PUBCRAWL: Protecting Users and Businesses from CRAWLers. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336758"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the USENIX Security Symposium. USENIX.","author":"Kapravelos Alexandros","year":"2014","unstructured":"Alexandros Kapravelos , Chris Grier , Neha Chachra , Chris Kruegel , Giovanni Vigna , and Vern Paxson . 2014 . Hulk: Eliciting Malicious Behavior in Browser Extensions . In Proceedings of the USENIX Security Symposium. USENIX. Alexandros Kapravelos, Chris Grier, Neha Chachra, Chris Kruegel, Giovanni Vigna, and Vern Paxson. 2014. Hulk: Eliciting Malicious Behavior in Browser Extensions. In Proceedings of the USENIX Security Symposium. USENIX."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Kapravelos Alexandros","year":"2013","unstructured":"Alexandros Kapravelos , Yan Shoshitaishvili , Marco Cova , Chris Kruegel , and Giovanni Vigna . 2013 . Revolver: An Automated Approach to the Detection of Evasive Web-based Malware . In Proceedings of the USENIX Security Symposium. Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Chris Kruegel, and Giovanni Vigna. 2013. Revolver: An Automated Approach to the Detection of Evasive Web-based Malware. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.48"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23414"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134091"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516703"},{"key":"e_1_3_2_1_33_1","volume-title":"Kyu Hyung Lee, and Roberto Perdisci","author":"Li Bo","year":"2018","unstructured":"Bo Li , Phani Vadrevu , Kyu Hyung Lee, and Roberto Perdisci . 2018 . JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions. In NDSS. Bo Li, Phani Vadrevu, Kyu Hyung Lee, and Roberto Perdisci. 2018. JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions. In NDSS."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Li Z.","unstructured":"Z. Li , S. Alrwais , X. Wang , and E. Alowaisheq . 2014. Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections . In Proceedings of the IEEE Symposium on Security and Privacy. Z. Li, S. Alrwais, X. Wang, and E. Alowaisheq. 2014. Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections. In Proceedings of the IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Mayer J. R.","unstructured":"J. R. Mayer and J. C. Mitchell . 2012. Third-Party Web Tracking: Policy and Technology . In Proceedings of the IEEE Symposium on Security and Privacy. J. R. Mayer and J. C. Mitchell. 2012. Third-Party Web Tracking: Policy and Technology. In Proceedings of the IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.26"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.36"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23163"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of W2SP.","author":"Mowery Keaton","year":"2011","unstructured":"Keaton Mowery , Dillon Bogenreif , Scott Yilek , and Hovav Shacham . 2011 . Fingerprinting information in JavaScript implementations . In Proceedings of W2SP. Keaton Mowery, Dillon Bogenreif, Scott Yilek, and Hovav Shacham. 2011. Fingerprinting information in JavaScript implementations. In Proceedings of W2SP."},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of W2SP.","author":"Mulazzani Martin","year":"2013","unstructured":"Martin Mulazzani , Philipp Reschl , Markus Huber , Manuel Leithner , Sebastian Schrittwieser , and Edgar Weippl . 2013 . Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting . In Proceedings of W2SP. Martin Mulazzani, Philipp Reschl, Markus Huber, Manuel Leithner, Sebastian Schrittwieser, and Edgar Weippl. 2013. Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting. In Proceedings of W2SP."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813656"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security (CCS).","author":"Nikiforakis Nick","year":"2012","unstructured":"Nick Nikiforakis , Luca Invernizzi , Alexandros Kapravelos , Steven Van Acker , Wouter Joosen , Christopher Kruegel , Frank Piessens , and Giovanni Vigna . 2012 . ou Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions . In Proceedings of the ACM Conference on Computer and Communications Security (CCS). Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, and Giovanni Vigna. 2012. ou Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions. In Proceedings of the ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533067"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22655-7_4"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design & Implementation.","author":"Roesner Franziska","year":"2012","unstructured":"Franziska Roesner , Tadayoshi Kohno , and David Wetherall . 2012 . Detecting and Defending Against Third-Party Tracking on the Web . In Proceedings of the USENIX Symposium on Networked Systems Design & Implementation. Franziska Roesner, Tadayoshi Kohno, and David Wetherall. 2012. Detecting and Defending Against Third-Party Tracking on the Web. In Proceedings of the USENIX Symposium on Networked Systems Design & Implementation."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.38"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23094"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Singh K.","unstructured":"K. Singh , A. Moshchuk , H.J. Wang , and W. Lee . 2010. On the Incoherencies in Web Browser Access Control Policies . In Proceedings of the IEEE Symposium on Security and Privacy. K. Singh, A. Moshchuk, H.J. Wang, and W. Lee. 2010. On the Incoherencies in Web Browser Access Control Policies. In Proceedings of the IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987466"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133966"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813625"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the 3rd USENIX Conference on Web Application Development. USENIX.","author":"Terrace Jeff","year":"2012","unstructured":"Jeff Terrace , Stephen R Beard , and Naga Praveen Kumar Katta . 2012 . JavaScript in JavaScript (js.js): Sandboxing Third-Party Scripts . In Proceedings of the 3rd USENIX Conference on Web Application Development. USENIX. Jeff Terrace, Stephen R Beard, and Naga Praveen Kumar Katta. 2012. JavaScript in JavaScript (js.js): Sandboxing Third-Party Scripts. In Proceedings of the 3rd USENIX Conference on Web Application Development. USENIX."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_25"},{"key":"e_1_3_2_1_54_1","unstructured":"Antoine Vastel. 2019. Fingerprint-Scanner. https:\/\/github.com\/antoinevastel\/fpscanner\/.(2019). Accessed: 2019-2-1.  Antoine Vastel. 2019. Fingerprint-Scanner. https:\/\/github.com\/antoinevastel\/fpscanner\/.(2019). Accessed: 2019-2-1."},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Vastel Antoine","year":"2018","unstructured":"Antoine Vastel , Pierre Laperdrix , Walter Rudametkin , and Romain Rouvoy . 2018 . Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies . In Proceedings of the USENIX Security Symposium. Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. 2018. Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435364"}],"event":{"name":"IMC '19: ACM Internet Measurement Conference","location":"Amsterdam Netherlands","acronym":"IMC '19","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3355369.3355599","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3355369.3355599","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3355369.3355599","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:33Z","timestamp":1750202613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3355369.3355599"}},"subtitle":["In-browser Monitoring of JavaScript in the Wild"],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":55,"alternative-id":["10.1145\/3355369.3355599","10.1145\/3355369"],"URL":"https:\/\/doi.org\/10.1145\/3355369.3355599","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}