{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:00:28Z","timestamp":1773518428421,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1934597, CNS-2211574,CNS-2143363,CNS-2211575,CNS-2126654,CNS-1941617"],"award-info":[{"award-number":["CNS-1934597, CNS-2211574,CNS-2143363,CNS-2211575,CNS-2126654,CNS-1941617"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["ONR N00014-20-1-2720"],"award-info":[{"award-number":["ONR N00014-20-1-2720"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560576","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"2675-2688","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Escaping the Confines of Time"],"prefix":"10.1145","author":[{"given":"Konstantinos","family":"Solomos","sequence":"first","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]},{"given":"Panagiotis","family":"Ilia","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]},{"given":"Nick","family":"Nikiforakis","sequence":"additional","affiliation":[{"name":"Stony Brook University, New York, NY, USA"}]},{"given":"Jason","family":"Polakis","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14)","author":"Eubank Christian","year":"2014","unstructured":"GunesAcar, Christian Eubank , Steven Englehardt , Marc Juarez , Arvind Narayanan , and Claudia Diaz . 2014 . TheWeb Never Forgets: Persistent Tracking Mechanisms in the Wild . In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14) . 674--689. GunesAcar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, and Claudia Diaz. 2014. TheWeb Never Forgets: Persistent Tracking Mechanisms in the Wild. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). 674--689."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_3_1","unstructured":"Furkan Alaca and P. C. van Oorschot. 2016. Device Fingerprinting for Augmenting WebAuthentication: Classification and Analysis of Methods (ACSAC'16). 289--301.  Furkan Alaca and P. C. van Oorschot. 2016. Device Fingerprinting for Augmenting WebAuthentication: Classification and Analysis of Methods (ACSAC'16). 289--301."},{"key":"e_1_3_2_1_4_1","unstructured":"Ben Smith. 2019. Google Blog - Update on Project Strobe: Newpolicies for Chrome and Drive. (2019). https:\/\/blog.google\/technology\/safety-security\/updateproject-strobe-new-policies-chrome-and-drive\/.  Ben Smith. 2019. Google Blog - Update on Project Strobe: Newpolicies for Chrome and Drive. (2019). https:\/\/blog.google\/technology\/safety-security\/updateproject-strobe-new-policies-chrome-and-drive\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Brave. 2021. Brave Fingerprinting Protections. (2021). https:\/\/github.com\/brave\/brave-browser\/wiki\/Fingerprinting-Protections.  Brave. 2021. Brave Fingerprinting Protections. (2021). https:\/\/github.com\/brave\/brave-browser\/wiki\/Fingerprinting-Protections."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23152"},{"key":"e_1_3_2_1_7_1","unstructured":"Chrome. 2022. ChromeDriver - WebDriver for Chrome. (2022). https:\/\/chromedriver.chromium.org\/downloads.  Chrome. 2022. ChromeDriver - WebDriver for Chrome. (2022). https:\/\/chromedriver.chromium.org\/downloads."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243860"},{"key":"e_1_3_2_1_9_1","unstructured":"Docker. 2022. Accelerate how you build share and run modern applications. (2022). https:\/\/www.docker.com\/.  Docker. 2022. Accelerate how you build share and run modern applications. (2022). https:\/\/www.docker.com\/."},{"key":"e_1_3_2_1_10_1","unstructured":"MDN Web Docs. 2021. MutationObserver. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/MutationObserver. (2021).  MDN Web Docs. 2021. MutationObserver. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/MutationObserver. (2021)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Antonin Durey Pierre Laperdrix Walter Rudametkin and Romain Rouvoy. 2021. FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake ofWeb Security. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).  Antonin Durey Pierre Laperdrix Walter Rudametkin and Romain Rouvoy. 2021. FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake ofWeb Security. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).","DOI":"10.1007\/978-3-030-80825-9_12"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881152"},{"key":"e_1_3_2_1_13_1","unstructured":"Emre Erkoca. 2020. MutationObserver and Event Usage. (2020). https:\/\/dev.to\/emreerkoca\/mutationobserver-and-event-usage-35k6.  