Filters








419 Hits in 5.1 sec

Header Enrichment or ISP Enrichment?

Narseo Vallina-Rodriguez, Srikanth Sundaresan, Christian Kreibich, Vern Paxson
2015 Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization - HotMiddlebox '15  
In this paper, we use data collected by the Netalyzr network troubleshooting service over 16 months to identify and characterize HTTP header enrichment in modern mobile networks.  ...  related to advertising programs, and (3) headers associated with network operations.  ...  Acknowledgments As always, we are deeply grateful to our Netalyzr users for using our tool and enabling this study.  ... 
doi:10.1145/2785989.2786002 dblp:conf/sigcomm/Vallina-Rodriguez15 fatcat:cotepql5crbpxeehwrachorm6m

Online Tracking: When Does it Become Stalking?

Bede Ravindra Amarasekara, Anuradha Mathrani, Chris Scogings
2021 Vietnam Journal of Computer Science  
Our previous research studies have shown that HTTP cookie-based tracking process, though reliable, can fail due to technical reasons, as well as through fraudulent manipulation by traffic generators.  ...  Online user activities are tracked for many purposes. In e-commerce, cross-domain tracking is used to quantify and pay for web-traffic generation.  ...  3 managed by the browser and has been used to re-spawn deleted HTTP cookies. 6, 9, 10 As per literature, blocking of HTTP-cookies on the browser, deleting of cookies, browser cache or browsing history  ... 
doi:10.1142/s2196888821500226 fatcat:7p2r74xzebebbinqtf57mncv4y

Cross-Device Tracking: Measurement and Disclosures

Justin Brookman, Phoebe Rouge, Aaron Alva, Christina Yeung
2017 Proceedings on Privacy Enhancing Technologies  
Internet advertising and analytics technology companies are increasingly trying to find ways to link behavior across the various devices consumers own.  ...  Our paper demonstrates how data that is routinely collected and shared online could be used by online third parties to track consumers across devices.  ...  If accessed through a web browser, the service can place a cookie on the device to remember the user in the future.  ... 
doi:10.1515/popets-2017-0020 dblp:journals/popets/BrookmanRAY17 fatcat:bww5ascwpbafjlubgzefvacis4

To Extend or not to Extend: on the Uniqueness of Browser Extensions and Web Logins [article]

Gabor Gyorgy Gulyas, Doliere Francis Some, Nataliia Bielova, Claude Castelluccia
2018 arXiv   pre-print
Recent works showed that websites can detect browser extensions that users install and websites they are logged into.  ...  Because privacy extensions contribute to the uniqueness of users, we study the trade-off between the amount of trackers blocked by such extensions and how unique the users of these extensions are.  ...  We are grateful for Alexander Sjösten, Steven Van Acker, Andrei Sabelfeld, who shared their code and signature database for Chrome browser extension detection [56] , and also for Robin Linus, who allowed  ... 
arXiv:1808.07359v1 fatcat:nt3kylwe75fj5owmviquhhooxu

To Track or 'Do Not Track': Advancing Transparency and Individual Control in Online Behavioral Advertising

Omer Tene, Jules Polonetsky
2011 Social Science Research Network  
lawsuits were largely unsuccessful, 37 browser makers were incentivized to continue to improve privacy controls that gave users an increased ability to limit and delete cookies. 38 Browsers now provide  ...  Cookies: Frequently Asked Questions, WINDOWS, http://windows.micro soft.com/en-us/Windows7/Cookies-frequently-asked-questions (last visited Nov. 1, 2011) ("[C]ookies can enrich your experience by allowing  ...  of the type and amount used by their platforms.  ... 
doi:10.2139/ssrn.1920505 fatcat:fifrwdkqbzhxtfm3ykupwecjkm

4 Years of EU Cookie Law: Results and Lessons Learned

Martino Trevisan, Stefano Traverso, Eleonora Bassi, Marco Mellia
2019 Proceedings on Privacy Enhancing Technologies  
Personalized advertisement has changed the web. It lets websites monetize the content they offer.  ...  It aimed, among other things, to make online tracking mechanisms explicit to increase privacy awareness among users.  ...  Acknowledgments The research leading to these results has been funded by the Vienna Science and Technology Fund (WWTF) through project ICT15-129 (BigDAMA) and the Smart-Data@PoliTO center for Big Data  ... 
doi:10.2478/popets-2019-0023 dblp:journals/popets/TrevisanTBM19 fatcat:nfmeigfjynamtao7mcta6trtkm

Privacy in Targeted Advertising: A Survey [article]

Imdad Ullah, Roksana Boreli, Salil S. Kanhere
2021 arXiv   pre-print
Targeted advertising has transformed the marketing landscape for a wide variety of businesses, by creating new opportunities for advertisers to reach prospective customers by delivering personalised ads  ...  We discuss challenges in preserving user privacy that include threats related to private information extraction and exchange among various advertising entities, privacy threats from third-party tracking  ...  Browser add-on [189] Cookie management User preference Standalone [190] Anonymising proxy Differential privacy DNT [191] 28 Delay Tolerant Network HTTP header Browser side MobiAd [39] Encryption  ... 
arXiv:2009.06861v3 fatcat:exocmcbupbhq5nc3gnicg3zg2i

