{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T16:08:55Z","timestamp":1762445335978,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1910867"],"award-info":[{"award-number":["CNS-1910867"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3559336","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"1947-1961","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["InviCloak"],"prefix":"10.1145","author":[{"given":"Shihan","family":"Lin","sequence":"first","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Rui","family":"Xin","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Aayush","family":"Goel","sequence":"additional","affiliation":[{"name":"Cupertino High School, Cupertino, CA, USA"}]},{"given":"Xiaowei","family":"Yang","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2014. Groups: chrome.webRequest Response Body Reading\/Editing Pro- posal. https:\/\/groups.google.com\/a\/chromium.org\/g\/apps-dev\/c\/v176iCmRgSs\/ m\/dIPoHuPtJuMJ  2014. Groups: chrome.webRequest Response Body Reading\/Editing Pro- posal. https:\/\/groups.google.com\/a\/chromium.org\/g\/apps-dev\/c\/v176iCmRgSs\/ m\/dIPoHuPtJuMJ"},{"key":"e_1_3_2_2_2_1","unstructured":"2014. WebRequest Response Body Reading\/Editing Proposal. https:\/\/docs.google.com\/document\/d\/1iE6M-YSmPtMOsec7pR-ILWveQie8JQQXTm15JKEcUT8\/edit#  2014. WebRequest Response Body Reading\/Editing Proposal. https:\/\/docs.google.com\/document\/d\/1iE6M-YSmPtMOsec7pR-ILWveQie8JQQXTm15JKEcUT8\/edit#"},{"key":"e_1_3_2_2_3_1","unstructured":"2015. Issue 487422: WebRequest API: Allow Extensions to Read Response Body. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=487422  2015. Issue 487422: WebRequest API: Allow Extensions to Read Response Body. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=487422"},{"key":"e_1_3_2_2_4_1","unstructured":"2019. Control Azure CDN caching behavior with caching rules. https:\/\/ docs.microsoft.com\/en-us\/azure\/cdn\/cdn-caching-rules  2019. Control Azure CDN caching behavior with caching rules. https:\/\/ docs.microsoft.com\/en-us\/azure\/cdn\/cdn-caching-rules"},{"key":"e_1_3_2_2_5_1","unstructured":"2019. GoHTTPBench. https:\/\/github.com\/parkghost\/gohttpbench  2019. GoHTTPBench. https:\/\/github.com\/parkghost\/gohttpbench"},{"volume-title":"Firewall Report","year":"2019","key":"e_1_3_2_2_6_1","unstructured":"2019. State of the Firewall Report 2019 . https:\/\/www.firemon.com\/wp-content\/ uploads\/2019-FireMon-State-of-the-Firewall-Report.pdf 2019. State of the Firewall Report 2019. https:\/\/www.firemon.com\/wp-content\/ uploads\/2019-FireMon-State-of-the-Firewall-Report.pdf"},{"key":"e_1_3_2_2_7_1","unstructured":"2020. Let's Encrypt Stats. https:\/\/letsencrypt.org\/stats\/  2020. Let's Encrypt Stats. https:\/\/letsencrypt.org\/stats\/"},{"key":"e_1_3_2_2_8_1","unstructured":"2020. State of the Web. https:\/\/httparchive.org\/reports\/state-of-the-web  2020. State of the Web. https:\/\/httparchive.org\/reports\/state-of-the-web"},{"key":"e_1_3_2_2_9_1","unstructured":"2021. Deprecated Technologies - Core Processors. https:\/\/edc.intel.com\/content\/ www\/us\/en\/design\/ipla\/software-development-platforms\/client\/platforms\/alder-lake-desktop\/12th-generation-intel-core-processors-datasheet-volume-1-of-2\/004\/deprecated-technologies\/  2021. Deprecated Technologies - Core Processors. https:\/\/edc.intel.com\/content\/ www\/us\/en\/design\/ipla\/software-development-platforms\/client\/platforms\/alder-lake-desktop\/12th-generation-intel-core-processors-datasheet-volume-1-of-2\/004\/deprecated-technologies\/"},{"key":"e_1_3_2_2_10_1","unstructured":"2021. Netfilter. https:\/\/www.netfilter.org\/  2021. Netfilter. https:\/\/www.netfilter.org\/"},{"key":"e_1_3_2_2_11_1","unstructured":"2021. Signed URLs and Signed