Emre Erkoca. 2020. MutationObserver and Event Usage. (2020). https:\/\/dev.to\/emreerkoca\/mutationobserver-and-event-usage-35k6."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_15_1","volume-title":"FPGuard: Detection and Prevention of Browser Fingerprinting. In 29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC) (Data and Applications Security and Privacy XXIX)","volume":"9149","author":"FaizKhademi Amin","year":"2015","unstructured":"Amin FaizKhademi , Mohammad Zulkernine , and Komminist Weldemariam . 2015 . FPGuard: Detection and Prevention of Browser Fingerprinting. In 29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC) (Data and Applications Security and Privacy XXIX) , Vol. LNCS- 9149 . 293--308. Amin FaizKhademi, Mohammad Zulkernine, and Komminist Weldemariam. 2015. FPGuard: Detection and Prevention of Browser Fingerprinting. In 29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC) (Data and Applications Security and Privacy XXIX), Vol. LNCS-9149. 293--308."},{"key":"e_1_3_2_1_16_1","unstructured":"firefox 2022. Firefox's protection against fingerprinting. (2022). https:\/\/support.mozilla.org\/en-US\/kb\/firefox-protection-against-fingerprinting.  firefox 2022. Firefox's protection against fingerprinting. (2022). https:\/\/support.mozilla.org\/en-US\/kb\/firefox-protection-against-fingerprinting."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186097"},{"key":"e_1_3_2_1_18_1","unstructured":"Google 2022. Chrome Developers: The Privacy Sandbox. (2022). https:\/\/developer.chrome.com\/docs\/privacy-sandbox\/.  Google 2022. Chrome Developers: The Privacy Sandbox. (2022). https:\/\/developer.chrome.com\/docs\/privacy-sandbox\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268959"},{"key":"e_1_3_2_1_20_1","volume-title":"Bot Detection: Identifying Bot Traffic with Open-source Browser Fingerprinting Techniques.","author":"Hughes Karl","year":"2021","unstructured":"Karl Hughes . 2021 . Bot Detection: Identifying Bot Traffic with Open-source Browser Fingerprinting Techniques. (2021). https:\/\/fingerprintjs.com\/blog\/botdetection\/. Karl Hughes. 2021. Bot Detection: Identifying Bot Traffic with Open-source Browser Fingerprinting Techniques. (2021). https:\/\/fingerprintjs.com\/blog\/botdetection\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00017"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24383"},{"key":"e_1_3_2_1_23_1","volume-title":"31th {USENIX} Security Symposium ({USENIX} Security 22).","author":"Karami Soroush","unstructured":"Soroush Karami , Faezeh Kalantari , Mehrnoosh Zaeifi , Xavier J Maso , Erik Trickel , Panagiotis Ilia , Yan Shoshitaishvili , Adam Doup\u00e9 , and Jason Polakis . 2022. Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention . In 31th {USENIX} Security Symposium ({USENIX} Security 22). Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili,Adam Doup\u00e9, and Jason Polakis. 2022. Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention. In 31th {USENIX} Security Symposium ({USENIX} Security 22)."},{"key":"e_1_3_2_1_24_1","unstructured":"Karl Hughes. 2021. FingerprintJS - Empowering developers to solve fraud at the source. (2021). https:\/\/fingerprintjs.com\/blog\/browser-fingerprinting-privacy\/.  Karl Hughes. 2021. FingerprintJS - Empowering developers to solve fraud at the source. (2021). https:\/\/fingerprintjs.com\/blog\/browser-fingerprinting-privacy\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Pierre Laperdrix Gildas Avoine Benoit Baudry and Nick Nikiforakis. 2019. Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). 43--66.  Pierre Laperdrix Gildas Avoine Benoit Baudry and Nick Nikiforakis. 2019. Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). 43--66.","DOI":"10.1007\/978-3-030-22038-9_3"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386040"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_28_1","volume-title":"30th {USENIX} Security Symposium ({USENIX} Security 21).","author":"Laperdrix Pierre","unstructured":"Pierre Laperdrix , Oleksii Starov ,QuanChen, AlexandrosKapravelos, and Nick Nikiforakis . 2021. Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets . In 30th {USENIX} Security Symposium ({USENIX} Security 21). Pierre Laperdrix, Oleksii Starov,QuanChen, AlexandrosKapravelos, and Nick Nikiforakis. 2021. Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets. In 30th {USENIX} Security Symposium ({USENIX} Security 21)."