{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T17:28:15Z","timestamp":1765819695958,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2051592, 2102347, 2103038, 2103439, and 2106420"],"award-info":[{"award-number":["2051592, 2102347, 2103038, 2103439, and 2106420"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1145\/3487552.3487855","type":"proceedings-article","created":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T17:35:11Z","timestamp":1635788111000},"page":"569-576","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["TrackerSift"],"prefix":"10.1145","author":[{"given":"Abdul Haddi","family":"Amjad","sequence":"first","affiliation":[{"name":"Virginia Tech"}]},{"given":"Danial","family":"Saleem","sequence":"additional","affiliation":[{"name":"FAST-NUCES, Pakistan"}]},{"given":"Muhammad Ali","family":"Gulzar","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Zubair","family":"Shafiq","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Fareed","family":"Zaffar","sequence":"additional","affiliation":[{"name":"LUMS, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2021,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. gorhill\/uBlock: uBlock Origin - An efficient blocker for Chromium and Firefox. Fast and lean. https:\/\/github.com\/gorhill\/uBlock."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Adblock Plus. https:\/\/adblockplus.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. AdGuard Scriptlets and Redirect resources. https:\/\/github.com\/AdguardTeam\/Scriptlets."},{"key":"e_1_3_2_1_4_1","unstructured":"2021. Brave Browser. https:\/\/brave.com\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2021. Browserify. https:\/\/browserify.org\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2021. EasyList. https:\/\/easylist.to\/easylist\/easylist.txt."},{"key":"e_1_3_2_1_7_1","unstructured":"2021. EasyPrivacy. https:\/\/easylist.to\/easylist\/easyprivacy.txt."},{"key":"e_1_3_2_1_8_1","unstructured":"2021. Extending DevTools. https:\/\/developer.chrome.com\/docs\/extensions\/mv3\/devtools\/"},{"key":"e_1_3_2_1_9_1","unstructured":"2021. Facebook Pixel: Implementation. https:\/\/developers.facebook.com\/docs\/facebook-pixel\/implementation\/"},{"key":"e_1_3_2_1_10_1","unstructured":"2021. Firefox 87 introduces SmartBlock for Private Browsing. https:\/\/blog.mozilla.org\/security\/2021\/03\/23\/introducing-smartblock\/"},{"key":"e_1_3_2_1_11_1","unstructured":"2021. Security\/TrackingProtectionBreakage. https:\/\/wiki.mozilla.org\/Security\/TrackingProtectionBreakage#Trivial_shim_needed_to_avoid_breakage.3B_no_yellowlisting_required"},{"key":"e_1_3_2_1_12_1","unstructured":"2021. Selenium. http:\/\/docs.seleniumhq.org\/. http:\/\/docs.seleniumhq.org\/"},{"key":"e_1_3_2_1_13_1","unstructured":"2021. uBO-Scriptlets: A custom arsenal of scriptlets to be used for injecting userscripts via uBlock Origin. https:\/\/github.com\/uBlock-user\/uBO-Scriptlets ."},{"key":"e_1_3_2_1_14_1","unstructured":"2021. webpack. https:\/\/webpack.js.org\/."},{"key":"e_1_3_2_1_15_1","volume-title":"On the Accuracy of Spectrum-based Fault Localization. In Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION","author":"Abreu Rui","year":"2007","unstructured":"Rui Abreu, Peter Zoeteweij, and Arjan J.C. van Gemund. 2007. On the Accuracy of Spectrum-based Fault Localization. In Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION 2007)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659118.2659125"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355588"},{"volume-title":"Proceedings of the ACM Internet Measurement Conference.","author":"Aqeel Waqar","key":"e_1_3_2_1_18_1","unstructured":"Waqar Aqeel, Balakrishnan Chandrasekaran, Anja Feldmann, and Bruce M. Maggs. 2020. On Landing and Internal Web Pages: The Strange Case of Jekyll and Hyde in Web Performance Measurement. In Proceedings of the ACM Internet Measurement Conference."