{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:30:48Z","timestamp":1766579448827,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CNS-2138138"],"award-info":[{"award-number":["CNS-2138138"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,24]]},"DOI":"10.1145\/3577923.3583638","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T10:57:59Z","timestamp":1681988279000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Comparative Privacy Analysis of Mobile Browsers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5659-2805","authenticated-orcid":false,"given":"Ahsan","family":"Zafar","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8961-9963","authenticated-orcid":false,"given":"Anupam","family":"Das","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. Adblock Parser. https:\/\/github.com\/bbondy\/abp-filter-parser"},{"key":"e_1_3_2_1_2_1","unstructured":"2018. Browser Feature Comparison. https:\/\/caniuse.com\/ciu\/comparison."},{"key":"e_1_3_2_1_3_1","unstructured":"The Verge 2018. Duck Duck Go Email Protection features. The Verge. https:\/\/www.theverge.com\/2021\/7\/20\/22576352\/duckduckgo-emailprotection- privacy-trackers-apple-alternative."},{"key":"e_1_3_2_1_4_1","unstructured":"Duck Duck Go 2018. More Privacy and Transparency for DuckDuckGo Web Tracking Protections. Duck Duck Go. https:\/\/spreadprivacy.com\/more-privacyand- transparency\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Brave 2019. Supporting The Web Privacy Community. Brave. https:\/\/brave.com\/ supporting-the-web-privacy-community\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Google Developers 2021. Android Debug Bridge (adb). Google Developers. https: \/\/developer.android.com\/studio\/command-line\/adb"},{"key":"e_1_3_2_1_7_1","unstructured":"2021. Blink. https:\/\/www.chromium.org\/blink"},{"key":"e_1_3_2_1_8_1","unstructured":"2021. Brave Browser. https:\/\/brave.com\/"},{"key":"e_1_3_2_1_9_1","unstructured":"2021. Disconnect. https:\/\/github.com\/disconnectme\/disconnect-trackingprotection"},{"key":"e_1_3_2_1_10_1","unstructured":"2021. DuckDuckgo: Privacy simplified. https:\/\/duckduckgo.com\/app"},{"key":"e_1_3_2_1_11_1","unstructured":"2021. EasyList. https:\/\/easylist.to"},{"key":"e_1_3_2_1_12_1","unstructured":"2021. EasyPrivacy. https:\/\/easylist.to"},{"key":"e_1_3_2_1_13_1","unstructured":"2021. Firefox Focus. https:\/\/support.mozilla.org\/en-US\/kb\/focus"},{"key":"e_1_3_2_1_14_1","unstructured":"2021. Gecko. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Gecko"},{"key":"e_1_3_2_1_15_1","unstructured":"2021. OpenWPM-Mobile. https:\/\/github.com\/sensor-js\/OpenWPM-mobile"},{"key":"e_1_3_2_1_16_1","unstructured":"2021. mitmproxy is a free and open source interactive HTTPS proxy. https: \/\/mitmproxy.org\/"},{"key":"e_1_3_2_1_17_1","unstructured":"Cliqz 2021. Top most prevalent trackers on the web. Cliqz. https:\/\/whotracks.me\/ trackers.html"},{"key":"e_1_3_2_1_18_1","unstructured":"2021. WhoTracksMe. https:\/\/whotracks.me\/trackers.html"},{"key":"e_1_3_2_1_19_1","unstructured":"2022. Agglomerative Clustering. https:\/\/scikit-learn.org\/stable\/modules\/ generated\/sklearn.cluster.AgglomerativeClustering.html."},{"key":"e_1_3_2_1_20_1","unstructured":"2022. Appium. https:\/\/appium.io\/."},{"key":"e_1_3_2_1_21_1","unstructured":"2022. Boost Next Confection. https:\/\/confection.io\/scripts\/boost-next-co-jp\/."},{"key":"e_1_3_2_1_22_1","unstructured":"2022. [Bug] favicon.ico privacy leaks. https:\/\/github.com\/duckduckgo\/Android\/ issues\/2004."},{"key":"e_1_3_2_1_23_1","unstructured":"Brave 2022. Ephemeral Third-party Site Storage. Brave. https:\/\/brave.com\/privacyupdates\/ 7-ephemeral-storage\/."},{"key":"e_1_3_2_1_24_1","unstructured":"Brave 2022. Fingerprint Randomization. Brave. https:\/\/brave.com\/privacyupdates\/ 3-fingerprint-randomization\/."