{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:26:51Z","timestamp":1766442411468,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":100,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765113","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:37:25Z","timestamp":1763854645000},"page":"4229-4243","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["PIIxel Leaks: Passive Identification of Personally Identifiable Information Leakage through Meta Pixel"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4718-5172","authenticated-orcid":false,"given":"Paschalis","family":"Bekos","sequence":"first","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1928-6534","authenticated-orcid":false,"given":"Panagiotis","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"FORTH, Heraklion, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5674-1698","authenticated-orcid":false,"given":"Nicolas","family":"Kourtellis","sequence":"additional","affiliation":[{"name":"Telefonica Scientific Research, Barcelona, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3106-0343","authenticated-orcid":false,"given":"Michalis","family":"Polychronakis","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"General data protection regulation (GDPR). https:\/\/gdpr-info.eu\/."},{"key":"e_1_3_2_1_2_1","unstructured":"California consumer privacy act (CCPA). https:\/\/cppa.ca.gov\/regulations\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Health insurance portability and accountability act (HIPAA). https: \/\/www.cdc.gov\/phlp\/php\/resources\/health-insurance-portability-andaccountability- act-of-1996-hipaa.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Children's online privacy protection rule (COPPA). https:\/\/www.ftc.gov\/legallibrary\/ browse\/rules\/childrens-online-privacy-protection-rule-coppa."},{"key":"e_1_3_2_1_5_1","unstructured":"Video privacy protection act (VPPA). https:\/\/www.congress.gov\/bill\/100thcongress\/ senate-bill\/2361."},{"key":"e_1_3_2_1_6_1","volume-title":"Privacy sandbox. https:\/\/developers.google.com\/privacy-sandbox\/ cookies","author":"Google Inc.","year":"2024","unstructured":"Google Inc. Privacy sandbox. https:\/\/developers.google.com\/privacy-sandbox\/ cookies, 2024."},{"key":"e_1_3_2_1_7_1","unstructured":"Mozilla. Referrer-policy header. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/ HTTP\/Headers\/Referrer-Policy."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/953460.953509"},{"key":"e_1_3_2_1_9_1","volume-title":"What is a tracking pixel, and how does it work? https:\/\/nordvpn.com\/blog\/what-is-a-tracking-pixel\/","author":"Higgins Malcolm","year":"2023","unstructured":"Malcolm Higgins. What is a tracking pixel, and how does it work? https:\/\/nordvpn.com\/blog\/what-is-a-tracking-pixel\/, 2023."},{"key":"e_1_3_2_1_10_1","volume-title":"Lurking beneath the surface: Hidden impacts of pixel tracking. https:\/\/www.ftc.gov\/policy\/advocacy-research\/tech-at-ftc\/2023\/ 03\/lurking-beneath-surface-hidden-impacts-pixel-tracking","author":"Federal Trade Commission","year":"2023","unstructured":"Federal Trade Commission. Lurking beneath the surface: Hidden impacts of pixel tracking. https:\/\/www.ftc.gov\/policy\/advocacy-research\/tech-at-ftc\/2023\/ 03\/lurking-beneath-surface-hidden-impacts-pixel-tracking, 2023."},{"key":"e_1_3_2_1_11_1","unstructured":"The ABCs of tracking pixels: What they are and how they work. https:\/\/improvado.io\/blog\/what-is-tracking-pixel."},{"key":"e_1_3_2_1_12_1","unstructured":"Meta Pixel. https:\/\/www.facebook.com\/business\/tools\/meta-pixel."},{"key":"e_1_3_2_1_13_1","unstructured":"Advanced matching. https:\/\/developers.facebook.com\/docs\/meta-pixel\/ advanced\/advanced-matching."},{"key":"e_1_3_2_1_14_1","first-page":"631","volume-title":"Proceedings of the 21st USENIX Security Symposium","author":"Kontaxis Georgios","year":"2012","unstructured":"Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, and Evangelos P. Markatos. Privacy-preserving social plugins. In Proceedings of the 21st USENIX Security Symposium, pages 631--646, 2012."