{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:17:52Z","timestamp":1766441872176,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2026,11,22]],"date-time":"2026-11-22T00:00:00Z","timestamp":1795305600000},"content-version":"vor","delay-in-days":368,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2138138"],"award-info":[{"award-number":["CNS-2138138"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765202","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:33:16Z","timestamp":1763854396000},"page":"1889-1903","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Same Script, Different Behavior: Characterizing Divergent JavaScript Execution Across Different Device Platforms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5659-2805","authenticated-orcid":false,"given":"Ahsan","family":"Zafar","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, North Carolina, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3138-9720","authenticated-orcid":false,"given":"Junhua","family":"Su","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, North Carolina, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6846-101X","authenticated-orcid":false,"given":"Sohom","family":"Datta","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, North Carolina, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8839-8521","authenticated-orcid":false,"given":"Alexandros","family":"Kapravelos","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, North Carolina, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8961-9963","authenticated-orcid":false,"given":"Anupam","family":"Das","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, North Carolina, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2025. JSPrism. https:\/\/github.com\/ahsan238\/JSPrism."},{"key":"e_1_3_2_1_2_1","unstructured":"2025. Mitmproxy. https:\/\/mitmproxy.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2025. VisibleV8 for Android. https:\/\/github.com\/wspr-ncsu\/visiblev8\/pull\/35."},{"key":"e_1_3_2_1_4_1","unstructured":"2025. Webpack. https:\/\/webpack.js.org\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0056"},{"key":"e_1_3_2_1_8_1","unstructured":"berstend. 2023. puppeteer-extra-plugin-stealth. https:\/\/www.npmjs.com\/package\/puppeteer-extra-plugin-stealth"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176246"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23152"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0012"},{"key":"e_1_3_2_1_12_1","unstructured":"FingerprintJS Contributors. 2025. FingerprintJS. https:\/\/github.com\/fingerprintjs\/fingerprintjs. Accessed: 2025-07-22."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243860"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the IEEE Workshop on Web.","author":"Eubank Christian","year":"2013","unstructured":"Christian Eubank, Marcela Melara, Diego Perez-Botero, and Arvind Narayanan. 2013. Shining the floodlights on mobile web tracking-a privacy survey. In Proceedings of the IEEE Workshop on Web."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359813"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484745"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_7"},{"key":"e_1_3_2_1_20_1","unstructured":"GitHub Inc. 2021. CodeQL. https:\/\/codeql.github.com\/. Accessed: 2025-08-03."},{"key":"e_1_3_2_1_21_1","unstructured":"Google Chrome Developers. 2025. chrome.storage API. https:\/\/developer.chrome.com\/docs\/extensions\/reference\/storage\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554909"},{"key":"e_1_3_2_1_23_1","volume-title":"Mohamed Ali Kaafar, Anirban Mahanti, and Balachander Krishnamurthy.","author":"Ikram Muhammad","year":"2017","unstructured":"Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Anirban Mahanti, and Balachander Krishnamurthy. 2017. Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning. Proceedings on Privacy Enhancing Technologies, Vol. 2017, 1 (2017), 79-99."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00017"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355599"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of The Web Conference (WWW). 80\u201391","author":"Jueckstock Jordan","year":"2021","unstructured":"Jordan Jueckstock, Shaown Sarker, Peter Snyder, Aidan Beggs, Panagiotis Papadopoulos, Matteo Varvello, Ben Livshits, and Alexandros Kapravelos. 2021. Towards Realistic and Reproducible Web Crawl Measurements. In Proceedings of The Web Conference (WWW). 80\u201391."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635904"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0027"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_1_30_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Lerner Ada","year":"2016","unstructured":"Ada Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner. 2016. Internet jones and the raiders of the lost trackers: An archaeological study of web tracking from 1996 to 2016. In 25th USENIX Security Symposium (USENIX Security 16)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858965.2814272"},{"key":"e_1_3_2_1_32_1","volume-title":"Any person... a pamphleteer'': Internet Anonymity in the Age of Web 2.0. Undergraduate Senior Thesis","author":"Mayer Jonathan R","year":"2009","unstructured":"Jonathan R Mayer. 