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278573"},{"key":"e_1_3_2_1_20_1","volume-title":"Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures. In IEEE Symposium on Security and Privacy.","author":"Chen Quan","year":"2021","unstructured":"Quan Chen, Peter Snyder, Ben Livshits, and Alexandros Kapravelos. 2021. Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_21_1","unstructured":"Yuyu Chen. 2016. Tough sell: Why publisher 'turn-off-your-ad-blocker' messages are so polite - Digiday. https:\/\/digiday.com\/media\/tough-sell-publisher-turn-off-ad-blocker-messages-polite\/."},{"key":"e_1_3_2_1_22_1","unstructured":"Romain Cointepas. 2019. CNAME Cloaking the dangerous disguise of third-party trackers. https:\/\/medium.com\/nextdns\/cname-cloaking-the-dangerous-disguise-of-third-party-trackers-195205dc522a."},{"key":"e_1_3_2_1_23_1","volume-title":"Characterizing CNAME Cloaking-Based Tracking on the Web. IEEE\/IFIP TMA'20","author":"Dao Ha","year":"2020","unstructured":"Ha Dao, Johan Mazel, and Kensuke Fukuda. 2020. Characterizing CNAME Cloaking-Based Tracking on the Web. IEEE\/IFIP TMA'20 (2020), 1--9."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.24138\/jcomss.v13i4.402"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302467"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091514"},{"key":"e_1_3_2_1_27_1","unstructured":"Liang Gong Hongyu Zhang Hyunmin Seo and Sunghun Kim. 2014. Locating Crashing Faults based on Crash Stack Traces. In arXiv:1404.4100."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Umar Iqbal Zubair Shafiq and Zhiyun Qian. 2017. The Ad Wars: Retrospective Measurement and Analysis of Anti-Adblock Filter Lists. In IMC.","DOI":"10.1145\/3131365.3131387"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00005"},{"key":"e_1_3_2_1_30_1","volume-title":"Fault Localization for Null Pointer Exception Based on Stack Trace and Program Slicing. In 2012 12th International Conference on Quality Software.","author":"Jiang Shujuan","year":"2012","unstructured":"Shujuan Jiang, Wei Li, Haiyang Li, Yanmei Zhang, Hongchang Zhang, and Yingqi Liu. 2012. Fault Localization for Null Pointer Exception Based on Stack Trace and Program Slicing. In 2012 12th International Conference on Quality Software."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581397"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052674"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2804360.2804361"},{"key":"e_1_3_2_1_35_1","volume-title":"Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. In Network and Distributed System Security Symposium (NDSS).","author":"Lauinger Tobias","year":"2017","unstructured":"Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, and Engin Kirda. 2017. Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_36_1","volume-title":"CV-Inspector: Towards Automating Detection of Adblock Circumvention. In Network and Distributed System Security Symposium (NDSS).","author":"Le Hieu","year":"2021","unstructured":"Hieu Le, Athina Markopoulou, and Zubair Shafiq. 2021. CV-Inspector: Towards Automating Detection of Adblock Circumvention. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987460"},{"key":"e_1_3_2_1_38_1","unstructured":"Giorgio Maone. [n.d.]. Surrogate Scripts vs Google Analytics. https:\/\/hackademix.net\/2009\/01\/25\/surrogate-scripts-vs-google-analytics\/."},{"volume-title":"Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. In IEEE European Symposium on Security and Privacy.","author":"Merzdovnik Georg","key":"e_1_3_2_1_39_1","unstructured":"Georg Merzdovnik, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, and Edgar R. Weippl. 2017. Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. In IEEE European Symposium on Security and Privacy."},{"key":"e_1_3_2_1_40_1","volume-title":"Detecting Anti Ad-blockers in the Wild. In Privacy Enhancing Technologies Symposium (PETS).","author":"Mughees Muhammad Haris","year":"2017","unstructured":"Muhammad Haris Mughees, Zhiyun Qian, and Zubair Shafiq. 