Serveur d'exploration sur l'opéra

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Web Browser History Detection as a Real-World Privacy Threat

Identifieur interne : 000A84 ( Istex/Corpus ); précédent : 000A83; suivant : 000A85

Web Browser History Detection as a Real-World Privacy Threat

Auteurs : Artur Janc ; Lukasz Olejnik

Source :

RBID : ISTEX:EDA9194CE75A28023E174B335B08764D50A6FCCB

Abstract

Abstract: Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with browser performance improvements, the long-standing issue has now become a significant threat to the privacy of Internet users. In this paper we analyze the impact of CSS-based history detection and demonstrate the feasibility of conducting practical attacks with minimal resources. We analyze Web browser behavior and detectability of content loaded via standard protocols and with various HTTP response codes. We develop an algorithm for efficient examination of large link sets and evaluate its performance in modern browsers. Compared to existing methods our approach is up to 6 times faster, and is able to detect up to 30,000 visited links per second. We present a novel Web application capable of effectively detecting clients’ browsing histories and discuss real-world results obtained from 271,576 Internet users. Our results indicate that at least 76% of Internet users are vulnerable to history detection, including over 94% of Google Chrome users; for a test of most popular Internet websites we were able to detect, on average, 62.6 (median 22) visited locations per client. We also demonstrate the potential to profile users based on social news stories they visited, and to detect private data such as zipcodes or search queries typed into online forms.

Url:
DOI: 10.1007/978-3-642-15497-3_14

Links to Exploration step

ISTEX:EDA9194CE75A28023E174B335B08764D50A6FCCB

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Web Browser History Detection as a Real-World Privacy Threat</title>
<author>
<name sortKey="Janc, Artur" sort="Janc, Artur" uniqKey="Janc A" first="Artur" last="Janc">Artur Janc</name>
<affiliation>
<mods:affiliation>E-mail: artur@lingro.com</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Olejnik, Lukasz" sort="Olejnik, Lukasz" uniqKey="Olejnik L" first="Lukasz" last="Olejnik">Lukasz Olejnik</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:EDA9194CE75A28023E174B335B08764D50A6FCCB</idno>
<date when="2010" year="2010">2010</date>
<idno type="doi">10.1007/978-3-642-15497-3_14</idno>
<idno type="url">https://api.istex.fr/document/EDA9194CE75A28023E174B335B08764D50A6FCCB/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000A84</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Web Browser History Detection as a Real-World Privacy Threat</title>
<author>
<name sortKey="Janc, Artur" sort="Janc, Artur" uniqKey="Janc A" first="Artur" last="Janc">Artur Janc</name>
<affiliation>
<mods:affiliation>E-mail: artur@lingro.com</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Olejnik, Lukasz" sort="Olejnik, Lukasz" uniqKey="Olejnik L" first="Lukasz" last="Olejnik">Lukasz Olejnik</name>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2010</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">EDA9194CE75A28023E174B335B08764D50A6FCCB</idno>
<idno type="DOI">10.1007/978-3-642-15497-3_14</idno>
<idno type="ChapterID">Chap14</idno>
<idno type="ChapterID">14</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with browser performance improvements, the long-standing issue has now become a significant threat to the privacy of Internet users. In this paper we analyze the impact of CSS-based history detection and demonstrate the feasibility of conducting practical attacks with minimal resources. We analyze Web browser behavior and detectability of content loaded via standard protocols and with various HTTP response codes. We develop an algorithm for efficient examination of large link sets and evaluate its performance in modern browsers. Compared to existing methods our approach is up to 6 times faster, and is able to detect up to 30,000 visited links per second. We present a novel Web application capable of effectively detecting clients’ browsing histories and discuss real-world results obtained from 271,576 Internet users. Our results indicate that at least 76% of Internet users are vulnerable to history detection, including over 94% of Google Chrome users; for a test of most popular Internet websites we were able to detect, on average, 62.6 (median 22) visited locations per client. We also demonstrate the potential to profile users based on social news stories they visited, and to detect private data such as zipcodes or search queries typed into online forms.</div>
</front>
</TEI>
<istex>
<corpusName>springer</corpusName>
<author>
<json:item>
<name>Artur Janc</name>
<affiliations>
<json:string>E-mail: artur@lingro.com</json:string>
</affiliations>
</json:item>
<json:item>
<name>Lukasz Olejnik</name>
</json:item>
</author>
<language>
<json:string>eng</json:string>
</language>