},{"key":"e_1_3_2_1_15_1","volume-title":"Meta tracking tools illegal. https:\/\/noyb.eu\/en\/austrian-dsbmeta- tracking-tools-illegal","author":"Austrian","year":"2023","unstructured":"Austrian DSB: Meta tracking tools illegal. https:\/\/noyb.eu\/en\/austrian-dsbmeta- tracking-tools-illegal, 2023."},{"key":"e_1_3_2_1_16_1","volume-title":"Beslut efter tillsyn enligt dataskyddsf\u00f6rordningen mot Avanza Bank AB. https:\/\/www.imy.se\/globalassets\/dokument\/beslut\/ 2024\/beslut-tillsyn-avanza.pdf","author":"Swedish Data Protection Agency","year":"2024","unstructured":"Swedish Data Protection Agency. Beslut efter tillsyn enligt dataskyddsf\u00f6rordningen mot Avanza Bank AB. https:\/\/www.imy.se\/globalassets\/dokument\/beslut\/ 2024\/beslut-tillsyn-avanza.pdf, 2024."},{"key":"e_1_3_2_1_17_1","unstructured":"Federal Trade Commission. FTC staff report finds large social media and video streaming companies have engaged in vast surveillance of users with lax privacy controls and inadequate safeguards for kids and teens. https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2024\/09\/ftc-staffreport-finds-large-social-media-video-streaming-companies-have-engagedvast-surveillance 2024."},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/arstechnica.com\/tech-policy\/2024\/02\/amc-to-pay-8m-for-allegedlyviolating- 1988-law-with-use-of-meta-pixel\/","author":"Meta Pixel AMC","year":"2024","unstructured":"AMC to pay $8m for allegedly violating 1988 law with use of Meta Pixel. https:\/\/arstechnica.com\/tech-policy\/2024\/02\/amc-to-pay-8m-for-allegedlyviolating- 1988-law-with-use-of-meta-pixel\/, 2024."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0028"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494860"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0006"},{"key":"e_1_3_2_1_23_1","first-page":"499","volume-title":"Proceedings of the Privacy Enhancing Technologies Symposium (PETS)","author":"Fouad Imane","year":"2018","unstructured":"Imane Fouad, Nataliia Bielova, Arnaud Legout, and Natasa Sarafijanovic-Djukic. Missed by filter lists: Detecting unknown third-party trackers with invisible pixels. In Proceedings of the Privacy Enhancing Technologies Symposium (PETS), pages 499--518, 2018."},{"key":"e_1_3_2_1_24_1","first-page":"2132","volume-title":"Proceedings of the ACM Web Conference","author":"Bekos Paschalis","year":"2023","unstructured":"Paschalis Bekos, Panagiotis Papadopoulos, Evangelos P. Markatos, and Nicolas Kourtellis. The hitchhiker's guide to Facebook web tracking with invisible pixels and click IDs. In Proceedings of the ACM Web Conference, pages 2132--2143, 2023."},{"volume-title":"Customer information parameters. https:\/\/developers.facebook.com\/docs\/marketing-api\/conversions-api\/parameters\/customer-informationparameters\/","year":"2025","key":"e_1_3_2_1_25_1","unstructured":"Meta. Customer information parameters. https:\/\/developers.facebook.com\/docs\/marketing-api\/conversions-api\/parameters\/customer-informationparameters\/, 2025."},{"volume-title":"Set up automatic advanced matching in Meta events manager. https: \/\/www.facebook.com\/business\/help\/1993001664341800?id=1205376682832142","year":"2025","key":"e_1_3_2_1_26_1","unstructured":"Meta. Set up automatic advanced matching in Meta events manager. https: \/\/www.facebook.com\/business\/help\/1993001664341800?id=1205376682832142, 2025."},{"volume-title":"About core setup. https:\/\/www.facebook.com\/business\/help\/ 124742407297678","year":"2025","key":"e_1_3_2_1_27_1","unstructured":"Meta. About core setup. https:\/\/www.facebook.com\/business\/help\/ 124742407297678, 2025."},{"key":"e_1_3_2_1_28_1","unstructured":"Google Inc. Google tag management. https:\/\/tagmanager.google.com\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00118"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561415"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624823"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0048"},{"volume-title":"https:\/\/pptr.dev\/","year":"2018","key":"e_1_3_2_1_33_1","unstructured":"Puppeteer. https:\/\/pptr.dev\/, 2018."