{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T23:20:37Z","timestamp":1777591237924,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T00:00:00Z","timestamp":1702339200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,12]]},"DOI":"10.1145\/3630590.3630599","type":"proceedings-article","created":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T12:04:36Z","timestamp":1702382676000},"page":"69-77","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["SSOLogin: A framework for automated web privacy measurement with SSO logins"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6485-8490","authenticated-orcid":false,"given":"Tien-Huy","family":"Pham","sequence":"first","affiliation":[{"name":"VNUHCM-UIT, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9748-0060","authenticated-orcid":false,"given":"Quoc-Huy","family":"Vo","sequence":"additional","affiliation":[{"name":"Sokendai, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1950-8384","authenticated-orcid":false,"given":"Ha","family":"Dao","sequence":"additional","affiliation":[{"name":"MPI-INF, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8372-2807","authenticated-orcid":false,"given":"Kensuke","family":"Fukuda","sequence":"additional","affiliation":[{"name":"NII\/Sokendai, Japan"}]}],"member":"320","published-online":{"date-parts":[[2023,12,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","year":"2022","unstructured":"2009. Federal Trade Commission. Self-regulatory principles for online behavioral advertising: Tracking, targeting, and technology. (2009). Retrieved December 30, 2022 from https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/federal-trade-commission-staff-report-self-regulatory-principles-online-behavioral-advertising\/p085400behavadreport.pdf"},{"key":"e_1_3_2_1_2_1","volume-title":"Retrieved","year":"2023","unstructured":"2016. Adblockparser limitations. (2016). Retrieved June 20, 2023 from https:\/\/github.com\/scrapinghub\/adblockparser#limitations"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","year":"2023","unstructured":"2016. Python parser for Adblock Plus filters. (2016). Retrieved March 22, 2023 from https:\/\/github.com\/scrapinghub\/adblockparser"},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","year":"2022","unstructured":"2022. Free IP Geolocation API. (2022). Retrieved August 30, 2022 from https:\/\/freegeoip.app\/"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","year":"2022","unstructured":"2022. IP Geolocation API. (2022). Retrieved August 30, 2022 from https:\/\/ip-api.com\/"},{"key":"e_1_3_2_1_6_1","volume-title":"Retrieved","year":"2023","unstructured":"2023. EasyList. (2023). Retrieved March 30, 2023 from https:\/\/easylist.to\/easylist\/easylist.txt"},{"key":"e_1_3_2_1_7_1","volume-title":"Retrieved","year":"2023","unstructured":"2023. EasyPrivacy. (2023). Retrieved March 30, 2023 from https:\/\/easylist.to\/easylist\/easyprivacy.txt"},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","year":"2023","unstructured":"2023. FortiGuard Web Filtering. (2023). Retrieved January 30, 2023 from https:\/\/fortiguard.com\/webfilter"},{"key":"e_1_3_2_1_9_1","volume-title":"MaxMind GeoIP2 Python API. (2023). Retrieved","year":"2022","unstructured":"2023. MaxMind GeoIP2 Python API. (2023). Retrieved August 30, 2022 from https:\/\/dev.maxmind.com\/geoip\/geoip2\/geolite2\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Rebecca Balebako Pedro Leon Richard Shay Blase Ur Yang Wang and L Cranor. 2012. Measuring the effectiveness of privacy tools for limiting behavioral advertising. In W2SP\u201912-SP."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517881.2517886"},{"key":"e_1_3_2_1_12_1","volume-title":"Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. The journal of strategic Information Systems 11, 3-4","author":"Belanger France","year":"2002","unstructured":"France Belanger, Janine\u00a0S Hiller, and Wanda\u00a0J Smith. 2002. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. The journal of strategic Information Systems 11, 3-4 (2002), 245\u2013270."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3136067"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of ACM CoNEXT. 1\u201313","author":"Carrascosa Juan\u00a0Miguel","year":"2015","unstructured":"Juan\u00a0Miguel Carrascosa, Jakub Mikians, Ruben Cuevas, Vijay Erramilli, and Nikolaos Laoutaris. 2015. I always feel like somebody\u2019s watching me: measuring online behavioural advertising. In Proceedings of ACM CoNEXT. 1\u201313."},{"key":"e_1_3_2_1_15_1","volume-title":"Computer Security","author":"Chatzimpyrros Manolis","unstructured":"Manolis Chatzimpyrros, Konstantinos Solomos, and Sotiris Ioannidis. 2019. You shall not register! detecting privacy leaks across registration forms. In Computer Security. Springer, 91\u2013104."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494860"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Steven Englehardt 2018. Automated discovery of privacy violations on the web. (2018).","DOI":"10.1515\/popets-2018-0006"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560692"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555352"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2010.08.011"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338500.3360331"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866929"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3463676.3485600"},{"key":"e_1_3_2_1_24_1","volume-title":"State of the information privacy literature: Where are we now and where should we go?MIS quarterly","author":"Pavlou A","year":"2011","unstructured":"Paul\u00a0A Pavlou. 2011. State of the information privacy literature: Where are we now and where should we go?MIS quarterly (2011), 977\u2013988."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_1_26_1","volume-title":"d.]. Chrome DevTools Protocol. ([n. d.]). Retrieved","author":"Protocol DevTools","year":"2023","unstructured":"Chrome\u00a0DevTools Protocol. [n. d.]. Chrome DevTools Protocol. ([n. d.]). Retrieved Feb 8, 2023 from https:\/\/chromedevtools.github.io\/devtools-protocol\/tot\/Network"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28486-1_26"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of RAID. 227\u2013241","author":"Solomos Konstantinos","year":"2019","unstructured":"Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, and Nicolas Kourtellis. 2019. TALON: an automated framework for cross-device tracking detection. In Proceedings of RAID. 227\u2013241."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278551"},{"key":"e_1_3_2_1_31_1","volume-title":"SSO-Monitor: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild. arXiv preprint arXiv:2302.01024","author":"Westers Maximilian","year":"2023","unstructured":"Maximilian Westers, Tobias Wich, Louis Jannett, Vladislav Mladenov, Christian Mainka, and Andreas Mayer. 2023. SSO-Monitor: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild. arXiv preprint arXiv:2302.01024 (2023)."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the USENIX Security. 495\u2013510","author":"Zhou Yuchen","year":"2014","unstructured":"Yuchen Zhou and David Evans. 2014. SSOScan: Automated testing of web applications for Single Sign-On vulnerabilities. In Proceedings of the USENIX Security. 495\u2013510."}],"event":{"name":"AINTEC '23: Asian Internet Engineering Conference","location":"Hanoi Vietnam","acronym":"AINTEC '23"},"container-title":["Proceedings of the 18th Asian Internet Engineering Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630590.3630599","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3630590.3630599","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:13:04Z","timestamp":1755972784000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630590.3630599"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,12]]},"references-count":32,"alternative-id":["10.1145\/3630590.3630599","10.1145\/3630590"],"URL":"https:\/\/doi.org\/10.1145\/3630590.3630599","relation":{},"subject":[],"published":{"date-parts":[[2023,12,12]]},"assertion":[{"value":"2023-12-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}