<abstract>Abstract: Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with browser performance improvements, the long-standing issue has now become a significant threat to the privacy of Internet users. In this paper we analyze the impact of CSS-based history detection and demonstrate the feasibility of conducting practical attacks with minimal resources. We analyze Web browser behavior and detectability of content loaded via standard protocols and with various HTTP response codes. We develop an algorithm for efficient examination of large link sets and evaluate its performance in modern browsers. Compared to existing methods our approach is up to 6 times faster, and is able to detect up to 30,000 visited links per second. We present a novel Web application capable of effectively detecting clients’ browsing histories and discuss real-world results obtained from 271,576 Internet users. Our results indicate that at least 76% of Internet users are vulnerable to history detection, including over 94% of Google Chrome users; for a test of most popular Internet websites we were able to detect, on average, 62.6 (median 22) visited locations per client. We also demonstrate the potential to profile users based on social news stories they visited, and to detect private data such as zipcodes or search queries typed into online forms.</abstract>
<qualityIndicators>
<score>9.224</score>
<pdfVersion>1.6</pdfVersion>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<keywordCount>0</keywordCount>
<abstractCharCount>1456</abstractCharCount>
<pdfWordCount>6390</pdfWordCount>
<pdfCharCount>37197</pdfCharCount>
<pdfPageCount>17</pdfPageCount>
<abstractWordCount>227</abstractWordCount>
</qualityIndicators>
<title>Web Browser History Detection as a Real-World Privacy Threat</title>
<chapterId>
<json:string>Chap14</json:string>
<json:string>14</json:string>
</chapterId>
<genre>
<json:string>conference [research-article]</json:string>
</genre>
<serie>
<editor>
<json:item>
<name>David Hutchison</name>
<affiliations>
<json:string>Lancaster University, Lancaster, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Takeo Kanade</name>
<affiliations>
<json:string>Carnegie Mellon University, Pittsburgh, PA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Josef Kittler</name>
<affiliations>
<json:string>University of Surrey, Guildford, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
<affiliations>
<json:string>Cornell University, Ithaca, NY, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
<affiliations>
<json:string>ETH Zurich, Zurich, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>John C. Mitchell</name>
<affiliations>
<json:string>Stanford University, Stanford, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moni Naor</name>
<affiliations>
<json:string>Weizmann Institute of Science, Rehovot, Israel</json:string>
</affiliations>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
<affiliations>
<json:string>University of Bern, Bern, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
<affiliations>
<json:string>Indian Institute of Technology, Madras, India</json:string>
</affiliations>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
<affiliations>
<json:string>University of Dortmund, Dortmund, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>Madhu Sudan</name>
<affiliations>
<json:string>Massachusetts Institute of Technology, MA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
<affiliations>
<json:string>University of California, Los Angeles, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Doug Tygar</name>
<affiliations>
<json:string>University of California, Berkeley, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
<affiliations>
<json:string>Rice University, Houston, TX, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
<affiliations>
<json:string>Max-Planck Institute of Computer Science, Saarbrücken, Germany</json:string>
</affiliations>
</json:item>
</editor>
<issn>
<json:string>0302-9743</json:string>
</issn>
<genre></genre>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Lecture Notes in Computer Science</title>
<copyrightDate>2010</copyrightDate>
</serie>
<host>
<editor>
<json:item>
<name>Dimitris Gritzalis</name>
<affiliations>
<json:string>Information Security and Critical Infrastructure Protection Research Group, Dept. of Informatics, Athens University of Economics and Business, 76 Patission Ave., GR-10434, Athens, Greece</json:string>
<json:string>E-mail: dgrit@aueb.gr</json:string>
</affiliations>
</json:item>
<json:item>
<name>Bart Preneel</name>
<affiliations>
<json:string>Dept. Electrical Engineering-ESAT/COSIC, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, Bus 2446, 3001, Leuven, Belgium</json:string>
<json:string>E-mail: bart.preneel@esat.kuleuven.be</json:string>
</affiliations>
</json:item>
<json:item>
<name>Marianthi Theoharidou</name>
<affiliations>
<json:string>Information Security and Critical Infrastructure Protection Research Group, Dept. of Informatics, Athens University of Economics and Business, 76 Patission Ave., GR-10434, Athens, Greece</json:string>
<json:string>E-mail: mtheohar@aueb.gr</json:string>
</affiliations>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Communication Networks</value>
</json:item>
<json:item>
<value>Management of Computing and Information Systems</value>
</json:item>
<json:item>
<value>Data Encryption</value>
</json:item>
<json:item>
<value>Algorithm Analysis and Problem Complexity</value>
</json:item>
<json:item>
<value>Computers and Society</value>
</json:item>
<json:item>
<value>Information Systems Applications (incl.Internet)</value>
</json:item>
</subject>
<isbn>