},{"key":"e_1_3_2_1_29_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Lin Xu","year":"2022","unstructured":"Xu Lin , Panagiotis Ilia , Saumya Solanki , and Jason Polakis . 2022 . Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting . In 31st USENIX Security Symposium (USENIX Security 22) . 1651--1668. Xu Lin, Panagiotis Ilia, Saumya Solanki, and Jason Polakis. 2022. Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting. In 31st USENIX Security Symposium (USENIX Security 22). 1651--1668."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of W2SP","author":"Mowery Keaton","year":"2012","unstructured":"Keaton Mowery and Hovav Shacham . 2012 . Pixel Perfect: Fingerprinting Canvas in HTML5 . In Proceedings of W2SP 2012. Keaton Mowery and Hovav Shacham. 2012. Pixel Perfect: Fingerprinting Canvas in HTML5. In Proceedings of W2SP 2012."},{"key":"e_1_3_2_1_31_1","volume-title":"Web 2.0 Workshop on Security and Privacy (W2SP)","author":"Mulazzani Martin","unstructured":"Martin Mulazzani , Philipp Reschl , Markus Huber , Manuel Leithner , Sebastian Schrittwieser , Edgar Weippl , and FC Wien . 2013. Fast and reliable browser identification with javascript engine fingerprinting . In Web 2.0 Workshop on Security and Privacy (W2SP) , Vol. 5 . Martin Mulazzani, Philipp Reschl, Markus Huber, Manuel Leithner, Sebastian Schrittwieser, Edgar Weippl, and FC Wien. 2013. Fast and reliable browser identification with javascript engine fingerprinting. In Web 2.0 Workshop on Security and Privacy (W2SP), Vol. 5."},{"key":"e_1_3_2_1_32_1","unstructured":"Neeraj Singh. 2010. How jQuery selects elements using Sizzle. (2010). https:\/\/www.bigbinary.com\/blog\/how-jquery-selects-elements-using-sizzle.  Neeraj Singh. 2010. How jQuery selects elements using Sizzle. (2010). https:\/\/www.bigbinary.com\/blog\/how-jquery-selects-elements-using-sizzle."},{"key":"e_1_3_2_1_33_1","unstructured":"NPM JS. 2021. Pako in JS. (2021). https:\/\/www.npmjs.com\/package\/pako.  NPM JS. 2021. Pako in JS. (2021). https:\/\/www.npmjs.com\/package\/pako."},{"key":"e_1_3_2_1_34_1","unstructured":"NPM JS. 2021. Sizzle. A pure-JavaScript CSS selector engine designed to be easily dropped in to a host library. (2021). https:\/\/www.npmjs.com\/package\/sizzle.  NPM JS. 2021. Sizzle. A pure-JavaScript CSS selector engine designed to be easily dropped in to a host library. (2021). https:\/\/www.npmjs.com\/package\/sizzle."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00481-8"},{"key":"e_1_3_2_1_36_1","unstructured":"CoreyProphitt. 2017. Nefarious LinkedIn. https:\/\/github.com\/dandrews\/nefariouslinkedin. (2017).  CoreyProphitt. 2017. Nefarious LinkedIn. https:\/\/github.com\/dandrews\/nefariouslinkedin. (2017)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0004"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 26rd USENIX Security Symposium (USENIX Security).","author":"Sanchez-Rola Iskander","year":"2017","unstructured":"Iskander Sanchez-Rola , Igor Santos , and Davide Balzarotti . 2017 . Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies . In Proceedings of the 26rd USENIX Security Symposium (USENIX Security). Iskander Sanchez-Rola, Igor Santos, and Davide Balzarotti. 2017. Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies. In Proceedings of the 26rd USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_39_1","unstructured":"Selenium. 2022. Selenium is a suite of tools for automating web browsers. (2022). https:\/\/www.selenium.dev\/.  Selenium. 2022. Selenium is a suite of tools for automating web browsers. (2022). https:\/\/www.selenium.dev\/."},{"key":"e_1_3_2_1_40_1","unstructured":"Sergey Mostsevenko. 2021. Howad blockers can be used for browser fingerprinting. (2021). https:\/\/fingerprintjs.com\/blog\/ad-blocker-fingerprinting\/.  Sergey Mostsevenko. 2021. Howad blockers can be used for browser fingerprinting. (2021). https:\/\/fingerprintjs.com\/blog\/ad-blocker-fingerprinting\/."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23309"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029820"},{"key":"e_1_3_2_1_43_1","volume-title":"EssentialFP: Exposing the Essence of Browser Fingerprinting. In 2021 IEEE European Symposium on Security and PrivacyWorkshops (EuroS PW). 32--48","author":"Sj\u00f6sten Alexander","year":"2021","unstructured":"Alexander Sj\u00f6sten , Daniel Hedin , and Andrei Sabelfeld . 