Cat and mouse: content delivery tradeoffs in web access
Proceedings of the 15th international conference on World Wide Web
Protecting browser state from web privacy attacks
Proceedings of the 15th international conference on World Wide Web
Generating a privacy footprint on the internet
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Measuring privacy loss and the impact of privacy protection in web browsing
Proceedings of the 3rd symposium on Usable privacy and security
Characterizing privacy in online social networks
Proceedings of the first workshop on Online social networks
On the leakage of personally identifiable information via online social networks
Proceedings of the 2nd ACM workshop on Online social networks
RequestPolicy: Increasing Web Browsing Privacy through Control of Cross-Site Requests
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
On the leakage of personally identifiable information via online social networks
ACM SIGCOMM Computer Communication Review
Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care
HTTP in the home: it is not just about PCs
Proceedings of the 2010 ACM SIGCOMM workshop on Home networks
I know what you will do next summer
ACM SIGCOMM Computer Communication Review
HTTP in the home: it is not just about PCs
ACM SIGCOMM Computer Communication Review
Got traffic?: an evaluation of click traffic providers
Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality
Characterizing Intelligence Gathering and Control on an Edge Network
ACM Transactions on Internet Technology (TOIT)
ACM Transactions on the Web (TWEB)
Auctions in do-not-track compliant internet advertising
Proceedings of the 18th ACM conference on Computer and communications security
Understanding website complexity: measurements, metrics, and implications
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Computer Networks: The International Journal of Computer and Telecommunications Networking
Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Detecting and defending against third-party tracking on the web
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Review: A survey on solutions and main free tools for privacy enhancing Web communications
Journal of Network and Computer Applications
Smart, useful, scary, creepy: perceptions of online behavioral advertising
Proceedings of the Eighth Symposium on Usable Privacy and Security
Big friend is watching you: analyzing online social networks tracking capabilities
Proceedings of the 2012 ACM workshop on Workshop on online social networks
ProfileDroid: multi-layer profiling of android applications
Proceedings of the 18th annual international conference on Mobile computing and networking
Understanding what they do with what they know
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
What do online behavioral advertising privacy disclosures communicate to users?
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
A theoretical model for obfuscating web navigation trails
Proceedings of the Joint EDBT/ICDT 2013 Workshops
Mosaic: quantifying privacy leakage in mobile networks
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Expressive privacy control with pseudonyms
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Your browsing behavior for a big mac: economics of personal information online
Proceedings of the 22nd international conference on World Wide Web
Proceedings of the Ninth Symposium on Usable Privacy and Security
Best paper -- Follow the money: understanding economics of online aggregation and advertising
Proceedings of the 2013 conference on Internet measurement conference
POSTER: A footprint of third-party tracking on mobile web
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Privacy awareness about information leakage: who knows what about me?
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Hi-index | 0.00 |
For the last few years we have been studying the diffusion of private information for users as they visit various Web sites triggering data gathering aggregation by third parties. This paper reports on our longitudinal study consisting of multiple snapshots of our examination of such diffusion over four years. We examine the various technical ways by which third-party aggregators acquire data and the depth of user-related information acquired. We study techniques for protecting privacy diffusion as well as limitations of such techniques. We introduce the concept of secondary privacy damage. Our results show increasing aggregation of user-related data by a steadily decreasing number of entities. A handful of companies are able to track users' movement across almost all of the popular Web sites. Virtually all the protection techniques have significant limitations highlighting the seriousness of the problem and the need for alternate solutions.