{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T22:31:38Z","timestamp":1777674698262,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1849997"],"award-info":[{"award-number":["CNS-1849997"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,24]]},"DOI":"10.1145\/3433210.3437536","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T15:26:39Z","timestamp":1622820399000},"page":"644-657","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Understanding the Privacy Implications of Adblock Plus's Acceptable Ads"],"prefix":"10.1145","author":[{"given":"Ahsan","family":"Zafar","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Aafaq","family":"Sabir","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Dilawer","family":"Ahmed","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Anupam","family":"Das","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2007. uBlock Origin. https:\/\/github.com\/gorhill\/uBlock\/  2007. uBlock Origin. https:\/\/github.com\/gorhill\/uBlock\/"},{"key":"e_1_3_2_2_2_1","unstructured":"2013. Fanboy merges with easylist. https:\/\/easylist.to\/2013\/05\/17\/easylist-merges-with-fanboy-s-list.html.  2013. Fanboy merges with easylist. https:\/\/easylist.to\/2013\/05\/17\/easylist-merges-with-fanboy-s-list.html."},{"key":"e_1_3_2_2_3_1","unstructured":"2013. Google search ads added. https:\/\/hg.adblockplus.org\/exceptionrules\/rev\/8bdf815a5291.  2013. Google search ads added. https:\/\/hg.adblockplus.org\/exceptionrules\/rev\/8bdf815a5291."},{"key":"e_1_3_2_2_4_1","unstructured":"2013. InfluAds bought by BuySellAds. http:\/\/www.finsmes.com\/2013\/09\/influads-shuts.html.  2013. InfluAds bought by BuySellAds. http:\/\/www.finsmes.com\/2013\/09\/influads-shuts.html."},{"key":"e_1_3_2_2_5_1","unstructured":"2013. NetDoktor removed. https:\/\/adblockplus.org\/forum\/viewtopic.php?f=12&t=15361.  2013. NetDoktor removed. https:\/\/adblockplus.org\/forum\/viewtopic.php?f=12&t=15361."},{"key":"e_1_3_2_2_6_1","unstructured":"2014. Taboola ads. https:\/\/adblockplus.org\/forum\/viewtopic.php?f=12&t=25991.  2014. Taboola ads. https:\/\/adblockplus.org\/forum\/viewtopic.php?f=12&t=25991."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Adblock Plus 2016. Help Create An Exception To Easy List Filter. Adblock Plus.https:\/\/adblockplus.org\/forum\/viewtopic.php?f=1&t=43814.  Adblock Plus 2016. Help Create An Exception To Easy List Filter. Adblock Plus.https:\/\/adblockplus.org\/forum\/viewtopic.php?f=1&t=43814.","DOI":"10.7328\/jurpcb2016317101"},{"key":"e_1_3_2_2_8_1","unstructured":"2016. Problematic filters. https:\/\/forums.lanik.us\/viewtopic.php?f=64&t=44687.  2016. Problematic filters. https:\/\/forums.lanik.us\/viewtopic.php?f=64&t=44687."},{"key":"e_1_3_2_2_9_1","unstructured":"2017. ABP Filter Parser. https:\/\/github.com\/bbondy\/abp-filter-parser  2017. ABP Filter Parser. https:\/\/github.com\/bbondy\/abp-filter-parser"},{"key":"e_1_3_2_2_10_1","unstructured":"2017. Mercurial repository for Adblock Plus's Exception list. https:\/\/hg.adblockplus.org\/exceptionrules\/file.  2017. Mercurial repository for Adblock Plus's Exception list. https:\/\/hg.adblockplus.org\/exceptionrules\/file."},{"key":"e_1_3_2_2_11_1","unstructured":"2017. Removed whitelists for Text ads on parked domains from Uniregistry. https:\/\/hg.adblockplus.org\/exceptionrules\/rev\/2e08652dbcf7.  2017. Removed whitelists for Text ads on parked domains from Uniregistry. https:\/\/hg.adblockplus.org\/exceptionrules\/rev\/2e08652dbcf7."},{"key":"e_1_3_2_2_12_1","unstructured":"2017. Removed whitelists for thought catalog.com ads. https:\/\/hg.adblockplus.org\/exceptionrules\/rev\/2f597226c09.  2017. Removed whitelists for thought catalog.com ads. https:\/\/hg.adblockplus.org\/exceptionrules\/rev\/2f597226c09."