2021 . EssentialFP: Exposing the Essence of Browser Fingerprinting. In 2021 IEEE European Symposium on Security and PrivacyWorkshops (EuroS PW). 32--48 . Alexander Sj\u00f6sten, Daniel Hedin, and Andrei Sabelfeld. 2021. EssentialFP: Exposing the Essence of Browser Fingerprinting. In 2021 IEEE European Symposium on Security and PrivacyWorkshops (EuroS PW). 32--48."},{"key":"e_1_3_2_1_44_1","volume-title":"31th {USENIX} Security Symposium ({USENIX} Security 22).","author":"Solomos Konstantinos","unstructured":"Konstantinos Solomos , Panagiotis Ilia , Soroush Karami , Nick Nikiforakis , and Jason Polakis . 2022. The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions . In 31th {USENIX} Security Symposium ({USENIX} Security 22). Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, and Jason Polakis. 2022. The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions. In 31th {USENIX} Security Symposium ({USENIX} Security 22)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313458"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.18"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1137\/0222018"},{"key":"e_1_3_2_1_48_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Trickel Erik","year":"2019","unstructured":"Erik Trickel , Oleksii Starov , Alexandros Kapravelos , Nick Nikiforakis , and Adam Doup\u00e9 . 2019 . Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting . In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, 1679--1696. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/trickel Erik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, and Adam Doup\u00e9. 2019. Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1679--1696. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/trickel"},{"key":"e_1_3_2_1_49_1","volume-title":"11th {USENIX} Workshop on Offensive Technologies (WOOT 17).","author":"Goethem Tom Van","unstructured":"Tom Van Goethem and Wouter Joosen . 2017. One side-channel to bring them all and in the darkness bind them: Associating isolated browsing sessions . In 11th {USENIX} Workshop on Offensive Technologies (WOOT 17). Tom Van Goethem and Wouter Joosen. 2017. One side-channel to bring them all and in the darkness bind them: Associating isolated browsing sessions. In 11th {USENIX} Workshop on Offensive Technologies (WOOT 17)."},{"key":"e_1_3_2_1_50_1","volume-title":"Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Vastel Antoine","year":"2018","unstructured":"Antoine Vastel , Pierre Laperdrix , Walter Rudametkin , and Romain Rouvoy . 2018 . Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies. In 27th USENIX Security Symposium (USENIX Security 18) . 135--150. Antoine Vastel, Pierre Laperdrix,Walter Rudametkin, and Romain Rouvoy. 2018. Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies. In 27th USENIX Security Symposium (USENIX Security 18). 135--150."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00008"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Antoine Vastel Walter Rudametkin Romain Rouvoy and Xavier Blanc. 2020. FPCrawlers: Studying the Resilience of Browser Fingerprinting to Block Crawlers. In MADWeb'20 - NDSSWorkshop on Measurements Attacks and Defenses for theWeb.  Antoine Vastel Walter Rudametkin Romain Rouvoy and Xavier Blanc. 2020. FPCrawlers: Studying the Resilience of Browser Fingerprinting to Block Crawlers. In MADWeb'20 - NDSSWorkshop on Measurements Attacks and Defenses for theWeb.","DOI":"10.14722\/madweb.2020.23010"},{"key":"e_1_3_2_1_53_1","unstructured":"W3C. 2000. Mutation event types. (2000). https:\/\/www.w3.org\/TR\/DOM-Level-2-Events\/events.html#Events-eventgroupings-mutationevents.  W3C. 2000. Mutation event types. (2000). https:\/\/www.w3.org\/TR\/DOM-Level-2-Events\/events.html#Events-eventgroupings-mutationevents."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560576","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560576","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560576","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:57Z","timestamp":1750182657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560576"}},"subtitle":["Continuous Browser Extension Fingerprinting Through Ephemeral Modifications"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":53,"alternative-id":["10.1145\/3548606.3560576","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560576","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}