{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:51:45Z","timestamp":1756385505194,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-21-1-2159"],"award-info":[{"award-number":["N00014-21-1-2159"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2047260"],"award-info":[{"award-number":["CNS-2047260"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3485447.3512231","type":"proceedings-article","created":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T05:11:23Z","timestamp":1650863483000},"page":"710-720","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Measuring the Privacy vs. Compatibility Trade-off in Preventing Third-Party Stateful Tracking"],"prefix":"10.1145","author":[{"given":"Jordan","family":"Jueckstock","sequence":"first","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Peter","family":"Snyder","sequence":"additional","affiliation":[{"name":"Brave Software, USA"}]},{"given":"Shaown","family":"Sarker","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Alexandros","family":"Kapravelos","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Benjamin","family":"Livshits","sequence":"additional","affiliation":[{"name":"Brave Software, United Kingdom and Imperial College London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,4,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Chromium Blog: Building a more private web: A path towards making third party cookies obsolete. https:\/\/blog.chromium.org\/2020\/01\/building-more-private-web-path-towards.html. Accessed: 2020-10-12."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. EasyList. https:\/\/easylist.to\/easylist\/easylist.txt. Accessed: 2020-09-17."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. GitHub - disconnectme\/disconnect-tracking-protection. https:\/\/github.com\/disconnectme\/disconnect-tracking-protection. Accessed: 2020-10-12."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. HTML Standard: 7.5 Origin. https:\/\/html.spec.whatwg.org\/multipage\/origin.html#origin. Accessed: 2020-10-12."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. HTML Standard \u00a712.2.3: The localStorage getter. https:\/\/html.spec.whatwg.org\/multipage\/webstorage.html#the-localstorage-attribute. Accessed: 2022-02-05."},{"key":"e_1_3_2_1_6_1","unstructured":"2020. Indexed Database API 2.0. https:\/\/www.w3.org\/TR\/IndexedDB-2\/. Accessed: 2022-02-05."},{"key":"e_1_3_2_1_7_1","unstructured":"2020. Open-source prototype implementation of page-length storage and public dataset. https:\/\/github.com\/wspr-ncsu\/ephemeral-storage-patches. Accessed: 2020-10-15."},{"key":"e_1_3_2_1_8_1","unstructured":"2020. Public Suffix List. https:\/\/publicsuffix.org\/list\/public_suffix_list.dat. Accessed: 2020-09-19."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437524"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23295"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449837"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00007"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0053"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30505-9_3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0038"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186097"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0018"},{"key":"e_1_3_2_1_22_1","volume-title":"Computing inter-rater reliability for observational data: an overview and tutorial. Tutorials in quantitative methods for psychology 8, 1","author":"Hallgren A","year":"2012","unstructured":"Kevin\u00a0A Hallgren. 2012. Computing inter-rater reliability for observational data: an overview and tutorial. Tutorials in quantitative methods for psychology 8, 1 (2012), 23."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394231.3397897"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00005"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135884"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_7"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_21"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835513"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"e_1_3_2_1_31_1","volume-title":"Interrater reliability: the kappa statistic. Biochemia medica: Biochemia medica 22, 3","author":"McHugh L","year":"2012","unstructured":"Mary\u00a0L McHugh. 2012. Interrater reliability: the kappa statistic. Biochemia medica: Biochemia medica 22, 3 (2012), 276\u2013282."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741090"},{"volume-title":"Data Privacy Management, and Security Assurance","author":"Olejnik \u0141ukasz","key":"e_1_3_2_1_33_1","unstructured":"\u0141ukasz Olejnik, Gunes Acar, Claude Castelluccia, and Claudia Diaz. 2016. The Leaking Battery. In Data Privacy Management, and Security Assurance. Springer International Publishing."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23270"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23163"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313542"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186060"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0041"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design & Implementation.","author":"Roesner Franziska","year":"2012","unstructured":"Franziska Roesner, Tadayoshi Kohno, and David Wetherall. 2012. Detecting and Defending Against Third-Party Tracking on the Web. In Proceedings of the USENIX Symposium on Networked Systems Design & Implementation."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359803"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.9796062"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Schwenk J\u00f6rg","year":"2017","unstructured":"J\u00f6rg Schwenk, Marcus Niemietz, and Christian Mainka. 2017. Same-Origin Policy: Evaluation in Modern Browsers. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380239"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133966"},{"key":"e_1_3_2_1_46_1","volume-title":"In Depth Evaluation of Redirect Tracking and Link Usage. In PETS 2020-20th Privacy Enhancing Technologies Symposium.","author":"Stopczynski Martin","year":"2020","unstructured":"Martin Stopczynski, Erik Tews, , and Stefan Katzenbeisser. 2020. In Depth Evaluation of Redirect Tracking and Link Usage. In PETS 2020-20th Privacy Enhancing Technologies Symposium."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Van\u00a0Goethem Tom","year":"2020","unstructured":"Tom Van\u00a0Goethem, Christina P\u00f6pper, Wouter Joosen, and Mathy Vanhoef. 2020. Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0016"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883028"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the USENIX Security Symposium. 1391\u20131408","author":"Zimmeck Sebastian","year":"2017","unstructured":"Sebastian Zimmeck, Jie\u00a0S Li, Hyungtae Kim, Steven\u00a0M Bellovin, and Tony Jebara. 2017. A Privacy Analysis of Cross-device Tracking. In Proceedings of the USENIX Security Symposium. 1391\u20131408."}],"event":{"name":"WWW '22: The ACM Web Conference 2022","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Virtual Event, Lyon France","acronym":"WWW '22"},"container-title":["Proceedings of the ACM Web Conference 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485447.3512231","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485447.3512231","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485447.3512231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:13Z","timestamp":1750188613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485447.3512231"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":50,"alternative-id":["10.1145\/3485447.3512231","10.1145\/3485447"],"URL":"https:\/\/doi.org\/10.1145\/3485447.3512231","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-04-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}