},{"key":"e_1_3_2_2_13_1","unstructured":"2018. Restructured partner comments and sections. https:\/\/hg.adblockplus.org\/exceptionrules\/rev\/f65613789b62.  2018. Restructured partner comments and sections. https:\/\/hg.adblockplus.org\/exceptionrules\/rev\/f65613789b62."},{"key":"e_1_3_2_2_14_1","unstructured":"2020. AAC history. https:\/\/eyeo.com\/acceptable-ads-committee-history\/.  2020. AAC history. https:\/\/eyeo.com\/acceptable-ads-committee-history\/."},{"key":"e_1_3_2_2_15_1","unstructured":"Adblock Plus 2020. Acceptable Ads. Adblock Plus. https:\/\/adblockplus.org\/en\/about#monetization  Adblock Plus 2020. Acceptable Ads. Adblock Plus. https:\/\/adblockplus.org\/en\/about#monetization"},{"key":"e_1_3_2_2_16_1","unstructured":"2020. Adblcok Plus. https:\/\/adblockplus.org\/  2020. Adblcok Plus. https:\/\/adblockplus.org\/"},{"key":"e_1_3_2_2_17_1","unstructured":"2020. AdBlock: Block Ads. https:\/\/getadblock.com\/  2020. AdBlock: Block Ads. https:\/\/getadblock.com\/"},{"key":"e_1_3_2_2_18_1","unstructured":"2020. Adblock Plus passes 200 million active users. https:\/\/eyeo.com\/acceptable-ads-by-the-numbers\/  2020. Adblock Plus passes 200 million active users. https:\/\/eyeo.com\/acceptable-ads-by-the-numbers\/"},{"key":"e_1_3_2_2_19_1","unstructured":"Adblock Plus 2020. Allowing acceptable ads in Adblock Plus. Adblock Plus. https:\/\/adblockplus.org\/acceptable-ads.  Adblock Plus 2020. Allowing acceptable ads in Adblock Plus. Adblock Plus. https:\/\/adblockplus.org\/acceptable-ads."},{"key":"e_1_3_2_2_20_1","unstructured":"2020. Brave Browser. https:\/\/brave.com\/  2020. Brave Browser. https:\/\/brave.com\/"},{"key":"e_1_3_2_2_21_1","unstructured":"Adblock Plus 2020. Canonical repository for EasyList. Adblock Plus. https:\/\/easylist-downloads.adblockplus.org\/easylist.txt  Adblock Plus 2020. Canonical repository for EasyList. Adblock Plus. https:\/\/easylist-downloads.adblockplus.org\/easylist.txt"},{"key":"e_1_3_2_2_22_1","unstructured":"Adblock Plus 2020. Canonical repository for Easy Privacy. Adblock Plus. https:\/\/easylist-downloads.adblockplus.org\/easyprivacy.txt  Adblock Plus 2020. Canonical repository for Easy Privacy. Adblock Plus. https:\/\/easylist-downloads.adblockplus.org\/easyprivacy.txt"},{"key":"e_1_3_2_2_23_1","unstructured":"2020. Chrome Har capturer. https:\/\/github.com\/cyrus-and\/chrome-har-capturer.  2020. Chrome Har capturer. https:\/\/github.com\/cyrus-and\/chrome-har-capturer."},{"key":"e_1_3_2_2_24_1","unstructured":"2020. Cliqz. https:\/\/cliqz.com\/en\/desktop  2020. Cliqz. https:\/\/cliqz.com\/en\/desktop"},{"key":"e_1_3_2_2_25_1","unstructured":"2020. Disconnect. https:\/\/disconnect.me\/  2020. Disconnect. https:\/\/disconnect.me\/"},{"key":"e_1_3_2_2_26_1","unstructured":"2020. Disconnect tracker list. https:\/\/github.com\/disconnectme\/disconnect-tracking-protection  2020. Disconnect tracker list. https:\/\/github.com\/disconnectme\/disconnect-tracking-protection"},{"key":"e_1_3_2_2_27_1","unstructured":"2020. Do not track ads. https:\/\/adblockplus.org\/acceptable-ads#privacy-friendly-acceptable-ads.  2020. Do not track ads. https:\/\/adblockplus.org\/acceptable-ads#privacy-friendly-acceptable-ads."},{"key":"e_1_3_2_2_28_1","unstructured":"2020. Double Click tracker stats. https:\/\/whotracks.me\/trackers\/doubleclick.html.  2020. Double Click tracker stats. https:\/\/whotracks.me\/trackers\/doubleclick.html."},{"key":"e_1_3_2_2_29_1","unstructured":"2020. Easy List. https:\/\/easylist.to\/  2020. Easy List. https:\/\/easylist.to\/"},{"key":"e_1_3_2_2_30_1","unstructured":"2020. Easy List GitHub. https:\/\/github.com\/easylist  2020. Easy List GitHub. https:\/\/github.com\/easylist"},{"key":"e_1_3_2_2_31_1","unstructured":"2020. Easy Privacy. https:\/\/easylist.to\/easylist\/easyprivacy.txt  2020. Easy Privacy. https:\/\/easylist.to\/easylist\/easyprivacy.txt"},{"key":"e_1_3_2_2_32_1","unstructured":"2020. Epic Privacy Browser. https:\/\/www.epicbrowser.com\/  2020. Epic Privacy Browser. https:\/\/www.epicbrowser.com\/"},{"key":"e_1_3_2_2_33_1","unstructured":"2020. Get whitelisted. https:\/\/adblockplus.org\/acceptable-ads#get-whitelisted.  