},{"key":"e_1_3_2_1_25_1","unstructured":"Mozilla 2022. Firefox Focus and Klar Privacy Notice. Mozilla. https:\/\/ www.mozilla.org\/en-US\/privacy\/firefox-focus\/."},{"key":"e_1_3_2_1_26_1","unstructured":"2022. Google Play Ranking: The Top Free Tools Apps in the United States. https:\/\/www.appbrain.com\/stats\/google-play-rankings\/top_free\/tools\/us\/."},{"key":"e_1_3_2_1_27_1","unstructured":"Google 2022. Google Web Light. Google. https:\/\/developers.google.com\/search\/ docs\/advanced\/mobile\/web-light."},{"key":"e_1_3_2_1_28_1","unstructured":"2022. Mann Whitney U Test (Wilcoxon Rank Sum Test). https: \/\/sphweb.bumc.bu.edu\/otlt\/mph-modules\/bs\/bs704_nonparametric\/ bs704_nonparametric4.html."},{"key":"e_1_3_2_1_29_1","unstructured":"2022. Nightmare: A high-level browser automation library. https:\/\/github.com\/ segmentio\/nightmare."},{"key":"e_1_3_2_1_30_1","unstructured":"2022. Phantom JS: Scriptable Headless Browser. https:\/\/phantomjs.org\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Apple 2022. Safari's Intelligent Tracking Prevention. Apple. https:\/\/ www.apple.com\/safari\/docs\/Safari_White_Paper_Nov_2019.pdf."},{"key":"e_1_3_2_1_32_1","unstructured":"2022. Selenium. https:\/\/www.seleniumhq.org\/."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_35_1","volume-title":"Flash cookies and privacy II: now with HTML5 and ETag respawning. SSRN Electronic Journal (07","author":"Ayenson Mika","year":"2011","unstructured":"Mika Ayenson, Dietrich Wambach, Ashkan Soltani, Nathaniel Good, and Chris Hoofnagle. 2011. Flash cookies and privacy II: now with HTML5 and ETag respawning. SSRN Electronic Journal (07 2011). https:\/\/doi.org\/10.2139\/ ssrn.1898390"},{"key":"e_1_3_2_1_36_1","unstructured":"Tas Bindi. 2016. Mobile and tablet internet usage surpasses desktop for first time: StatCounter. ZDNet. https:\/\/www.zdnet.com\/article\/mobile-and-tablet-internetusage- exceeds-desktop-for-first-time-statcounter\/"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2637878"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0012"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449837"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243860"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512214"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"volume-title":"Proceedings of the 24th International Conference on World Wide Web (WWW). 289--299","author":"Englehardt Steven","key":"e_1_3_2_1_44_1","unstructured":"Steven Englehardt, Dillon Reisman, Christian Eubank, Peter Zimmerman, Jonathan Mayer, Arvind Narayanan, and Edward W. Felten. 2015. Cookies That Give You Away: The Surveillance Implications of Web Tracking. In Proceedings of the 24th International Conference on World Wide Web (WWW). 289--299."},{"key":"e_1_3_2_1_45_1","unstructured":"Christian Eubank Marcela Melara Diego Perez-Botero and A. Narayanan. 2013. Shining the Floodlights on Mobile Web Tracking - A Privacy Survey. https: \/\/masomel.github.io\/static\/pubs\/s2p2.pdf"},{"key":"e_1_3_2_1_46_1","unstructured":"Samuel Gibbs. 2016. Mobile web browsing overtakes desktop for the first time. https:\/\/www.theguardian.com\/technology\/2016\/nov\/02\/mobile-webbrowsing- desktop-smartphones-tablets."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186097"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818032"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00017"},{"volume-title":"Proceedings of the 41st IEEE Symposium on Security and Privacy (SP). 810--824","author":"Kondracki B.","key":"e_1_3_2_1_51_1","unstructured":"B. Kondracki, A. Aliyeva, M. Egele, J. Polakis, and N. Nikiforakis. 2020. Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers. In Proceedings of the 41st IEEE Symposium on Security and Privacy (SP). 810--824."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526782"},{"volume-title":"Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P). 