{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:40:07Z","timestamp":1755870007494,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/S036075\/1"],"award-info":[{"award-number":["EP\/S036075\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,24]]},"DOI":"10.1145\/3618257.3624836","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:19:52Z","timestamp":1698020392000},"page":"383-390","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A First Look at the Privacy Harms of the Public Suffix List"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0616-2532","authenticated-orcid":false,"given":"Stephen","family":"McQuistin","sequence":"first","affiliation":[{"name":"University of St Andrews, St Andrews, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7880-2503","authenticated-orcid":false,"given":"Peter","family":"Snyder","sequence":"additional","affiliation":[{"name":"Brave Software, San Francisco, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3404-8964","authenticated-orcid":false,"given":"Colin","family":"Perkins","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5895-8903","authenticated-orcid":false,"given":"Hamed","family":"Haddadi","sequence":"additional","affiliation":[{"name":"Imperial College London &amp; Brave Software, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3010-791X","authenticated-orcid":false,"given":"Gareth","family":"Tyson","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science &amp; Technology, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_2_1","unstructured":"HTTP Archive. https:\/\/httparchive.org."},{"key":"e_1_3_2_1_3_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Castelluccia Claude","year":"2014","unstructured":"Claude Castelluccia, Lukasz Olejnik, and Tran Minh-Dung. Selling off privacy at auction. In Network and Distributed System Security Symposium (NDSS), 2014."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0038"},{"key":"e_1_3_2_1_6_1","unstructured":"Mozilla Foundation. GitHub: Public suffix list. https:\/\/github.com\/publicsuffix\/list."},{"key":"e_1_3_2_1_7_1","unstructured":"Mozilla Foundation. Public suffix list. https:\/\/publicsuffix.org."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091514"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_2"},{"key":"e_1_3_2_1_10_1","unstructured":"Google. Chrome UX report. https:\/\/web.dev\/chrome-ux-report."},{"key":"e_1_3_2_1_11_1","unstructured":"IANA. Root zone database. https:\/\/www.iana.org\/domains\/root\/db."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_21"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382267"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.26"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313542"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815705"},{"key":"e_1_3_2_1_18_1","first-page":"155","volume-title":"Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12)","author":"Roesner Franziska","year":"2012","unstructured":"Franziska Roesner, Tadayoshi Kohno, and David Wetherall. Detecting and defending against third-party tracking on the web. In Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12), pages 155--168, 2012."},{"key":"e_1_3_2_1_19_1","unstructured":"Japan Registry Services. Technical bylaws on attribute type (organization type type) regional type JP domain name registration etc. https:\/\/jprs.jp\/doc\/rule\/ saisoku-1.html."},{"key":"e_1_3_2_1_20_1","unstructured":"Sourcegraph. https:\/\/sourcegraph.com."},{"key":"e_1_3_2_1_21_1","volume-title":"Internet Engineering Task Force","author":"Sullivan Andrew","year":"2016","unstructured":"Andrew Sullivan, Jeff Hodges, and John R. Levine. DBOUND: DNS Administrative Boundaries Problem Statement. Internet-Draft draft-sullivan-dbound-problem-statement-02, Internet Engineering Task Force, February 2016. Work in Progress."},{"key":"e_1_3_2_1_22_1","first-page":"373","volume-title":"IMC","author":"Zarras Apostolis","year":"2014","unstructured":"Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna. The dark alleys of madison avenue: Understanding malicious advertisements. In IMC, pages 373--380, 2014."}],"event":{"name":"IMC '23: ACM Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Montreal QC Canada","acronym":"IMC '23"},"container-title":["Proceedings of the 2023 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624836","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3618257.3624836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:19:12Z","timestamp":1755868752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624836"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":22,"alternative-id":["10.1145\/3618257.3624836","10.1145\/3618257"],"URL":"https:\/\/doi.org\/10.1145\/3618257.3624836","relation":{},"subject":[],"published":{"date-parts":[[2023,10,24]]},"assertion":[{"value":"2023-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}