2020. Get whitelisted. https:\/\/adblockplus.org\/acceptable-ads#get-whitelisted."},{"key":"e_1_3_2_2_34_1","unstructured":"Cliqz 2020. Ghostery. Cliqz. https:\/\/www.ghostery.com\/  Cliqz 2020. Ghostery. Cliqz. https:\/\/www.ghostery.com\/"},{"key":"e_1_3_2_2_35_1","unstructured":"Adblock Plus 2020. How to write filters. Adblock Plus. https:\/\/help.eyeo.com\/en\/adblockplus\/how-to-write-filters  Adblock Plus 2020. How to write filters. Adblock Plus. https:\/\/help.eyeo.com\/en\/adblockplus\/how-to-write-filters"},{"key":"e_1_3_2_2_36_1","unstructured":"2020. Privacy Badger. https:\/\/www.eff.org\/privacybadger  2020. Privacy Badger. https:\/\/www.eff.org\/privacybadger"},{"key":"e_1_3_2_2_37_1","unstructured":"2020. Tracker List provided by whotracksme. https:\/\/whotracks.me\/trackers.html.  2020. Tracker List provided by whotracksme. https:\/\/whotracks.me\/trackers.html."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_2_39_1","volume-title":"Proceedings of the 20th ACM SIGSAC Conference on Computer and Communications Security (CCS). 1129--1140","author":"Acar Gunes","year":"2013","unstructured":"Gunes Acar , Marc Juarez , Nick Nikiforakis , Claudia Diaz , Seda G\u00fcrses , Frank Piessens , and Bart Preneel . 2013 . FPDetective: Dusting the Web for Finger-printers . In Proceedings of the 20th ACM SIGSAC Conference on Computer and Communications Security (CCS). 1129--1140 . Gunes Acar, Marc Juarez, Nick Nikiforakis, Claudia Diaz, Seda G\u00fcrses, Frank Piessens, and Bart Preneel. 2013. FPDetective: Dusting the Web for Finger-printers. In Proceedings of the 20th ACM SIGSAC Conference on Computer and Communications Security (CCS). 1129--1140."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355588"},{"key":"e_1_3_2_2_41_1","unstructured":"Rebecca Balebako Pedro G. Leon Richard Shay Blase Ur Yang Wang and Lorrie Faith Cranor. 2012. Measuring the effectiveness of privacy tools for limiting behavioral advertising. In Web 2.0 Workshop on Security and Privacy (W2SP).  Rebecca Balebako Pedro G. Leon Richard Shay Blase Ur Yang Wang and Lorrie Faith Cranor. 2012. Measuring the effectiveness of privacy tools for limiting behavioral advertising. In Web 2.0 Workshop on Security and Privacy (W2SP)."},{"key":"e_1_3_2_2_42_1","unstructured":"Michael Barbaro and Tom Zeller Jr. 2006. A Face Is Exposed for AOL Searcher No. 4417749. The New York Times. https:\/\/www.nytimes.com\/2006\/08\/09\/technology\/09aol.html  Michael Barbaro and Tom Zeller Jr. 2006. A Face Is Exposed for AOL Searcher No. 4417749. The New York Times. https:\/\/www.nytimes.com\/2006\/08\/09\/technology\/09aol.html"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23152"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23390"},{"key":"e_1_3_2_2_45_1","volume-title":"Proceedings on the 18th Privacy Enhancing Technologies (PoPETs)1(2018)","author":"Das Anupam","year":"2018","unstructured":"Anupam Das , Nikita Borisov , and Edward Chou . 2018 . Every move you make:Exploring practical issues in smartphone motion sensor fingerprinting and countermeasures . Proceedings on the 18th Privacy Enhancing Technologies (PoPETs)1(2018) , 88--108. Anupam Das, Nikita Borisov, and Edward Chou. 2018. Every move you make:Exploring practical issues in smartphone motion sensor fingerprinting and countermeasures. Proceedings on the 18th Privacy Enhancing Technologies (PoPETs)1(2018), 88--108."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_2_48_1","volume-title":"Proceedings of the 24th International Conference on World Wide Web (WWW). 