878--894","author":"Laperdrix P.","key":"e_1_3_2_1_53_1","unstructured":"P. Laperdrix,W. Rudametkin, and B. Baudry. 2016. Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints. In Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P). 878--894."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX).","author":"Lerner Adam","year":"2016","unstructured":"Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner. 2016. Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. In Proceedings of the 25th USENIX Security Symposium (USENIX)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_21"},{"key":"e_1_3_2_1_57_1","unstructured":"Jonathan Mayer. 2011. FourthParty: Web Measurement Platform. http:\/\/ fourthparty.info\/."},{"volume-title":"Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P). 413--427","author":"Mayer J. R.","key":"e_1_3_2_1_58_1","unstructured":"J. R. Mayer and J. C. Mitchell. 2012. Third-Party Web Tracking: Policy and Technology. In Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P). 413--427."},{"key":"e_1_3_2_1_59_1","unstructured":"Nick Nguyen. 2018. Latest Firefox Rolls Out Enhanced Tracking Protec- tion. https:\/\/blog.mozilla.org\/blog\/2018\/10\/23\/latest-firefox-rolls-out-enhancedtracking- protection\/"},{"volume-title":"Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P). 541--555","author":"Nikiforakis N.","key":"e_1_3_2_1_60_1","unstructured":"N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna. 2013. Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. In Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P). 541--555."},{"volume-title":"Proceedings of the 26th International Conference on World Wide Web (WWW). 153--162","author":"Papadopoulos Elias P.","key":"e_1_3_2_1_61_1","unstructured":"Elias P. Papadopoulos, Michalis Diamantaris, Panagiotis Papadopoulos, Thanasis Petsas, Sotiris Ioannidis, and Evangelos P. Markatos. 2017. The Long-Standing Privacy Debate: Mobile Websites vs Mobile Apps. In Proceedings of the 26th International Conference on World Wide Web (WWW). 153--162."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23353"},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 155--168","author":"Roesner Franziska","year":"2012","unstructured":"Franziska Roesner, Tadayoshi Kohno, and David Wetherall. 2012. Detecting and Defending Against Third-Party Tracking on the Web. In Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 155--168."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766523"},{"key":"e_1_3_2_1_65_1","volume-title":"Adnostic: Privacy Preserving Targeted Advertising. Pro- ceedings of the 17th Network and Distributed System Symposium (NDSS).","author":"Toubiana Vincent","year":"2010","unstructured":"Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen F. Nissenbaum, and Solon Barocas. 2010. Adnostic: Privacy Preserving Targeted Advertising. Pro- ceedings of the 17th Network and Distributed System Symposium (NDSS)."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0016"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437536"}],"event":{"name":"CODASPY '23: Thirteenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Charlotte NC USA","acronym":"CODASPY '23"},"container-title":["Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577923.3583638","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3577923.3583638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:41Z","timestamp":1750183721000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577923.3583638"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,24]]},"references-count":67,"alternative-id":["10.1145\/3577923.3583638","10.1145\/3577923"],"URL":"https:\/\/doi.org\/10.1145\/3577923.3583638","relation":{},"subject":[],"published":{"date-parts":[[2023,4,24]]},"assertion":[{"value":"2023-04-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}