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450056"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449837"},{"key":"e_1_3_2_1_36_1","volume-title":"https:\/\/www.facebook.com\/help\/337244676357509","author":"Facebook","year":"2025","unstructured":"Facebook location services. https:\/\/www.facebook.com\/help\/337244676357509, 2025."},{"key":"e_1_3_2_1_37_1","volume-title":"https:\/\/developers.facebook.com\/docs\/marketing-api\/conversionsapi\/ parameters\/external-id\/","author":"External","year":"2024","unstructured":"External ID. https:\/\/developers.facebook.com\/docs\/marketing-api\/conversionsapi\/ parameters\/external-id\/, 2024."},{"key":"e_1_3_2_1_38_1","unstructured":"SafeDNS category check. https:\/\/www.safedns.com\/check-website."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423653"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359803"},{"key":"e_1_3_2_1_41_1","first-page":"2189","volume-title":"Proceedings of the 31st USENIX Security Symposium","author":"Dambra Savino","year":"2022","unstructured":"Savino Dambra, Iskander Sanchez-Rola, Leyla Bilge, and Davide Balzarotti. When Sally met trackers: Web tracking from the users' perspective. In Proceedings of the 31st USENIX Security Symposium, pages 2189--2206, 2022."},{"key":"e_1_3_2_1_42_1","volume-title":"Facebook watches teens online as they prep for college. https:\/\/themarkup.org\/pixel-hunt\/2023\/11\/22\/facebook-watches-teensonline- as-they-prep-for-college","author":"Markup The","year":"2023","unstructured":"The Markup. Facebook watches teens online as they prep for college. https:\/\/themarkup.org\/pixel-hunt\/2023\/11\/22\/facebook-watches-teensonline- as-they-prep-for-college, 2023."},{"key":"e_1_3_2_1_43_1","unstructured":"Shanti Das. We didn't click 'consent' on any gambling website. So how did Facebook know where we'd been? https:\/\/www.theguardian.com\/technology\/ 2025\/feb\/08\/we-didnt-click-consent-on-any-gambling-website-so-how-didfacebook- know-where-wed-been 2025."},{"key":"e_1_3_2_1_44_1","unstructured":"Adam Satariano. What a gambling app knows about you. https:\/\/www.nytimes. com\/2021\/03\/24\/technology\/gambling-apps-tracking-sky-bet.html."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277240"},{"key":"e_1_3_2_1_46_1","unstructured":"Relja Denic. Data-driven personalization explained [with examples]. https:\/\/www.plainlyvideos.com\/blog\/data-driven-personalization."},{"key":"e_1_3_2_1_47_1","unstructured":"Website personalization: Definition strategies and tips. https:\/\/www.indeed. com\/career-advice\/career-development\/website-personalization."},{"key":"e_1_3_2_1_48_1","unstructured":"SuperOffice. 11 personalization strategies for marketing sales and customer support teams. https:\/\/www.superoffice.com\/blog\/personalization\/."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363200"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICETA.2017.8102477"},{"key":"e_1_3_2_1_51_1","unstructured":"A new default Referrer-Policy for Chrome - strict-origin-when-cross-origin. https:\/\/developer.chrome.com\/blog\/referrer-policy-new-chrome-default."},{"key":"e_1_3_2_1_52_1","volume-title":"NBA Properties","author":"Fan","year":"2023","unstructured":"Fan v. NBA Properties, Inc. et al. - 3:23-cv-05069. https:\/\/www.classaction.org\/ media\/fan-v-nba-properties-inc-et-al.pdf, 2023."},{"key":"e_1_3_2_1_53_1","unstructured":"Lee v. Plex Inc. 5:24-cv-02386 (N.D. Cal.). https:\/\/www.courtlistener.com\/docket\/68459584\/lee-v-plex-inc\/ 2024."},{"key":"e_1_3_2_1_54_1","volume-title":"No. 2: 23-cv-01548-JHC. https:\/\/www.classaction.org\/media\/castillo-et-al-v-costco-wholesale-corporation.pdf","author":"Castillo","year":"2023","unstructured":"Castillo v. Costco Wholesale Corp., No. 2:23-cv-01548-JHC. https:\/\/www.classaction.org\/media\/castillo-et-al-v-costco-wholesale-corporation.pdf, 2023."},{"key":"e_1_3_2_1_55_1","volume-title":"https:\/\/developers.facebook.com\/docs\/meta-pixel\/ reference\/","author":"Reference Meta Pixel","year":"2025","unstructured":"Meta Pixel Reference. https:\/\/developers.facebook.com\/docs\/meta-pixel\/ reference\/, 2025."