289--299","author":"Englehardt Steven","unstructured":"Steven Englehardt , Dillon Reisman , Christian Eubank , Peter Zimmerman , Jonathan Mayer , Arvind Narayanan , and Edward W. Felten . 2015. Cookies That Give You Away: The Surveillance Implications of Web Tracking . In Proceedings of the 24th International Conference on World Wide Web (WWW). 289--299 . Steven Englehardt, Dillon Reisman, Christian Eubank, Peter Zimmerman,Jonathan Mayer, Arvind Narayanan, and Edward W. Felten. 2015. Cookies That Give You Away: The Surveillance Implications of Web Tracking. In Proceedings of the 24th International Conference on World Wide Web (WWW). 289--299."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_7"},{"key":"e_1_3_2_2_50_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX Security). 151--168","author":"Franken Gertjan","year":"2018","unstructured":"Gertjan Franken , Tom Van Goethem , and Wouter Joosen . 2018 . Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies . In Proceedings of the 27th USENIX Security Symposium (USENIX Security). 151--168 . Gertjan Franken, Tom Van Goethem, and Wouter Joosen. 2018. Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies. In Proceedings of the 27th USENIX Security Symposium (USENIX Security). 151--168."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091514"},{"key":"e_1_3_2_2_52_1","volume-title":"Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS). 21--42","author":"Gervais Arthur","year":"2017","unstructured":"Arthur Gervais , Alexandros Filios , Vincent Lenders , and Srdjan Capkun . 2017 . Quantifying web ad blocker privacy . In Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS). 21--42 . Arthur Gervais, Alexandros Filios, Vincent Lenders, and Srdjan Capkun. 2017. Quantifying web ad blocker privacy. In Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS). 21--42."},{"key":"e_1_3_2_2_53_1","volume-title":"A Longitudinal Analysis of Online Ad-Blocking Blacklists. CoRRabs\/1906.00166","author":"Hashmi Saad Sajid","year":"2019","unstructured":"Saad Sajid Hashmi , Muhammad Ikram , and Mohamed Ali K\u00e2afar . 2019. A Longitudinal Analysis of Online Ad-Blocking Blacklists. CoRRabs\/1906.00166 ( 2019 ). http:\/\/arxiv.org\/abs\/1906.00166 Saad Sajid Hashmi, Muhammad Ikram, and Mohamed Ali K\u00e2afar. 2019. A Longitudinal Analysis of Online Ad-Blocking Blacklists. CoRRabs\/1906.00166 (2019). http:\/\/arxiv.org\/abs\/1906.00166"},{"key":"e_1_3_2_2_54_1","unstructured":"Kashmir Hill. 2012. How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did. Forbes. https:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/02\/16\/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did\/#46438eb96668  Kashmir Hill. 2012. How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did. Forbes. https:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/02\/16\/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did\/#46438eb96668"},{"key":"e_1_3_2_2_55_1","unstructured":"Raymond Hill. 2014. Comparative benchmarks against widely used blockers: Top 15 Most Popular News Websites. https:\/\/github.com\/gorhill\/httpswitchboard\/wiki\/Comparative-benchmarks-against-widely-used-blockers:-Top-15-Most-Popular-News-Websites  Raymond Hill. 2014. Comparative benchmarks against widely used blockers: Top 15 Most Popular News Websites. https:\/\/github.com\/gorhill\/httpswitchboard\/wiki\/Comparative-benchmarks-against-widely-used-blockers:-Top-15-Most-Popular-News-Websites"},{"key":"e_1_3_2_2_56_1","unstructured":"Raymond Hill. 2015. uBlock and others: Blocking ads trackers mal-wares. https:\/\/github.com\/gorhill\/uBlock\/wiki\/uBlock-and-others%3A-Blocking-ads%2C-trackers%2C-malwares  Raymond Hill. 2015. uBlock and others: Blocking ads trackers mal-wares. https:\/\/github.com\/gorhill\/uBlock\/wiki\/uBlock-and-others%3A-Blocking-ads%2C-trackers%2C-malwares"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818032"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131387"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_2_2_60_1","volume-title":"Browser Fingerprinting: A survey. CoRRabs\/1905.01051","author":"Laperdrix Pierre","year":"2019","unstructured":"Pierre Laperdrix , Nataliia Bielova , Benoit Baudry , and Gildas Avoine . 