2009. Any person... a pamphleteer'': Internet Anonymity in the Age of Web 2.0. Undergraduate Senior Thesis, Princeton University, Vol. 85 (2009)."},{"volume-title":"Third-Party Web Tracking: Policy and Technology. In 2012 IEEE Symposium on Security and Privacy. 413-427","author":"Jonathan","key":"e_1_3_2_1_33_1","unstructured":"Jonathan R. Mayer and John C. Mitchell. 2012. Third-Party Web Tracking: Policy and Technology. In 2012 IEEE Symposium on Security and Privacy. 413-427."},{"key":"e_1_3_2_1_34_1","unstructured":"Meta Platforms Inc. 2025. About Signals Gateway Pixel | Meta Business Help Center. Meta Business Help Center. https:\/\/www.facebook.com\/business\/help\/514664901027990?id=921478266803729"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354198"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of W2SP","volume":"2","author":"Mowery Keaton","year":"2011","unstructured":"Keaton Mowery, Dillon Bogenreif, Scott Yilek, and Hovav Shacham. 2011. Fingerprinting information in JavaScript implementations. Proceedings of W2SP, Vol. 2, 11 (2011)."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of W2SP","volume":"2012","author":"Mowery Keaton","year":"2012","unstructured":"Keaton Mowery and Hovav Shacham. 2012. Pixel perfect: Fingerprinting canvas in HTML5. Proceedings of W2SP, Vol. 2012 (2012)."},{"volume-title":"Web 2.0 Workshop on Security and Privacy (W2SP)","author":"Mulazzani Martin","key":"e_1_3_2_1_38_1","unstructured":"Martin Mulazzani, Philipp Reschl, Markus Huber, Manuel Leithner, Sebastian Schrittwieser, Edgar Weippl, and FC Wien. 2013. Fast and reliable browser identification with javascript engine fingerprinting. In Web 2.0 Workshop on Security and Privacy (W2SP), Vol. 5. Citeseer, 4."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29883-2_18"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Pantelaios Nikolaos","year":"2024","unstructured":"Nikolaos Pantelaios and Alexandros Kapravelos. 2024. FV8: A Forced Execution JavaScript Engine for Detecting Evasive Techniques. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889227"},{"key":"e_1_3_2_1_43_1","unstructured":"Puppeteer Contributors. 2025. Puppeteer. https:\/\/pptr.dev"},{"key":"e_1_3_2_1_44_1","volume-title":"Detecting and Defending Against Third-Party Tracking on the Web. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 155-168","author":"Roesner Franziska","year":"2012","unstructured":"Franziska Roesner, Tadayoshi Kohno, and David Wetherall. 2012. Detecting and Defending Against Third-Party Tracking on the Web. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 155-168."},{"key":"e_1_3_2_1_45_1","first-page":"679","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Sanchez-Rola Iskander","year":"2017","unstructured":"Iskander Sanchez-Rola, Igor Santos, and Davide Balzarotti. 2017. Extension breakdown: Security analysis of browsers extension resources control policies. In 26th USENIX Security Symposium (USENIX Security 17). 679-694."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243796"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423616"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23155"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029820"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987466"},{"key":"e_1_3_2_1_51_1","volume-title":"Static Analysis for Asynchronous JavaScript Programs. In 33rd European Conference on Object-Oriented Programming (ECOOP","volume":"134","author":"Sotiropoulos Thodoris","year":"2019","unstructured":"Thodoris Sotiropoulos and Benjamin Livshits. 2019. Static Analysis for Asynchronous JavaScript Programs. In 33rd European Conference on Object-Oriented Programming (ECOOP 2019), Vol. 134. 8:1-8:29."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.18"},{"key":"e_1_3_2_1_53_1","unstructured":"StatCounter. 2025. Browser Market Share Worldwide. https:\/\/gs.statcounter.com\/browser-market-share."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583333"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2015.105"},{"key":"e_1_3_2_1_56_1","unstructured":"tft. 2012. PlayReady DRM. Google Groups ''android-platform''. https:\/\/groups.google.com\/g\/android-platform\/c\/OX2a3Z2jtf8 Accessed: 2025-08-02."},{"key":"e_1_3_2_1_57_1","unstructured":"Tranco. 2025. https:\/\/tranco-list.eu\/list\/PN5QJ. Accessed: 2025-07-22."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0016"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765202","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:16:24Z","timestamp":1766441784000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":58,"alternative-id":["10.1145\/3719027.3765202","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765202","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}