Cookies Overview. https:\/\/cloud.google.com\/cdn\/ docs\/private-content  2021. Signed URLs and Signed Cookies Overview. https:\/\/cloud.google.com\/cdn\/ docs\/private-content"},{"key":"e_1_3_2_2_12_1","unstructured":"2021. webRequest.filterResponseData. https:\/\/developer.mozilla.org\/en-US\/docs\/ Mozilla\/Add-ons\/WebExtensions\/API\/webRequest\/filterResponseData  2021. webRequest.filterResponseData. https:\/\/developer.mozilla.org\/en-US\/docs\/ Mozilla\/Add-ons\/WebExtensions\/API\/webRequest\/filterResponseData"},{"key":"e_1_3_2_2_13_1","unstructured":"2022. ab - Apache HTTP Server Benchmarking Tool. https:\/\/httpd.apache.org\/ docs\/2.4\/programs\/ab.html  2022. ab - Apache HTTP Server Benchmarking Tool. https:\/\/httpd.apache.org\/ docs\/2.4\/programs\/ab.html"},{"key":"e_1_3_2_2_14_1","unstructured":"2022. Alexa Top Sites. https:\/\/www.alexa.com\/topsites  2022. Alexa Top Sites. https:\/\/www.alexa.com\/topsites"},{"key":"e_1_3_2_2_15_1","unstructured":"2022. Amazon CloudFront. https:\/\/aws.amazon.com\/cloudfront\/  2022. Amazon CloudFront. https:\/\/aws.amazon.com\/cloudfront\/"},{"key":"e_1_3_2_2_16_1","unstructured":"2022. Apache HTTP Server Project. https:\/\/httpd.apache.org\/  2022. Apache HTTP Server Project. https:\/\/httpd.apache.org\/"},{"key":"e_1_3_2_2_17_1","unstructured":"2022. Cloudflare. https:\/\/www.cloudflare.com\/  2022. Cloudflare. https:\/\/www.cloudflare.com\/"},{"key":"e_1_3_2_2_18_1","unstructured":"2022. Etsy. https:\/\/www.etsy.com\/  2022. Etsy. https:\/\/www.etsy.com\/"},{"key":"e_1_3_2_2_19_1","unstructured":"2022. Intel Product Specifications. https:\/\/ark.intel.com\/content\/www\/us\/en\/ ark.html  2022. Intel Product Specifications. https:\/\/ark.intel.com\/content\/www\/us\/en\/ ark.html"},{"key":"e_1_3_2_2_20_1","unstructured":"2022. ModSecurity. https:\/\/github.com\/SpiderLabs\/ModSecurity  2022. ModSecurity. https:\/\/github.com\/SpiderLabs\/ModSecurity"},{"key":"e_1_3_2_2_21_1","unstructured":"2022. Module ngx_http_proxy_module. http:\/\/nginx.org\/en\/docs\/http\/ ngx_http_proxy_module.html  2022. Module ngx_http_proxy_module. http:\/\/nginx.org\/en\/docs\/http\/ ngx_http_proxy_module.html"},{"key":"e_1_3_2_2_22_1","unstructured":"2022. OWASP ModSecurity Core Rule Set. https:\/\/coreruleset.org\/  2022. OWASP ModSecurity Core Rule Set. https:\/\/coreruleset.org\/"},{"key":"e_1_3_2_2_23_1","unstructured":"2022. Twitter API. https:\/\/developer.twitter.com\/en\/docs\/twitter-api  2022. Twitter API. https:\/\/developer.twitter.com\/en\/docs\/twitter-api"},{"key":"e_1_3_2_2_24_1","unstructured":"2022. Using signed cookies. https:\/\/docs.aws.amazon.com\/AmazonCloudFront\/ latest\/DeveloperGuide\/private-content-signed-cookies.html  2022. Using signed cookies. https:\/\/docs.aws.amazon.com\/AmazonCloudFront\/ latest\/DeveloperGuide\/private-content-signed-cookies.html"},{"key":"e_1_3_2_2_25_1","unstructured":"2022. What is Cache-Control? Cache explained. https:\/\/www.cloudflare.com\/ learning\/cdn\/glossary\/what-is-cache-control\/  2022. What is Cache-Control? Cache explained. https:\/\/www.cloudflare.com\/ learning\/cdn\/glossary\/what-is-cache-control\/"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00015"},{"key":"e_1_3_2_2_27_1","unstructured":"Devdatta Akhawe Frederik Braun Francois Marier and Joel Weinberger. 2016. Subresource Integrity. W3C Recommendation (2016).  Devdatta Akhawe Frederik Braun Francois Marier and Joel Weinberger. 2016. Subresource Integrity. W3C Recommendation (2016)."},{"key":"e_1_3_2_2_28_1","volume-title":"Proc. of HASP","volume":"13","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati , Shay Gueron , Simon Johnson , and Vincent Scarlata . 2013 . Innovative Technology for CPU Based Attestation and Sealing . In Proc. of HASP , Vol. 13 . ACM New York, NY, USA, 7. Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative Technology for CPU Based Attestation and Sealing. In Proc. of HASP, Vol. 13. ACM New York, NY, USA, 7."},{"key":"e_1_3_2_2_29_1","unstructured":"Jake Archibald. 2022. IS Service Worker Ready? https:\/\/jakearchibald.github.io\/isserviceworkerready\/  Jake Archibald. 2022. IS Service Worker Ready? https:\/\/jakearchibald.github.io\/isserviceworkerready\/"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4033"},{"key":"e_1_3_2_2_31_1","unstructured":"Emir Beganovi\u0107. 2019. Analysing Global CDN Performance. https:\/\/labs.ripe.net\/Members\/emirb\/analysing-global-cdn-performance  Emir Beganovi\u0107. 2019. Analysing Global CDN Performance. https:\/\/labs.ripe.net\/Members\/emirb\/analysing-global-cdn-performance"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00021"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978301"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427290"},{"key":"e_1_3_2_2_35_1","unstructured":"Cloudflare. 2021. Understanding a CNAME Setup. https:\/\/support.cloudflare.com\/hc\/en-us\/articles\/360020348832-Understanding-a-CNAME-Setup  Cloudflare. 2021. Understanding a CNAME Setup. https:\/\/support.cloudflare.com\/hc\/en-us\/articles\/360020348832-Understanding-a-CNAME-Setup"},{"key":"e_1_3_2_2_36_1","unstructured":"Internet Systems Consortium. 2022. dig(1) - Linux Man Page. https:\/\/linux.die.net\/man\/1\/dig.  Internet Systems Consortium. 2022. dig(1) - Linux Man Page. https:\/\/linux.die.net\/man\/1\/dig."},{"key":"e_1_3_2_2_37_1","first-page":"1","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptology ePrint Archive , Vol. 2016 , 086 (2016), 1 -- 118 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive, Vol. 2016, 086 (2016), 1--118.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_38_1","volume-title":"Proc. of Security Symposium. USENIX, 29--44","author":"Crosby Scott A","year":"2003","unstructured":"Scott A Crosby and Dan S Wallach . 2003 . Denial of Service via Algorithmic Complexity Attacks . In Proc. of Security Symposium. USENIX, 29--44 . Scott A Crosby and Dan S Wallach. 2003. Denial of Service via Algorithmic Complexity Attacks. In Proc. of Security Symposium. USENIX, 29--44."},{"key":"e_1_3_2_2_39_1","volume-title":"RFC 3912: WHOIS Protocol Specification. Internet Engineering Task Force (IETF)","author":"Daigle Leslie","year":"2004","unstructured":"Leslie Daigle . 2004. RFC 3912: WHOIS Protocol Specification. Internet Engineering Task Force (IETF) ( 2004 ). Leslie Daigle. 2004. RFC 3912: WHOIS Protocol Specification. Internet Engineering Task Force (IETF) (2004)."},{"key":"e_1_3_2_2_40_1","volume-title":"Proc. of ATC. USENIX, 693--708","author":"Demoulin Henri Maxime","year":"2019","unstructured":"Henri Maxime Demoulin , Isaac Pedisich , Nikos Vasilakis , Vincent Liu , Boon Thau Loo , and Linh Thi Xuan Phan . 2019 . Detecting Asymmetric Application-layer Denial-of-Service Attacks In-Flight with Finelame . In Proc. of ATC. USENIX, 693--708 . Henri Maxime Demoulin, Isaac Pedisich, Nikos Vasilakis, Vincent Liu, Boon Thau Loo, and Linh Thi Xuan Phan. 2019. Detecting Asymmetric Application-layer Denial-of-Service Attacks In-Flight with Finelame. In Proc. of ATC. USENIX, 693--708."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7671"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516539.1516541"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304013"},{"key":"e_1_3_2_2_44_1","unstructured":"Charles E Gero Jeremy N Shapiro and Dana J Burd. 2017. Terminating SSL Connections without Locally-Accessible Private Keys. U.S. Patents 9647835B2.  Charles E Gero Jeremy N Shapiro and Dana J Burd. 2017. Terminating SSL Connections without Locally-Accessible Private Keys. U.S. Patents 9647835B2."