2019 . Browser Fingerprinting: A survey. CoRRabs\/1905.01051 (2019). http:\/\/arxiv.org\/abs\/1905.01051 Pierre Laperdrix, Nataliia Bielova, Benoit Baudry, and Gildas Avoine. 2019. Browser Fingerprinting: A survey. CoRRabs\/1905.01051 (2019). http:\/\/arxiv.org\/abs\/1905.01051"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382267"},{"key":"e_1_3_2_2_64_1","unstructured":"Jonathan Mayer. 2011. Tracking the Trackers: Self-Help Tools. http:\/\/cyberlaw.stanford.edu\/blog\/2011\/09\/tracking-trackers-self-help-tools  Jonathan Mayer. 2011. Tracking the Trackers: Self-Help Tools. http:\/\/cyberlaw.stanford.edu\/blog\/2011\/09\/tracking-trackers-self-help-tools"},{"key":"e_1_3_2_2_65_1","volume-title":"Proceedings of the 33rd IEEE Symposium on Security and Privacy(S&P). 413--427","author":"Mayer J. R.","unstructured":"J. R. Mayer and J. C. Mitchell . 2012. Third-Party Web Tracking: Policy and Technology . In Proceedings of the 33rd IEEE Symposium on Security and Privacy(S&P). 413--427 . J. R. Mayer and J. C. Mitchell. 2012. Third-Party Web Tracking: Policy and Technology. In Proceedings of the 33rd IEEE Symposium on Security and Privacy(S&P). 413--427."},{"key":"e_1_3_2_2_66_1","unstructured":"TJ McCue. 2019.47 Percent Of Consumers Are Blocking Ads. Forbes. https:\/\/www.forbes.com\/sites\/tjmccue\/2019\/03\/19\/47-percent-of-consumers-are-blocking-ads\/#5d9d4dd42037  TJ McCue. 2019.47 Percent Of Consumers Are Blocking Ads. Forbes. https:\/\/www.forbes.com\/sites\/tjmccue\/2019\/03\/19\/47-percent-of-consumers-are-blocking-ads\/#5d9d4dd42037"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.26"},{"key":"e_1_3_2_2_68_1","volume-title":"Pixel Perfect: Fingerprinting Canvas in HTML5. In Web 2.0 Workshop on Security and Privacy (W2SP).","author":"Mowery Keaton","year":"2012","unstructured":"Keaton Mowery and Hovav Shacham . 2012 . Pixel Perfect: Fingerprinting Canvas in HTML5. In Web 2.0 Workshop on Security and Privacy (W2SP). Keaton Mowery and Hovav Shacham. 2012. Pixel Perfect: Fingerprinting Canvas in HTML5. In Web 2.0 Workshop on Security and Privacy (W2SP)."},{"key":"e_1_3_2_2_69_1","volume-title":"Proceedings of the 33rd IEEE Symposium on Security and Privacy(S&P). 541--555","author":"Nikiforakis N.","unstructured":"N. Nikiforakis , A. Kapravelos , W. Joosen , C. Kruegel , F. Piessens , and G. Vigna . 2013. Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting . In Proceedings of the 33rd IEEE Symposium on Security and Privacy(S&P). 541--555 . N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna. 2013. Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. In Proceedings of the 33rd IEEE Symposium on Security and Privacy(S&P). 541--555."},{"key":"e_1_3_2_2_70_1","volume-title":"Proceedings of the 10th International Workshop Data Privacy Management, and Security Assurance. 254--263","author":"Olejnik Lukasz","year":"2015","unstructured":"Lukasz Olejnik , Gunes Acar , Claude Castelluccia , and Claudia Diaz . 2015 . The leaking battery . In Proceedings of the 10th International Workshop Data Privacy Management, and Security Assurance. 254--263 . Lukasz Olejnik, Gunes Acar, Claude Castelluccia, and Claudia Diaz. 2015. The leaking battery. In Proceedings of the 10th International Workshop Data Privacy Management, and Security Assurance. 254--263."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815705"},{"key":"e_1_3_2_2_72_1","volume-title":"Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 155--168","author":"Roesner Franziska","year":"2012","unstructured":"Franziska Roesner , Tadayoshi Kohno , and David Wetherall . 