<json:string>978-3-642-15496-6</json:string>
</isbn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Computer Security – ESORICS 2010</title>
<bookId>
<json:string>978-3-642-15497-3</json:string>
</bookId>
<volume>6345</volume>
<pages>
<last>231</last>
<first>215</first>
</pages>
<issn>
<json:string>0302-9743</json:string>
</issn>
<genre>
<json:string>Book Series</json:string>
</genre>
<eisbn>
<json:string>978-3-642-15497-3</json:string>
</eisbn>
<copyrightDate>2010</copyrightDate>
<doi>
<json:string>10.1007/978-3-642-15497-3</json:string>
</doi>
</host>
<publicationDate>2010</publicationDate>
<copyrightDate>2010</copyrightDate>
<doi>
<json:string>10.1007/978-3-642-15497-3_14</json:string>
</doi>
<id>EDA9194CE75A28023E174B335B08764D50A6FCCB</id>
<fulltext>
<json:item>
<original>true</original>
<mimetype>application/pdf</mimetype>
<extension>pdf</extension>
<uri>https://api.istex.fr/document/EDA9194CE75A28023E174B335B08764D50A6FCCB/fulltext/pdf</uri>
</json:item>
<json:item>
<original>false</original>
<mimetype>application/zip</mimetype>
<extension>zip</extension>
<uri>https://api.istex.fr/document/EDA9194CE75A28023E174B335B08764D50A6FCCB/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/EDA9194CE75A28023E174B335B08764D50A6FCCB/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Web Browser History Detection as a Real-World Privacy Threat</title>
<respStmt xml:id="ISTEX-API" resp="Références bibliographiques récupérées via GROBID" name="ISTEX-API (INIST-CNRS)"></respStmt>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability>
<p>SPRINGER</p>
</availability>
<date>2010</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Web Browser History Detection as a Real-World Privacy Threat</title>
<author>
<persName>
<forename type="first">Artur</forename>
<surname>Janc</surname>
</persName>
<email>artur@lingro.com</email>
</author>
<author>
<persName>
<forename type="first">Lukasz</forename>
<surname>Olejnik</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Computer Security – ESORICS 2010</title>
<title level="m" type="sub">15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings</title>
<idno type="pISBN">978-3-642-15496-6</idno>
<idno type="eISBN">978-3-642-15497-3</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="DOI">10.1007/978-3-642-15497-3</idno>
<idno type="BookID">978-3-642-15497-3</idno>
<idno type="BookTitleID">213383</idno>
<idno type="BookSequenceNumber">6345</idno>
<idno type="BookVolumeNumber">6345</idno>
<idno type="BookChapterCount">42</idno>
<editor>
<persName>
<forename type="first">Dimitris</forename>
<surname>Gritzalis</surname>
</persName>
<email>dgrit@aueb.gr</email>
<affiliation>Information Security and Critical Infrastructure Protection Research Group, Dept. of Informatics, Athens University of Economics and Business, 76 Patission Ave., GR-10434, Athens, Greece</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Bart</forename>
<surname>Preneel</surname>
</persName>
<email>bart.preneel@esat.kuleuven.be</email>
<affiliation>Dept. Electrical Engineering-ESAT/COSIC, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, Bus 2446, 3001, Leuven, Belgium</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Marianthi</forename>
<surname>Theoharidou</surname>
</persName>
<email>mtheohar@aueb.gr</email>
<affiliation>Information Security and Critical Infrastructure Protection Research Group, Dept. of Informatics, Athens University of Economics and Business, 76 Patission Ave., GR-10434, Athens, Greece</affiliation>
</editor>
<imprint>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="2010"></date>
<biblScope unit="volume">6345</biblScope>
<biblScope unit="page" from="215">215</biblScope>
<biblScope unit="page" to="231">231</biblScope>
</imprint>
</monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
<affiliation>Lancaster University, Lancaster, UK</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
<affiliation>University of Surrey, Guildford, UK</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
<affiliation>ETH Zurich, Zurich, Switzerland</affiliation>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
<affiliation>Stanford University, Stanford, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
<affiliation>University of Bern, Bern, Switzerland</affiliation>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
<affiliation>University of Dortmund, Dortmund, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
<affiliation>University of California, Los Angeles, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
<affiliation>Rice University, Houston, TX, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
<affiliation>Max-Planck Institute of Computer Science, Saarbrücken, Germany</affiliation>
</editor>
<biblScope>
<date>2010</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesId">558</idno>
</series>
<idno type="istex">EDA9194CE75A28023E174B335B08764D50A6FCCB</idno>
<idno type="DOI">10.1007/978-3-642-15497-3_14</idno>
<idno type="ChapterID">Chap14</idno>