},{"key":"e_1_3_2_2_45_1","unstructured":"Omer Gil. 2017. Web Cache Deception Attack. https:\/\/omergil.blogspot.com\/2017\/02\/web-cache-deception-attack.html  Omer Gil. 2017. Web Cache Deception Attack. https:\/\/omergil.blogspot.com\/2017\/02\/web-cache-deception-attack.html"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23109"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.116"},{"key":"e_1_3_2_2_48_1","unstructured":"Mike Gualtieri. 2018. Stealing Data With CSS: Attack and Defense. https:\/\/www.mike-gualtieri.com\/posts\/stealing-data-with-css-attack-and-defense  Mike Gualtieri. 2018. Stealing Data With CSS: Attack and Defense. https:\/\/www.mike-gualtieri.com\/posts\/stealing-data-with-css-attack-and-defense"},{"key":"e_1_3_2_2_49_1","volume-title":"Proc. of International Symposium on Secure Software Engineering","volume":"1","author":"Halfond William G","year":"2006","unstructured":"William G Halfond , Jeremy Viegas , Alessandro Orso , 2006 . A Classification of SQL-Injection Attacks and Countermeasures . In Proc. of International Symposium on Secure Software Engineering , Vol. 1 . IEEE, 13--15. William G Halfond, Jeremy Viegas, Alessandro Orso, et al. 2006. A Classification of SQL-Injection Attacks and Countermeasures. In Proc. of International Symposium on Secure Software Engineering, Vol. 1. IEEE, 13--15."},{"key":"e_1_3_2_2_50_1","volume-title":"Proc. of Security Symposium. USENIX.","author":"Herwig Stephen","year":"2020","unstructured":"Stephen Herwig , Christina Garman , and Dave Levin . 2020 . Achieving Keyless CDNs with Conclaves . In Proc. of Security Symposium. USENIX. Stephen Herwig, Christina Garman, and Dave Levin. 2020. Achieving Keyless CDNs with Conclaves. In Proc. of Security Symposium. USENIX."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8484"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6698"},{"key":"e_1_3_2_2_53_1","volume-title":"Proc. of IMC. ACM, 15--29","author":"Huang Cheng","year":"2008","unstructured":"Cheng Huang , Angela Wang , Jin Li , and Keith W Ross . 2008 . Measuring and Evaluating Large-Scale CDNs . In Proc. of IMC. ACM, 15--29 . Cheng Huang, Angela Wang, Jin Li, and Keith W Ross. 2008. Measuring and Evaluating Large-Scale CDNs. In Proc. of IMC. ACM, 15--29."},{"key":"e_1_3_2_2_54_1","volume-title":"Proc. of Ottawa Linux Symposium","volume":"213","author":"Hubert Bert","year":"2002","unstructured":"Bert Hubert , Thomas Graf , Greg Maxwell , Remco van Mook , Martijn van Oosterhout , P Schroeder , Jasper Spaans , and Pedro Larroy . 2002 . Linux Advanced Routing & Traffic Control . In Proc. of Ottawa Linux Symposium , Vol. 213 . Bert Hubert, Thomas Graf, Greg Maxwell, Remco van Mook, Martijn van Oosterhout, P Schroeder, Jasper Spaans, and Pedro Larroy. 2002. Linux Advanced Routing & Traffic Control. In Proc. of Ottawa Linux Symposium, Vol. 213."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505224"},{"key":"e_1_3_2_2_56_1","unstructured":"Alex Krivit and Zaidoon Al Hadi. 2021. CDN-Cache-Control: Precision Control for your CDN(s). https:\/\/blog.cloudflare.com\/cdn-cache-control\/  Alex Krivit and Zaidoon Al Hadi. 2021. CDN-Cache-Control: Precision Control for your CDN(s). https:\/\/blog.cloudflare.com\/cdn-cache-control\/"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23547"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243867"},{"volume-title":"CDNs and Privacy Threats: A Measurement Study. Master's thesis","author":"Levy Akash","key":"e_1_3_2_2_59_1","unstructured":"Akash Levy . 2017. CDNs and Privacy Threats: A Measurement Study. Master's thesis . Princeton University , Princeton, NJ . Akash Levy. 2017. CDNs and Privacy Threats: A Measurement Study. Master's thesis. Princeton University, Princeton, NJ."