2012 . Detecting and Defending Against Third-Party Tracking on the Web . In Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 155--168 . Franziska Roesner, Tadayoshi Kohno, and David Wetherall. 2012. Detecting and Defending Against Third-Party Tracking on the Web. In Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 155--168."},{"key":"e_1_3_2_2_73_1","unstructured":"Alexander Sjosten Peter Snyder Antonio Pastor Panagiotis Papadopoulos and Benjamin Livshits. 2019. Generation of Filter Lists for Regions that are Underserved.  Alexander Sjosten Peter Snyder Antonio Pastor Panagiotis Papadopoulos and Benjamin Livshits. 2019. Generation of Filter Lists for Regions that are Underserved."},{"key":"e_1_3_2_2_74_1","volume-title":"Proceedings of the 2020 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS). 75--76","author":"Snyder Peter","year":"2020","unstructured":"Peter Snyder , Antoine Vastel , and Ben Livshits . 2020 . Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking . In Proceedings of the 2020 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS). 75--76 . Peter Snyder, Antoine Vastel, and Ben Livshits. 2020. Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking. In Proceedings of the 2020 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS). 75--76."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"crossref","unstructured":"Ashkan Soltani Shannon Canty Quentin Mayo Lauren Thomas and Chris Jay Hoofnagle. 2009. Flash Cookies and Privacy. Available at SSRN 1446862(2009).  Ashkan Soltani Shannon Canty Quentin Mayo Lauren Thomas and Chris Jay Hoofnagle. 2009. Flash Cookies and Privacy. Available at SSRN 1446862(2009).","DOI":"10.2139\/ssrn.1446862"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751323.2751329"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2017.8002898"},{"key":"e_1_3_2_2_78_1","volume-title":"Proceedings of the 15th Internet Measurement Conference (IMC). 107--120","author":"Walls Robert J.","unstructured":"Robert J. Walls , Eric D. Kilmer , Nathaniel Lageman , and Patrick D . McDaniel. 2015. Measuring the Impact and Perception of Acceptable Advertisements . In Proceedings of the 15th Internet Measurement Conference (IMC). 107--120 . Robert J. Walls, Eric D. Kilmer, Nathaniel Lageman, and Patrick D. McDaniel. 2015. Measuring the Impact and Perception of Acceptable Advertisements. In Proceedings of the 15th Internet Measurement Conference (IMC). 107--120."},{"key":"e_1_3_2_2_79_1","volume-title":"Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies (Hot Web). 72--77","author":"Craig","unstructured":"Craig E. Wills and Doruk C. Uzunoglu. 2016. What ad blockers are (and are not)doing . In Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies (Hot Web). 72--77 . Craig E. Wills and Doruk C. Uzunoglu. 2016. What ad blockers are (and are not)doing. In Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies (Hot Web). 72--77."}],"event":{"name":"ASIA CCS '21: ACM Asia Conference on Computer and Communications Security","location":"Virtual Event Hong Kong","acronym":"ASIA CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433210.3437536","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3433210.3437536","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3433210.3437536","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3433210.3437536","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:11Z","timestamp":1750193291000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433210.3437536"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":79,"alternative-id":["10.1145\/3433210.3437536","10.1145\/3433210"],"URL":"https:\/\/doi.org\/10.1145\/3433210.3437536","relation":{},"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"2021-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}