<idno type="ChapterID">14</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2010</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Abstract: Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with browser performance improvements, the long-standing issue has now become a significant threat to the privacy of Internet users. In this paper we analyze the impact of CSS-based history detection and demonstrate the feasibility of conducting practical attacks with minimal resources. We analyze Web browser behavior and detectability of content loaded via standard protocols and with various HTTP response codes. We develop an algorithm for efficient examination of large link sets and evaluate its performance in modern browsers. Compared to existing methods our approach is up to 6 times faster, and is able to detect up to 30,000 visited links per second. We present a novel Web application capable of effectively detecting clients’ browsing histories and discuss real-world results obtained from 271,576 Internet users. Our results indicate that at least 76% of Internet users are vulnerable to history detection, including over 94% of Google Chrome users; for a test of most popular Internet websites we were able to detect, on average, 62.6 (median 22) visited locations per client. We also demonstrate the potential to profile users based on social news stories they visited, and to detect private data such as zipcodes or search queries typed into online forms.</p>
</abstract>
<textClass>
<keywords scheme="Book Subject Collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Book Subject Group">
<list>
<label>I</label>
<label>I13022</label>
<label>I24067</label>
<label>I15033</label>
<label>I16021</label>
<label>I24040</label>
<label>I18040</label>
<item>
<term>Computer Science</term>
</item>
<item>
<term>Computer Communication Networks</term>
</item>
<item>
<term>Management of Computing and Information Systems</term>
</item>
<item>
<term>Data Encryption</term>
</item>
<item>
<term>Algorithm Analysis and Problem Complexity</term>
</item>
<item>
<term>Computers and Society</term>
</item>
<item>
<term>Information Systems Applications (incl.Internet)</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2010">Published</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2016-3-2">References added</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<original>false</original>
<mimetype>text/plain</mimetype>
<extension>txt</extension>
<uri>https://api.istex.fr/document/EDA9194CE75A28023E174B335B08764D50A6FCCB/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff1">
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff2">
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff3">
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff4">
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff5">
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff6">
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff7">
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff8">
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff9">
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff10">
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff11">
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff12">
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff13">
<EditorName DisplayOrder="Western">
<GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff14">
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff15">
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
<Affiliation ID="Aff1">
<OrgName>Lancaster University</OrgName>
<OrgAddress>
<City>Lancaster</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>Carnegie Mellon University</OrgName>
<OrgAddress>
<City>Pittsburgh</City>
<State>PA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3">
<OrgName>University of Surrey</OrgName>
<OrgAddress>
<City>Guildford</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff4">
<OrgName>Cornell University</OrgName>
<OrgAddress>
<City>Ithaca</City>
<State>NY</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff5">
<OrgName>ETH Zurich</OrgName>
<OrgAddress>
<City>Zurich</City>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff6">
<OrgName>Stanford University</OrgName>
<OrgAddress>
<City>Stanford</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff7">
<OrgName>Weizmann Institute of Science</OrgName>
<OrgAddress>
<City>Rehovot</City>
<Country>Israel</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff8">
<OrgName>University of Bern</OrgName>
<OrgAddress>
<City>Bern</City>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff9">
<OrgName>Indian Institute of Technology</OrgName>
<OrgAddress>
<City>Madras</City>
<Country>India</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff10">
<OrgName>University of Dortmund</OrgName>
<OrgAddress>
<City>Dortmund</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff11">
<OrgName>Massachusetts Institute of Technology</OrgName>
<OrgAddress>
<State>MA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff12">
<OrgName>University of California</OrgName>
<OrgAddress>
<City>Los Angeles</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff13">
<OrgName>University of California</OrgName>
<OrgAddress>
<City>Berkeley</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff14">
<OrgName>Rice University</OrgName>
<OrgAddress>
<City>Houston</City>
<State>TX</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff15">
<OrgName>Max-Planck Institute of Computer Science</OrgName>
<OrgAddress>
<City>Saarbrücken</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingDepth="2" NumberingStyle="ContentOnly" OutputMedium="All" TocLevels="0">
<BookID>978-3-642-15497-3</BookID>
<BookTitle>Computer Security – ESORICS 2010</BookTitle>