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.12"},{"key":"e_1_3_2_2_61_1","unstructured":"Shihan Lin. 2022. InviCloak Source Code. https:\/\/github.com\/SHiftLin\/CCS2022-InviCloak  Shihan Lin. 2022. InviCloak Source Code. https:\/\/github.com\/SHiftLin\/CCS2022-InviCloak"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559336"},{"key":"e_1_3_2_2_63_1","volume-title":"Proc. of Security Symposium. USENIX, 665--682","author":"Mirheidari Seyed Ali","year":"2020","unstructured":"Seyed Ali Mirheidari , Sajjad Arshad , Kaan Onarlioglu , Bruno Crispo , Engin Kirda , and William Robertson . 2020 . Cached and Confused: Web Cache Deception in the Wild . In Proc. of Security Symposium. USENIX, 665--682 . Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, and William Robertson. 2020. Cached and Confused: Web Cache Deception in the Wild. In Proc. of Security Symposium. USENIX, 665--682."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787482"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1842733.1842736"},{"key":"e_1_3_2_2_67_1","unstructured":"OWASP. 2018. Testing for CSS Injection (OTG-CLIENT-005). https:\/\/wiki.owasp.org\/index.php\/Testing_for_CSS_Injection_(OTG-CLIENT-005)  OWASP. 2018. Testing for CSS Injection (OTG-CLIENT-005). https:\/\/wiki.owasp.org\/index.php\/Testing_for_CSS_Injection_(OTG-CLIENT-005)"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23070"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.5555\/1412202.1412204"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_2_71_1","volume-title":"Internet Draft: TLS Encrypted Client Hello. Internet Engineering Task Force (IETF)","author":"Rescorla Eric","year":"2021","unstructured":"Eric Rescorla , Kazuho Oku , Nick Sullivan , and Christopher Wood . 2021 . Internet Draft: TLS Encrypted Client Hello. Internet Engineering Task Force (IETF) (2021). Eric Rescorla, Kazuho Oku, Nick Sullivan, and Christopher Wood. 2021. Internet Draft: TLS Encrypted Client Hello. Internet Engineering Task Force (IETF) (2021)."},{"key":"e_1_3_2_2_72_1","unstructured":"ICANN Research. 2021. TLD DNSSEC Report. http:\/\/stats.research.icann.org\/dns\/tld_report\/  ICANN Research. 2021. TLD DNSSEC Report. http:\/\/stats.research.icann.org\/dns\/tld_report\/"},{"key":"e_1_3_2_2_73_1","volume-title":"Ahmed","author":"Rossi Ryan A.","year":"2015","unstructured":"Ryan A. Rossi and Nesreen K . Ahmed . 2015 . The Network Data Repository with Interactive Graph Analytics and Visualization. In Proc. of AAAI. Ryan A. Rossi and Nesreen K. Ahmed. 2015. The Network Data Repository with Interactive Graph Analytics and Visualization. In Proc. of AAAI."},{"key":"e_1_3_2_2_74_1","volume-title":"Proc. of IMC. ACM.","author":"Roth Spencer","year":"2019","unstructured":"Spencer Roth , Roland van Rijswijk-Deij , and Chung Taejoong . 2019 . Tracking Registrar Support for DNSSEC . In Proc. of IMC. ACM. Spencer Roth, Roland van Rijswijk-Deij, and Chung Taejoong. 2019. Tracking Registrar Support for DNSSEC. In Proc. of IMC. ACM."},{"key":"e_1_3_2_2_75_1","volume-title":"Proc. of IMC. ACM, 710--723","author":"Rula John P","year":"2020","unstructured":"John P Rula , Philipp Richter , Georgios Smaragdakis , and Arthur Berger . 2020 . Who's left behind? Measuring Adoption of Application Updates at Scale . In Proc. of IMC. ACM, 710--723 . John P Rula, Philipp Richter, Georgios Smaragdakis, and Arthur Berger. 2020. Who's left behind? Measuring Adoption of Application Updates at Scale. In Proc. of IMC. ACM, 710--723."},{"key":"e_1_3_2_2_76_1","volume-title":"W3C Candidate Recommendation","author":"Russell Alex","year":"2019","unstructured":"Alex Russell , Jungkee Song , Jake Archibald , and Marijn Kruisselbrink . 2019. Service Workers . W3C Candidate Recommendation ( 2019 ). Alex Russell, Jungkee Song, Jake Archibald, and Marijn Kruisselbrink. 