{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:08:50Z","timestamp":1763748530199,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T00:00:00Z","timestamp":1636761600000},"content-version":"vor","delay-in-days":1,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CCF-1918573,CAREER CNS-2048262"],"award-info":[{"award-number":["CCF-1918573,CAREER CNS-2048262"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484578","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"2844-2857","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["SugarCoat: Programmatically Generating Privacy-Preserving, Web-Compatible Resource Replacements for Content Blocking"],"prefix":"10.1145","author":[{"given":"Michael","family":"Smith","sequence":"first","affiliation":[{"name":"University of California, San Diego, San Diego, CA, USA"}]},{"given":"Pete","family":"Snyder","sequence":"additional","affiliation":[{"name":"Brave Software, San Francisco, CA, USA"}]},{"given":"Benjamin","family":"Livshits","sequence":"additional","affiliation":[{"name":"Brave Software, San Francisco, CA, USA"}]},{"given":"Deian","family":"Stefan","sequence":"additional","affiliation":[{"name":"University of California, San Diego, San Diego, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Annual Technical Conference (USENIX ATC).","author":"Din Zainul Abi","year":"2020","unstructured":"Zainul Abi Din, Panagiotis Tigas, Samuel T King, and Benjamin Livshits. 2020. PERCIVAL: Making in-browser perceptual ad blocking practical with deep learning. In USENIX Annual Technical Conference (USENIX ATC)."},{"key":"e_1_3_2_1_2_1","unstructured":"AdGuard. 2021. AdGuard. https:\/\/adguard.com\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Mshabab Alrizah Sencun Zhu Xinyu Xing and Gang Wang. 2019. Errors Misunderstandings and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems. (2019).","DOI":"10.1145\/3355369.3355588"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666652.2666662"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00007"},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX Security Symposium. 1--16","author":"Chong Stephen","year":"2007","unstructured":"Stephen Chong, Krishnaprasad Vikram, Andrew C Myers, et al. 2007. SIF: Enforcing Confidentiality and Integrity in Web Applications.. In USENIX Security Symposium. 1--16."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1986024"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542483"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382275"},{"key":"e_1_3_2_1_10_1","unstructured":"Famlam Fanboy MonztA and Khrin. 2021 a. EasyList. https:\/\/easylist.to\/easylist\/easylist.txt."},{"key":"e_1_3_2_1_11_1","unstructured":"Famlam Fanboy MonztA and Khrin. 2021 b. EasyPrivacy. https:\/\/easylist.to\/easylist\/easyprivacy.txt."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_2"},{"key":"e_1_3_2_1_13_1","unstructured":"Google. 2020. Tools for Web Developers: Puppeteer. https:\/\/developers.google.com\/web\/tools\/puppeteer\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Google. 2021. Chrome User Experience Report. https:\/\/developers.google.com\/web\/tools\/chrome-user-experience-report."},{"key":"e_1_3_2_1_15_1","unstructured":"Ilya Grigorik. 2019. Measuring the Critical Rendering Path. https:\/\/developers.google.com\/web\/fundamentals\/performance\/critical-rendering-path\/measure-crp."},{"key":"e_1_3_2_1_16_1","volume-title":"An Automated Approach for Complementing Ad Blockers' Blacklists. In Privacy Enhancing Technologies Symposium (PETS).","author":"Gugelmann David","year":"2015","unstructured":"David Gugelmann, Markus Happe, Bernhard Ager, and Vincent Lenders. 2015. An Automated Approach for Complementing Ad Blockers' Blacklists. In Privacy Enhancing Technologies Symposium (PETS)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_41"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554909"},{"key":"e_1_3_2_1_19_1","unstructured":"Raymond Hill. 2021. uBlock Origin. https:\/\/github.com\/gorhill\/uBlock."},{"key":"e_1_3_2_1_20_1","volume-title":"2020 a. Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors. arXiv preprint arXiv:2008.04480","author":"Iqbal Umar","year":"2020","unstructured":"Umar Iqbal, Steven Englehardt, and Zubair Shafiq. 2020 a. Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors. arXiv preprint arXiv:2008.04480 (2020)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131387"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00005"},{"key":"e_1_3_2_1_23_1","volume-title":"Its Just a Simple Trick: A Web-Compat and Privacy Improving Approach to Third-party Web Storage. arXiv preprint arXiv:2011.01267","author":"Jueckstock Jordan","year":"2020","unstructured":"Jordan Jueckstock, Peter Snyder, Shaown Sarker, Alexandros Kapravelos, and Benjamin Livshits. 2020. There's No Trick, Its Just a Simple Trick: A Web-Compat and Privacy Improving Approach to Third-party Web Storage. arXiv preprint arXiv:2011.01267 (2020)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_7"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987460"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.26"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985870"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.36"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741090"},{"key":"e_1_3_2_1_30_1","volume-title":"Hamed Haddadi, and Steven J. Murdoch.","author":"Nithyanand Rishab","year":"2016","unstructured":"Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, and Steven J. Murdoch. 2016. Ad-Blocking and Counter Blocking: A Slice of the Arms Race. CoRR, Vol. abs\/1605.05077 (2016). arxiv: 1605.05077 http:\/\/arxiv.org\/abs\/1605.05077"},{"volume-title":"Data Privacy Management, and Security Assurance","author":"Olejnik \u0141ukasz","key":"e_1_3_2_1_31_1","unstructured":"\u0141ukasz Olejnik, Gunes Acar, Claude Castelluccia, and Claudia Diaz. 2015. The leaking battery. In Data Privacy Management, and Security Assurance. Springer, 254--263."},{"key":"e_1_3_2_1_32_1","unstructured":"Adblock Plus. 2018. Sentinel - the artificial intelligence ad detector. https:\/\/adblock.ai\/."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408987"},{"key":"e_1_3_2_1_34_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Roesner Franziska","year":"2012","unstructured":"Franziska Roesner, Tadayoshi Kohno, and David Wetherall. 2012. Detecting and defending against third-party tracking on the web. In USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133966"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392144"},{"key":"e_1_3_2_1_37_1","unstructured":"Brave Software. 2020. PageGraph. https:\/\/github.com\/brave\/brave-browser\/wiki\/PageGraph."},{"key":"e_1_3_2_1_38_1","unstructured":"Tim Starks. 2021. CISA tells agencies to consider ad blockers to fend off 'malvertising'. https:\/\/www.cyberscoop.com\/ad-blockers-security-nsa-dhs-wyden\/."},{"key":"e_1_3_2_1_39_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Stefan Deian","year":"2014","unstructured":"Deian Stefan, Edward Z Yang, Petr Marchenko, Alejandro Russo, Dave Herman, Brad Karp, and David Mazi\u00e8res. 2014. Protecting Users by Confining JavaScript with COWL. In USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_1_40_1","volume-title":"The future of ad blocking: An analytical framework and new techniques. arXiv preprint arXiv:1705.08568","author":"Storey Grant","year":"2017","unstructured":"Grant Storey, Dillon Reisman, Jonathan Mayer, and Arvind Narayanan. 2017. The future of ad blocking: An analytical framework and new techniques. arXiv preprint arXiv:1705.08568 (2017)."},{"key":"e_1_3_2_1_41_1","volume-title":"Crawl-based analysis of web applications: Prospects and challenges. Science of computer programming","author":"Deursen Arie Van","year":"2015","unstructured":"Arie Van Deursen, Ali Mesbah, and Alex Nederlof. 2015. Crawl-based analysis of web applications: Prospects and challenges. Science of computer programming, Vol. 97 (2015), 173--180."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950352"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519091"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883028"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23331"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484578","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484578","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:45:17Z","timestamp":1763498717000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484578"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":45,"alternative-id":["10.1145\/3460120.3484578","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484578","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}