<BookSubTitle>15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings</BookSubTitle>
<BookVolumeNumber>6345</BookVolumeNumber>
<BookSequenceNumber>6345</BookSequenceNumber>
<BookDOI>10.1007/978-3-642-15497-3</BookDOI>
<BookTitleID>213383</BookTitleID>
<BookPrintISBN>978-3-642-15496-6</BookPrintISBN>
<BookElectronicISBN>978-3-642-15497-3</BookElectronicISBN>
<BookChapterCount>42</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2010</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I13022" Priority="1" Type="Secondary">Computer Communication Networks</BookSubject>
<BookSubject Code="I24067" Priority="2" Type="Secondary">Management of Computing and Information Systems</BookSubject>
<BookSubject Code="I15033" Priority="3" Type="Secondary">Data Encryption</BookSubject>
<BookSubject Code="I16021" Priority="4" Type="Secondary">Algorithm Analysis and Problem Complexity</BookSubject>
<BookSubject Code="I24040" Priority="5" Type="Secondary">Computers and Society</BookSubject>
<BookSubject Code="I18040" Priority="6" Type="Secondary">Information Systems Applications (incl.Internet)</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
<BookContext>
<SeriesID>558</SeriesID>
</BookContext>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff16">
<EditorName DisplayOrder="Western">
<GivenName>Dimitris</GivenName>
<FamilyName>Gritzalis</FamilyName>
</EditorName>
<Contact>
<Email>dgrit@aueb.gr</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff17">
<EditorName DisplayOrder="Western">
<GivenName>Bart</GivenName>
<FamilyName>Preneel</FamilyName>
</EditorName>
<Contact>
<Email>bart.preneel@esat.kuleuven.be</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff16">
<EditorName DisplayOrder="Western">
<GivenName>Marianthi</GivenName>
<FamilyName>Theoharidou</FamilyName>
</EditorName>
<Contact>
<Email>mtheohar@aueb.gr</Email>
</Contact>
</Editor>
<Affiliation ID="Aff16">
<OrgDivision>Information Security and Critical Infrastructure Protection Research Group, Dept. of Informatics</OrgDivision>
<OrgName>Athens University of Economics and Business</OrgName>
<OrgAddress>
<Street>76 Patission Ave.</Street>
<Postcode>GR-10434</Postcode>
<City>Athens</City>
<Country>Greece</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff17">
<OrgDivision>Dept. Electrical Engineering-ESAT/COSIC</OrgDivision>
<OrgName>Katholieke Universiteit Leuven</OrgName>
<OrgAddress>
<Street>Kasteelpark Arenberg 10, Bus 2446</Street>
<Postcode>3001</Postcode>
<City>Leuven</City>
<Country>Belgium</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</BookHeader>
<Part ID="Part4">
<PartInfo TocLevels="0">
<PartID>4</PartID>
<PartSequenceNumber>4</PartSequenceNumber>
<PartTitle>Traffic Analysis</PartTitle>
<PartChapterCount>4</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookTitle>Computer Security – ESORICS 2010</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap14" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingDepth="2" NumberingStyle="ContentOnly" TocLevels="0">
<ChapterID>14</ChapterID>
<ChapterDOI>10.1007/978-3-642-15497-3_14</ChapterDOI>
<ChapterSequenceNumber>14</ChapterSequenceNumber>
<ChapterTitle Language="En">Web Browser History Detection as a Real-World Privacy Threat</ChapterTitle>
<ChapterFirstPage>215</ChapterFirstPage>
<ChapterLastPage>231</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2010</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>4</PartID>
<BookID>978-3-642-15497-3</BookID>
<BookTitle>Computer Security – ESORICS 2010</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author>
<AuthorName DisplayOrder="Western">
<GivenName>Artur</GivenName>
<FamilyName>Janc</FamilyName>
</AuthorName>
<Contact>
<Email>artur@lingro.com</Email>
</Contact>
</Author>
<Author>
<AuthorName DisplayOrder="Western">
<GivenName>Lukasz</GivenName>
<FamilyName>Olejnik</FamilyName>
</AuthorName>
</Author>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>Web browser history detection using CSS
<Emphasis Type="Italic">visited</Emphasis>
styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with browser performance improvements, the long-standing issue has now become a significant threat to the privacy of Internet users.</Para>
<Para>In this paper we analyze the impact of CSS-based history detection and demonstrate the feasibility of conducting practical attacks with minimal resources. We analyze Web browser behavior and detectability of content loaded via standard protocols and with various HTTP response codes. We develop an algorithm for efficient examination of large link sets and evaluate its performance in modern browsers. Compared to existing methods our approach is up to 6 times faster, and is able to detect up to 30,000 visited links per second.</Para>
<Para>We present a novel Web application capable of effectively detecting clients’ browsing histories and discuss real-world results obtained from 271,576 Internet users. Our results indicate that at least 76% of Internet users are vulnerable to history detection, including over 94% of Google Chrome users; for a test of most popular Internet websites we were able to detect, on average, 62.6 (median 22) visited locations per client. We also demonstrate the potential to profile users based on social news stories they visited, and to detect private data such as zipcodes or search queries typed into online forms.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Web Browser History Detection as a Real-World Privacy Threat</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Web Browser History Detection as a Real-World Privacy Threat</title>