},{"key":"e_1_3_2_1_56_1","unstructured":"Automatic Facebook pixel events. https:\/\/www.pixelyoursite.com\/majorfacebook- pixel-update-automatic-facebook-pixel-events."},{"key":"e_1_3_2_1_57_1","first-page":"1813","volume-title":"Proceedings of the 31st USENIX Security Symposium","author":"Senol Asuman","year":"2022","unstructured":"Asuman Senol, Gunes Acar, Mathias Humbert, and Frederik Zuiderveen Borgesius. Leaky forms: A study of email and password exfiltration before form submission. In Proceedings of the 31st USENIX Security Symposium, pages 1813-- 1830, 2022."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241132"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131397"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186060"},{"key":"e_1_3_2_1_61_1","first-page":"502","volume-title":"Emergent and Distributed Systems","author":"Rebollo-Monedero Silvia David","year":"2017","unstructured":"David Rebollo-Monedero Silvia Puglisi and Jordi Forn\u00e9. On web user tracking of browsing patterns for personalised advertising. International Journal of Parallel, Emergent and Distributed Systems, pages 502--521, 2017."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData59044.2023.10386760"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836098"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380221"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2013.77"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342549.2342552"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326039"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883028"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2903-2_1"},{"key":"e_1_3_2_1_70_1","volume-title":"Tilburg Law School","author":"Roosendaal Arnold","year":"2010","unstructured":"Arnold Roosendaal. Facebook tracks and traces everyone: Like this! Legal Studies Research Paper 03\/2011, Tilburg Law School, November 2010."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624846"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2882991"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179437"},{"key":"e_1_3_2_1_74_1","first-page":"541","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P)","author":"Nikiforakis Nick","year":"2013","unstructured":"Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, and Giovanni Vigna. Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), pages 541--555, 2013."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0063"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0092"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881152"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0125"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3072874"},{"key":"e_1_3_2_1_80_1","first-page":"2507","volume-title":"Proceedings of the 30th USENIX Security Symposium","author":"Laperdrix Pierre","year":"2021","unstructured":"Pierre Laperdrix, Oleksii Starov, Quan Chen, Alexandros Kapravelos, and Nick Nikiforakis. Fingerprinting in style: Detecting browser extensions via injected style sheets. In Proceedings of the 30th USENIX Security Symposium, pages 2507--2524, 2021."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW61312.2024.00040"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00058"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616586"},{"key":"e_1_3_2_1_84_1","first-page":"19","volume-title":"Proceedings of GI SECURITY","author":"Demir Nurullah","year":"2022","unstructured":"Nurullah Demir, Daniel Theis, Tobias Urban, and Norbert Pohlmann. Towards understanding first-party cookie tracking in the field. In Proceedings of GI SECURITY, pages 19--34, 2022."},{"key":"e_1_3_2_1_85_1","unstructured":"Nurullah Demir Daniel Theis Tobias Urban Norbert Pohlmann and AG Networks. Towards understanding CNAME based first-party cookie tracking in the field. https:\/\/api.semanticscholar.org\/CorpusID:246485578."