{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:40:06Z","timestamp":1755870006310,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union?s Horizon 2020 Research and Innovation program","award":["101021808, 830927"],"award-info":[{"award-number":["101021808, 830927"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,24]]},"DOI":"10.1145\/3618257.3624842","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:19:52Z","timestamp":1698020392000},"page":"181-187","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Not only E.T. Phones Home: Analysing the Native User Tracking of Mobile Browsers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5236-2361","authenticated-orcid":false,"given":"John","family":"Pegioudis","sequence":"first","affiliation":[{"name":"FORTH &amp; University of Crete, Heraklion, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8959-2465","authenticated-orcid":false,"given":"Emmanouil","family":"Papadogiannakis","sequence":"additional","affiliation":[{"name":"FORTH &amp; University of Crete, Heraklion, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5674-1698","authenticated-orcid":false,"given":"Nicolas","family":"Kourtellis","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3563-7733","authenticated-orcid":false,"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[{"name":"FORTH &amp; University of Crete, Heraklion, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1928-6534","authenticated-orcid":false,"given":"Panagiotis","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"FORTH, Heraklion, Greece"}]}],"member":"320","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313542"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450056"},{"key":"e_1_3_2_2_4_1","volume-title":"Pool-party: Exploiting browser resource pools as side-channels for web tracking. arXiv preprint arXiv:2112.06324","author":"Snyder Peter","year":"2021","unstructured":"Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, and Hamed Haddadi. Pool-party: Exploiting browser resource pools as side-channels for web tracking. arXiv preprint arXiv:2112.06324, 2021."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193111.3193117"},{"key":"e_1_3_2_2_6_1","volume-title":"Safe browsing apis (v4). https:\/\/developers.google.com\/safe-browsing\/v4","author":"Developer Google","year":"2023","unstructured":"Google Developer. Safe browsing apis (v4). https:\/\/developers.google.com\/safe-browsing\/v4, 2023."},{"key":"e_1_3_2_2_7_1","volume-title":"31st USENIX Security Symposium, USENIX Sec'22","author":"Siby Sandra","year":"2022","unstructured":"Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, and Carmela Troncoso. {WebGraph}: Capturing advertising and tracking information flows for robust blocking. In 31st USENIX Security Symposium, USENIX Sec'22, 2022."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00017"},{"key":"e_1_3_2_2_9_1","volume-title":"Internet traffic from mobile devices (apr","author":"Howarth Josh","year":"2023","unstructured":"Josh Howarth. Internet traffic from mobile devices (apr 2023). https:\/\/ explodingtopics.com\/blog\/mobile-internet-traffic, 2023."},{"key":"e_1_3_2_2_10_1","volume-title":"Tor project. https:\/\/www.torproject.org\/","author":"Project Tor","year":"2023","unstructured":"Tor Project. Tor project. https:\/\/www.torproject.org\/, 2023."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450050"},{"key":"e_1_3_2_2_12_1","volume-title":"Russian tech giant yandex's data harvesting raises security concerns. https:\/\/www.ft.com\/content\/c02083b5-8a0a-48e5-b850-831a3e6406bb","author":"McGee Patrick","year":"2022","unstructured":"Patrick McGee. Russian tech giant yandex's data harvesting raises security concerns. https:\/\/www.ft.com\/content\/c02083b5-8a0a-48e5-b850-831a3e6406bb, 2022."},{"volume-title":"http:\/\/appium.io\/docs\/en\/2.0\/","year":"2023","key":"e_1_3_2_2_13_1","unstructured":"Appium. http:\/\/appium.io\/docs\/en\/2.0\/, 2023."},{"volume-title":"https:\/\/frida.re\/","year":"2023","key":"e_1_3_2_2_14_1","unstructured":"Frida. https:\/\/frida.re\/, 2023."},{"volume-title":"Chrome developers. https:\/\/chromedevtools.github.io\/devtools-protocol\/","year":"2023","key":"e_1_3_2_2_15_1","unstructured":"Curlie. Chrome developers. https:\/\/chromedevtools.github.io\/devtools-protocol\/, 2023."},{"key":"e_1_3_2_2_16_1","volume-title":"mitmproxy - an interactive https proxy. https:\/\/ mitmproxy.org\/","author":"Project Mitmproxy","year":"2023","unstructured":"Mitmproxy Project. mitmproxy - an interactive https proxy. https:\/\/ mitmproxy.org\/, 2023."},{"key":"e_1_3_2_2_17_1","volume-title":"https:\/\/developer.android.com\/reference\/android\/ os\/Process.html#myUid%28%29","author":"Developers Android","year":"2023","unstructured":"Android Developers. Process. https:\/\/developer.android.com\/reference\/android\/ os\/Process.html#myUid%28%29, 2023."