</titleInfo>
<name type="personal">
<namePart type="given">Artur</namePart>
<namePart type="family">Janc</namePart>
<affiliation>E-mail: artur@lingro.com</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Lukasz</namePart>
<namePart type="family">Olejnik</namePart>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="conference [research-article]" displayLabel="OriginalPaper"></genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2010</dateIssued>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Abstract: Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with browser performance improvements, the long-standing issue has now become a significant threat to the privacy of Internet users. In this paper we analyze the impact of CSS-based history detection and demonstrate the feasibility of conducting practical attacks with minimal resources. We analyze Web browser behavior and detectability of content loaded via standard protocols and with various HTTP response codes. We develop an algorithm for efficient examination of large link sets and evaluate its performance in modern browsers. Compared to existing methods our approach is up to 6 times faster, and is able to detect up to 30,000 visited links per second. We present a novel Web application capable of effectively detecting clients’ browsing histories and discuss real-world results obtained from 271,576 Internet users. Our results indicate that at least 76% of Internet users are vulnerable to history detection, including over 94% of Google Chrome users; for a test of most popular Internet websites we were able to detect, on average, 62.6 (median 22) visited locations per client. We also demonstrate the potential to profile users based on social news stories they visited, and to detect private data such as zipcodes or search queries typed into online forms.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Computer Security – ESORICS 2010</title>
<subTitle>15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Dimitris</namePart>
<namePart type="family">Gritzalis</namePart>
<affiliation>Information Security and Critical Infrastructure Protection Research Group, Dept. of Informatics, Athens University of Economics and Business, 76 Patission Ave., GR-10434, Athens, Greece</affiliation>
<affiliation>E-mail: dgrit@aueb.gr</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bart</namePart>
<namePart type="family">Preneel</namePart>
<affiliation>Dept. Electrical Engineering-ESAT/COSIC, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, Bus 2446, 3001, Leuven, Belgium</affiliation>
<affiliation>E-mail: bart.preneel@esat.kuleuven.be</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Marianthi</namePart>
<namePart type="family">Theoharidou</namePart>
<affiliation>Information Security and Critical Infrastructure Protection Research Group, Dept. of Informatics, Athens University of Economics and Business, 76 Patission Ave., GR-10434, Athens, Greece</affiliation>
<affiliation>E-mail: mtheohar@aueb.gr</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="Book Series" displayLabel="Proceedings"></genre>
<originInfo>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book Subject Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book Subject Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13022">Computer Communication Networks</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24067">Management of Computing and Information Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I15033">Data Encryption</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I16021">Algorithm Analysis and Problem Complexity</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24040">Computers and Society</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18040">Information Systems Applications (incl.Internet)</topic>
</subject>
<identifier type="DOI">10.1007/978-3-642-15497-3</identifier>
<identifier type="ISBN">978-3-642-15496-6</identifier>
<identifier type="eISBN">978-3-642-15497-3</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">213383</identifier>
<identifier type="BookID">978-3-642-15497-3</identifier>
<identifier type="BookChapterCount">42</identifier>
<identifier type="BookVolumeNumber">6345</identifier>
<identifier type="BookSequenceNumber">6345</identifier>
<identifier type="PartChapterCount">4</identifier>
<part>
<date>2010</date>
<detail type="part">
<title>Traffic Analysis</title>
</detail>
<detail type="volume">
<number>6345</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>215</start>
<end>231</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2010</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<affiliation>Lancaster University, Lancaster, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<affiliation>University of Surrey, Guildford, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<affiliation>ETH Zurich, Zurich, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<affiliation>Stanford University, Stanford, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<affiliation>University of Bern, Bern, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<affiliation>University of Dortmund, Dortmund, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<affiliation>University of California, Los Angeles, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<affiliation>Rice University, Houston, TX, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<affiliation>Max-Planck Institute of Computer Science, Saarbrücken, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2010</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">EDA9194CE75A28023E174B335B08764D50A6FCCB</identifier>