},{"key":"e_1_3_2_1_86_1","first-page":"133","volume-title":"Proceedings of the Privacy Enhancing Technologies Symposium (PETS)","author":"Brookman Justin","year":"2017","unstructured":"Justin Brookman, Phoebe Rouge, Aaron Alva, and Christina Yeung. Cross-device tracking: Measurement and disclosures. In Proceedings of the Privacy Enhancing Technologies Symposium (PETS), pages 133--148, 2017."},{"key":"e_1_3_2_1_87_1","first-page":"220","volume-title":"Proceedings of the Privacy Enhancing Technologies Symposium (PETS)","author":"Acar Gunes","year":"2020","unstructured":"Gunes Acar, Steven Englehardt, and Arvind Narayanan. No boundaries: Data exfiltration by third parties embedded on web pages. In Proceedings of the Privacy Enhancing Technologies Symposium (PETS), pages 220--238, 2020."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645709"},{"key":"e_1_3_2_1_89_1","first-page":"89","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P)","author":"Venkatadri Giridhari","year":"2018","unstructured":"Giridhari Venkatadri, Athanasios Andreou, Yabing Liu, Alan Mislove, Krishna P. Gummadi, Patrick Loiseau, and Oana Goga. Privacy risks with Facebook's PIIbased targeting: Auditing a data broker's advertising interface. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), pages 89--107, 2018."},{"key":"e_1_3_2_1_90_1","first-page":"125","volume-title":"Proceedings of the 8th International Conference on Information Systems Engineering","author":"Rauti Sampsa","year":"2024","unstructured":"Sampsa Rauti. Lessons learned from studying third-party data leaks in web services. In Proceedings of the 8th International Conference on Information Systems Engineering, pages 125--129, 2024."},{"key":"e_1_3_2_1_91_1","volume-title":"Evading the policy: A measurement on referrer policy circumvention in 3k e-commerce websites. Master's thesis","author":"van Ouwerkerk Thomas","year":"2022","unstructured":"Thomas van Ouwerkerk. Evading the policy: A measurement on referrer policy circumvention in 3k e-commerce websites. Master's thesis, University of Amsterdam, 2022."},{"key":"e_1_3_2_1_92_1","unstructured":"Facebook is receiving sensitive medical information from hospital websites. https:\/\/themarkup.org\/pixel-hunt\/2022\/06\/16\/facebook-is-receivingsensitive- medical-information-from-hospital-websites."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00034"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580777"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12553-024-00819-w"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIN60469.2023.10475119"},{"key":"e_1_3_2_1_97_1","first-page":"958","volume-title":"Annals of Pharmacotherapy","author":"Zheutlin Alexander R.","year":"2022","unstructured":"Alexander R. Zheutlin, Joshua D. Niforatos, and Jeremy B. Sussman. Datatracking among digital pharmacies. Annals of Pharmacotherapy, pages 958--962, 2022."},{"key":"e_1_3_2_1_98_1","first-page":"508","volume-title":"Health Affairs (Millwood)","author":"Friedman Alan B.","year":"2023","unstructured":"Alan B. Friedman, Raina M. Merchant, Atheendar Maley, Khaled Farhat, Kristin Smith, Julia Felkins, Robert E. Gonzales, Lauren Bauer, and Matthew S. McCoy. Widespread third-party tracking on hospital websites poses privacy risks for patients and legal liability for hospitals. Health Affairs (Millwood), pages 508--515, 2023."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3559613.3563190"},{"key":"e_1_3_2_1_100_1","first-page":"151","volume-title":"Cryptocurrencies and Blockchain Technology: ESORICS International Workshops","author":"Samarasinghe Nayanamana","year":"2023","unstructured":"Nayanamana Samarasinghe, Pranay Kapoor, Mohammad Mannan, and Amr Youssef. No salvation from trackers: Privacy analysis of religious websites and mobile apps. In Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS International Workshops, pages 151--166, 2023."}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:22:03Z","timestamp":1766442123000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":100,"alternative-id":["10.1145\/3719027.3765113","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765113","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}