2017. Detecting Anti Ad-blockers in the Wild. In Privacy Enhancing Technologies Symposium (PETS)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382274"},{"volume-title":"Adblocking and Counter-Blocking: A Slice of the Arms Race. In USENIX Workshop on Free and Open Communications on the Internet.","author":"Nithyanand Rishab","key":"e_1_3_2_1_42_1","unstructured":"Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, and Steven J. Murdoch. 2016. Adblocking and Counter-Blocking: A Slice of the Arms Race. In USENIX Workshop on Free and Open Communications on the Internet."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980983.2908099"},{"key":"e_1_3_2_1_44_1","unstructured":"Page Fair. 2017. The State of the Blocked Web. https:\/\/pagefair.com\/downloads\/2017\/01\/PageFair-2017-Adblock-Report.pdf."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.62"},{"key":"e_1_3_2_1_46_1","volume-title":"Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen.","author":"Pochat Victor Le","year":"2018","unstructured":"Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen. 2018. Tranco: A research-oriented top sites ranking hardened against manipulation. arXiv preprint arXiv:1806.01156 (2018)."},{"key":"e_1_3_2_1_47_1","unstructured":"Kaleigh Rogers. 2018. Why Doesn't My Ad Blocker Block 'Please Turn Off Your Ad Blocker' Popups? - VICE. https:\/\/www.vice.com\/en_us\/article\/j5zk8y\/why-your-ad-blocker-doesnt-block-those-please-turn-off-your-ad-blocker-popups."},{"key":"e_1_3_2_1_48_1","volume-title":"WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking. arXiv preprint arXiv:2107.11309","author":"Siby Sandra","year":"2021","unstructured":"Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, and Carmela Troncoso. 2021. WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking. arXiv preprint arXiv:2107.11309 (2021)."},{"key":"e_1_3_2_1_49_1","volume-title":"Filter List Generation for Underserved Regions. In The Web Conference.","author":"Sjosten Alexander","year":"2020","unstructured":"Alexander Sjosten, Peter Snyder, Antonio Pastor, Panagiotis Papadopoulos, and Benjamin Livshits. 2020. Filter List Generation for Underserved Regions. In The Web Conference."},{"key":"e_1_3_2_1_50_1","volume-title":"Spectrum-based Software Fault Localization: A Survey of Techniques, Advances, and Challenges. ArXiv abs\/1607.04347","author":"Souza H. A. D.","year":"2016","unstructured":"H. A. D. Souza, M. L. Chaim, and Fabio Kon. 2016. Spectrum-based Software Fault Localization: A Survey of Techniques, Advances, and Challenges. ArXiv abs\/1607.04347 (2016)."},{"key":"e_1_3_2_1_51_1","unstructured":"B\u00e9la Vancsics Ferenc Horv\u00e1th Attila Szatm\u00e1ri and Arp\u00e1d Besz\u00e9des. [n.d.]. Call Frequency-Based Fault Localization. ([n. d.])."},{"key":"e_1_3_2_1_52_1","unstructured":"Antoine Vastel Peter Snyder and Benjamin Livshits. 2020. Who Filters the Filters: Understanding the Growth Usefulness and Efficiency of Crowdsourced AdBlocking. In ACM SIGMETRICS\/Performance."}],"event":{"name":"IMC '21: ACM Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","USENIX Assoc USENIX Assoc"],"location":"Virtual Event","acronym":"IMC '21"},"container-title":["Proceedings of the 21st ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487552.3487855","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3487552.3487855","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487552.3487855","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487552.3487855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T17:24:01Z","timestamp":1765819441000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487552.3487855"}},"subtitle":["untangling mixed tracking and functional web resources"],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":52,"alternative-id":["10.1145\/3487552.3487855","10.1145\/3487552"],"URL":"https:\/\/doi.org\/10.1145\/3487552.3487855","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]},"assertion":[{"value":"2021-11-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}