<identifier type="DOI">10.1007/978-3-642-15497-3_14</identifier>
<identifier type="ChapterID">Chap14</identifier>
<identifier type="ChapterID">14</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg</accessCondition>
<recordInfo>
<recordContentSource>SPRINGER</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2010</recordOrigin>
</recordInfo>
</mods>
</metadata>
<enrichments>
<istex:refBibTEI uri="https://api.istex.fr/document/EDA9194CE75A28023E174B335B08764D50A6FCCB/enrichments/refBib">
<teiHeader></teiHeader>
<text>
<front></front>
<body></body>
<back>
<listBibl>
<biblStruct xml:id="b0">
<monogr>
<title level="m" type="main">W3C: Cascading style sheets, level 1</title>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b1">
<monogr>
<title level="m" type="main">Bug 57351 -css on a: visited can load an image and</title>
<author>
<persName>
<surname>Bugzilla</surname>
</persName>
</author>
<imprint>
<date type="published" when="2000"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b2">
<analytic>
<title level="a" type="main">Timing attacks on web privacy</title>
<author>
<persName>
<forename type="first">E</forename>
<forename type="middle">W</forename>
<surname>Felten</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">M</forename>
<forename type="middle">A</forename>
<surname>Schneider</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">CCS 2000: Proceedings of the 7th ACM Conference on Computer and Communications Security</title>
<meeting>
<address>
<addrLine>New York</addrLine>
</address>
</meeting>
<imprint>
<publisher>ACM</publisher>
<date type="published" when="2000"></date>
<biblScope unit="page" from="25" to="32"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b3">
<analytic>
<title level="a" type="main">Social phishing</title>
<author>
<persName>
<forename type="first">T</forename>
<forename type="middle">N</forename>
<surname>Jagatic</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">N</forename>
<forename type="middle">A</forename>
<surname>Johnson</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">M</forename>
<surname>Jakobsson</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">F</forename>
<surname>Menczer</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">ACM Commun</title>
<imprint>
<biblScope unit="volume">50</biblScope>
<biblScope unit="issue">10</biblScope>
<biblScope unit="page" from="94" to="100"></biblScope>
<date type="published" when="2007"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b4">
<analytic>
<title level="a" type="main">Protecting browser state from web privacy attacks</title>
<author>
<persName>
<forename type="first">C</forename>
<surname>Jackson</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">A</forename>
<surname>Bortz</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">D</forename>
<surname>Boneh</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<forename type="middle">C</forename>
<surname>Mitchell</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">WWW 2006: Proceedings of the 15th International Conference on World Wide Web</title>
<meeting>
<address>
<addrLine>New York</addrLine>
</address>
</meeting>
<imprint>
<publisher>ACM</publisher>
<date type="published" when="2006"></date>
<biblScope unit="page" from="737" to="744"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b5">
<analytic>
<title level="a" type="main">Web camouage: Protecting your clients from browsersning attacks</title>
<author>
<persName>
<forename type="first">M</forename>
<surname>Jakobsson</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Stamm</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">IEEE Security and Privacy</title>
<imprint>
<biblScope unit="volume">5</biblScope>
<biblScope unit="page" from="16" to="24"></biblScope>
<date type="published" when="2007"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b6">
<monogr>
<title level="m" type="main">Webcollage: Web 2</title>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b7">
<monogr>
<title level="m" type="main">A personalized approach to web privacy–awareness, attitudes and actions</title>
<author>
<persName>
<forename type="first">C</forename>
<forename type="middle">E</forename>
<surname>Wills</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">M</forename>
<surname>Zeljkovic</surname>
</persName>
</author>
<imprint>
<date type="published" when="2010"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b8">
<monogr>
<title level="m" type="main">A practical attack to de-anonymize social network users, IEEE security and privacy</title>
<author>
<persName>
<forename type="first">G</forename>
<surname>Wondracek</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">T</forename>
<surname>Holz</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">E</forename>