},{"volume-title":"Top mobile browsers. https:\/\/gs.statcounter.com\/browser-market-share\/mobile","year":"2023","key":"e_1_3_2_2_18_1","unstructured":"statcounter. Top mobile browsers. https:\/\/gs.statcounter.com\/browser-market-share\/mobile, 2023."},{"volume-title":"Remote protocols. https:\/\/firefox-source-docs.mozilla.org\/remote\/ index.html","year":"2023","key":"e_1_3_2_2_19_1","unstructured":"Firefox. Remote protocols. https:\/\/firefox-source-docs.mozilla.org\/remote\/ index.html, 2023."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"volume-title":"The collector of urls. https:\/\/curlie.org\/","year":"2023","key":"e_1_3_2_2_21_1","unstructured":"Curlie. The collector of urls. https:\/\/curlie.org\/, 2023."},{"key":"e_1_3_2_2_22_1","volume-title":"Accessed on September 18th","author":"Pegioudis John","year":"2023","unstructured":"John Pegioudis. Website list. https:\/\/github.com\/BanForFun\/panoptes-results\/ blob\/master\/1k.txt, 2023. Accessed on September 18th, 2023."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.32"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186060"},{"key":"e_1_3_2_2_25_1","volume-title":"https:\/\/github.com\/StevenBlack\/hosts","author":"Black Steven","year":"2023","unstructured":"Steven Black. Adware & malware hosts. https:\/\/github.com\/StevenBlack\/hosts, 2023."},{"key":"e_1_3_2_2_26_1","volume-title":"The best browser with adblocker. https:\/\/coccoc.com\/en\/chan-quang-cao","author":"Browser Coc Coc","year":"2023","unstructured":"Coc Coc Browser. The best browser with adblocker. https:\/\/coccoc.com\/en\/chan-quang-cao, 2023."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_14"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.21"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_2_30_1","volume-title":"Block sensitive categories. https:\/\/support.google.com\/ admanager\/answer\/2541069","author":"Manager Google Ad","year":"2023","unstructured":"Google Ad Manager. Block sensitive categories. https:\/\/support.google.com\/ admanager\/answer\/2541069, 2023."},{"key":"e_1_3_2_2_31_1","unstructured":"Data Protection Commision. Transfers of personal data to third countries or international organisations. https:\/\/www.dataprotection.ie\/en\/ organisations\/international-transfers\/transfers-personal-data-third-countries-or-international-organisations 2018."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278561"},{"key":"e_1_3_2_2_33_1","unstructured":"Brand Media Inc. Ip address lookup | geolocation. www.iplocation.net 2023."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00076"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3065243"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0003"},{"volume-title":"Mobile browser market share worldwide. https:\/\/ gs.statcounter.com\/browser-market-share\/mobile\/worldwide","year":"2023","key":"e_1_3_2_2_37_1","unstructured":"StatsCounter. Mobile browser market share worldwide. https:\/\/ gs.statcounter.com\/browser-market-share\/mobile\/worldwide, 2023."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.39"},{"key":"e_1_3_2_2_39_1","volume-title":"19th USENIX Security Symposium","author":"Aggarwal Gaurav","year":"2010","unstructured":"Gaurav Aggarwal, Elie Bursztein, Collin Jackson, and Dan Boneh. An analysis of private browsing modes in modern browsers. In 19th USENIX Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings, USENIX Security'10, page 6. USENIX Association, 2010."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.5220\/0009885301920200"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0035"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906392"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663719"},{"key":"e_1_3_2_2_44_1","volume-title":"The menlo report: Ethical principles guiding information and communication technology research. Available at SSRN 2445102","author":"Kenneally Erin","year":"2012","unstructured":"Erin Kenneally and David Dittrich. The menlo report: Ethical principles guiding information and communication technology research. Available at SSRN 2445102, 2012."},{"key":"e_1_3_2_2_45_1","volume-title":"Ethical research standards in a world of big. F1000Research, 3","author":"Rivers Caitlin M.","year":"2014","unstructured":"Caitlin M. Rivers and Bryan L. Lewis. Ethical research standards in a world of big. F1000Research, 3, 2014"}],"event":{"name":"IMC '23: ACM Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Montreal QC Canada","acronym":"IMC '23"},"container-title":["Proceedings of the 2023 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624842","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3618257.3624842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:15:18Z","timestamp":1755868518000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":45,"alternative-id":["10.1145\/3618257.3624842","10.1145\/3618257"],"URL":"https:\/\/doi.org\/10.1145\/3618257.3624842","relation":{},"subject":[],"published":{"date-parts":[[2023,10,24]]},"assertion":[{"value":"2023-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}