2019. Service Workers. W3C Candidate Recommendation (2019)."},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.385"},{"key":"e_1_3_2_2_78_1","unstructured":"Nick Sullivan. 2014. Keyless SSL: The Nitty Gritty Technical Details. https:\/\/blog.cloudflare.com\/keyless-ssl-the-nitty-gritty-technical-details\/  Nick Sullivan. 2014. Keyless SSL: The Nitty Gritty Technical Details. https:\/\/blog.cloudflare.com\/keyless-ssl-the-nitty-gritty-technical-details\/"},{"key":"e_1_3_2_2_79_1","unstructured":"Akamai Technology. 2020. ProlexicRouted. https:\/\/www.akamai.com\/content\/dam\/site\/en\/documents\/product-brief\/prolexic-routed-product-brief.pdf  Akamai Technology. 2020. ProlexicRouted. https:\/\/www.akamai.com\/content\/dam\/site\/en\/documents\/product-brief\/prolexic-routed-product-brief.pdf"},{"volume-title":"Network Security with OpenSSL: Cryptography for Secure Communications","author":"Viega John","key":"e_1_3_2_2_80_1","unstructured":"John Viega , Matt Messier , and Pravir Chandra . 2002. Network Security with OpenSSL: Cryptography for Secure Communications . O'Reilly Media, Inc. John Viega, Matt Messier, and Pravir Chandra. 2002. Network Security with OpenSSL: Cryptography for Secure Communications. O'Reilly Media, Inc."},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813633"},{"key":"e_1_3_2_2_82_1","volume-title":"Web Cryptography API. W3C Recommendation","author":"Watson Mark","year":"2017","unstructured":"Mark Watson . 2017. Web Cryptography API. W3C Recommendation ( 2017 ). Mark Watson. 2017. Web Cryptography API. W3C Recommendation (2017)."},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3127482"},{"key":"e_1_3_2_2_84_1","volume-title":"Mark C Nottingham","author":"Wein Joel M","year":"2006","unstructured":"Joel M Wein , John Josef Kloninger , Mark C Nottingham , David R Karger , and Philip A Lisiecki. 2006 . HTML Delivery from Edge-of-network Servers in a Content Delivery Network (CDN). U.S. Patents, 6996616B1. Joel M Wein, John Josef Kloninger, Mark C Nottingham, David R Karger, and Philip A Lisiecki. 2006. HTML Delivery from Edge-of-network Servers in a Content Delivery Network (CDN). U.S. Patents, 6996616B1."},{"volume-title":"A Systematic Analysis of XSS Sanitization in Web Application Frameworks","author":"Weinberger Joel","key":"e_1_3_2_2_85_1","unstructured":"Joel Weinberger , Prateek Saxena , Devdatta Akhawe , Matthew Finifter , Richard Shin , and Dawn Song . 2011. A Systematic Analysis of XSS Sanitization in Web Application Frameworks . In ESORICS. Springer , 150--171. Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Richard Shin, and Dawn Song. 2011. A Systematic Analysis of XSS Sanitization in Web Application Frameworks. In ESORICS. Springer, 150--171."},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925628"},{"key":"e_1_3_2_2_87_1","unstructured":"Kinuko Yasuda. 2019. Signed HTTP Exchanges. https:\/\/developers.google.com\/web\/updates\/2018\/11\/signed-exchanges  Kinuko Yasuda. 2019. Signed HTTP Exchanges. https:\/\/developers.google.com\/web\/updates\/2018\/11\/signed-exchanges"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465379"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3559336","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3559336","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3559336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:56Z","timestamp":1750182656000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3559336"}},"subtitle":["An End-to-End Approach to Privacy and Performance in Web Content Distribution"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":87,"alternative-id":["10.1145\/3548606.3559336","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3559336","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}