<surname>Kirda</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">C</forename>
<surname>Kruegel</surname>
</persName>
</author>
<imprint>
<date type="published" when="2010"></date>
<publisher>IEEE Security and Privacy</publisher>
<pubPlace>Oakland, CA, USA</pubPlace>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b9">
<monogr>
<title level="m" type="main">What the internet knows about you</title>
<author>
<persName>
<forename type="first">A</forename>
<surname>Janc</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">L</forename>
<surname>Olejnik</surname>
</persName>
</author>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b10">
<monogr>
<title level="m" type="main">Change the color of visited links</title>
<author>
<persName>
<forename type="first">J</forename>
<surname>Nielsen</surname>
</persName>
</author>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b11">
<monogr>
<title level="m" type="main">Bug 147777 -:visited support allows queries into global history</title>
<author>
<persName>
<surname>Bugzilla</surname>
</persName>
</author>
<imprint>
<date type="published" when="2002"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b12">
<monogr>
<title level="m" type="main">W3C: Cascading style sheets level 2 revision 1 (css 2.1) speci cation</title>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b13">
<analytic>
<title level="a" type="main">Invasive browser sniffing and countermeasures</title>
<author>
<persName>
<forename type="first">M</forename>
<surname>Jakobsson</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Stamm</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Proceedings of the 15th International Conference on World Wide Web</title>
<meeting>the 15th International Conference on World Wide Web
<address>
<addrLine>New York</addrLine>
</address>
</meeting>
<imprint>
<publisher>ACM</publisher>
<date type="published" when="2006"></date>
<biblScope unit="page" from="523" to="532"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b14">
<monogr>
<title></title>
<author>
<persName>
<forename type="first">C</forename>
<surname>Jackson</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">Andrew</forename>
<surname>Bortz</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">D</forename>
<forename type="middle">B J M</forename>
</persName>
</author>
<imprint>
<publisher>Stanford safehistory</publisher>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b15">
<monogr>
<title level="m" type="main">Preventing attacks on a user's history through css : visited selectors</title>
<author>
<persName>
<forename type="first">L</forename>
<forename type="middle">D</forename>
<surname>Baron</surname>
</persName>
</author>
<imprint>
<date type="published" when="2010"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b16">
<analytic>
<title level="a" type="main">Privacy-preserving history mining for web browsers</title>
<author>
<persName>
<forename type="first">M</forename>
<surname>Jakobsson</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">A</forename>
<surname>Juels</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Ratkiewicz</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Web 2.0 Security and Privacy</title>
<imprint>
<date type="published" when="2008"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b17">
<monogr>
<title level="m" type="main">Browser security handbook</title>
<author>
<persName>
<forename type="first">M</forename>
<surname>Zalewski</surname>
</persName>
</author>
<imprint>
<date type="published" when="2009"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b18">
<monogr>
<title level="m" type="main">The art of wwwar: Web browsers as universal platforms for attacks on privacy, network security and rbitrary targets</title>
<author>
<persName>
<forename type="first">F</forename>
<surname>König</surname>
</persName>
</author>
<imprint>
<date type="published" when="2008"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b19">
<analytic>
<title></title>
</analytic>
<monogr>
<title level="m">Anonymous: Did you watch porn</title>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b20">
<analytic>
<title></title>
</analytic>
<monogr>
<title level="j">Alexa: Alexa</title>
<imprint>
<biblScope unit="volume">500</biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b21">
<monogr>
<title level="m" type="main">Bloglines: Bloglines top feeds</title>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b22">
<monogr>
<title></title>
<author>
<persName>
<forename type="first">!</forename>
<surname>Yahoo</surname>
</persName>
</author>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b23">
<monogr>
<title level="m" type="main">Linode: Linode vps hosting</title>
<imprint></imprint>
</monogr>
</biblStruct>
</listBibl>
</back>
</text>
</istex:refBibTEI>
</enrichments>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Musique/explor/OperaV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000A84 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 000A84 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Musique
   |area=    OperaV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:EDA9194CE75A28023E174B335B08764D50A6FCCB
   |texte=   Web Browser History Detection as a Real-World Privacy Threat
}}

Wicri

This area was generated with Dilib version V0.6.21.
Data generation: Thu Apr 14 14:59:05 2016. Site generation: Thu Jan 4 23:09:23 2024