Your Interests According to Google - A Profile-Centered Analysis for Obfuscation of Online Tracking Profiles [article]

Martin Degeling, Thomas Herrmann
2016 arXiv   pre-print
Profiling users for the purpose of targeted advertisements or other kinds of personalization is very popular on the internet.  ...  But besides the benefits of individually tailored news feeds and shopping recommendation research has shown that many users consider this practice as privacy infringement.  ...  attributes of the users.  ... 
arXiv:1601.06371v1 fatcat:nypgmb425jfwtdstgch2myynmy

Browser Fingerprinting: A survey [article]

Pierre Laperdrix and Nataliia Bielova and Benoit Baudry and Gildas Avoine
2019 arXiv   pre-print
With this paper, we survey the research performed in the domain of browser fingerprinting, while providing an accessible entry point to newcomers in the field.  ...  The goal is to improve users' privacy by preventing unwanted tracking.  ...  a known vulnerability. • Positive or constructive use Users can be warned if their device is out of date by recommending specific updates.  ... 
arXiv:1905.01051v2 fatcat:garoieeijnc7hjd46sp3wgwrgu

What do they know about me? Contents and Concerns of Online Behavioral Profiles [article]

Ashwini Rao, Florian Schaub, Norman Sadeh
2015 arXiv   pre-print
Behavioral profiles benefit users by improving products and services.  ...  To improve transparency, some companies are allowing users to access their behavioral profiles. In this work, we investigated behavioral profiles of users by utilizing these access mechanisms.  ...  Acknowledgement This work was in part supported by the National Science Foundation under grant CNS13-30596 and in part by grants from Google and Samsung.  ... 
arXiv:1506.01675v1 fatcat:fzvqxjkn4fhgjkxsz6vtea4czq

Integrating E-Commerce and Data Mining: Architecture and Challenges [article]

Suhail Ansari, Ron Kohavi, Llew Mason, Zijian Zheng
2000 arXiv   pre-print
We wish to thank our clients for sharing their data with us and helping us refine our architecture and improve Blue Martini's products.  ...  duration. • Sessions include attributes such as browser used, initiation time, referring site, and cookie information.  ...  , local time of the user, speed of the user's connection and if the user had turned their cookies off.  ... 
arXiv:cs/0007026v1 fatcat:zy77uebllnf5rirkspfhlknf54

Google and Personal Data Protection [chapter]

Bart van der Sloot, Frederik Zuiderveen Borgesius
2012 Information Technology and Law Series  
This chapter discusses the interplay between the European personal data protection regime and two specific Google services, Interest Based Advertising and Google Street View.  ...  : "We use cookies to improve (…) ad selection, and tracking user trends, such as how people search.  ...  associating the relevant query words in the referral URL with the existing advertising cookie on the user's browser."  ... 
doi:10.1007/978-90-6704-846-0_4 fatcat:iig2owkkszbgvm5yu7xejlgkfe

Evolution of cross site request forgery attacks

Renaud Feil, Louis Nyffenegger
2007 Journal in Computer Virology  
Lastly, best solutions to prevent these attacks are discussed to enable everyone (users, browser or Web applications developers, professionals in charge of IT security in an organization or a company)  ...  This paper presents a state of the art of cross-site request forgery (CSRF) attacks and new techniques which can be used by potential intruders to make them more effective.  ...  This is also used to enrich web pages with contents gathered on third-party web sites (advertisements, images, …).  ... 
doi:10.1007/s11416-007-0068-7 fatcat:fhy4sffv3ba7rbr72fdclv33ge

Shopping for privacy: Purchase details leaked to PayPal

Sören Preibusch, Thomas Peetz, Gunes Acar, Bettina Berendt
2016 Electronic Commerce Research and Applications  
We provide recommendations for merchants.  ...  We record and analyse leakage patterns for the 881 most popular US Web shops sampled from actual Web users' online purchase sessions.  ...  Furthermore, by sending high-entropy browser properties such as plugins and screen dimensions, PayPal makes it possible for Omniture to track users by their browser fingerprints even if they block or delete  ... 
doi:10.1016/j.elerap.2015.11.004 fatcat:wmakmoosbfa7no2mnlg6swo6wy

Towards Improving the Usability and Security of Web Single Sign-On Systems

San-Tsai Sun
2013 Zenodo  
Informed by our findings, we offered a web SSO technology acceptance model, and suggested design improvements.  ...  By analyzing browser-relayed messages during SSO, our study uncovered several vulnerabilities that allow an attacker to gain unauthorized access to the victim user's profile and social graph on IdPs, and  ...  To improve users' perceptions of privacy and control, our IDeB design (1) sets the email address as the only required attribute; the rest of profile attributes are not shared by default, (2) allows users  ... 
doi:10.5281/zenodo.3264671 fatcat:iorqjr7rmnevfp2opa7uvv3qpq
« Previous Showing results 1 — 15 out of 419 results