Cat and mouse: content delivery tradeoffs in web access
Proceedings of the 15th international conference on World Wide Web
Measuring privacy loss and the impact of privacy protection in web browsing
Proceedings of the 3rd symposium on Usable privacy and security
Sowing the seeds of self: a socio-pragmatic penetration of the web artefact
ICPW '07 Proceedings of the 2nd international conference on Pragmatic web
Characterizing privacy in online social networks
Proceedings of the first workshop on Online social networks
Privacy diffusion on the web: a longitudinal perspective
Proceedings of the 18th international conference on World wide web
RequestPolicy: Increasing Web Browsing Privacy through Control of Cross-Site Requests
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
AjaxTracker: active measurement system for high-fidelity characterization of AJAX applications
WebApps'10 Proceedings of the 2010 USENIX conference on Web application development
How unique is your web browser?
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
A secure and privacy-preserving targeted ad-system
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
ACM Transactions on the Web (TWEB)
Sherlock holmes' evil twin: on the impact of global inference for online privacy
Proceedings of the 2011 workshop on New security paradigms workshop
Detecting and defending against third-party tracking on the web
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Expressive privacy control with pseudonyms
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
POSTER: A footprint of third-party tracking on mobile web
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
A Method for Mobile Download Conversion Rate Measurement based on Device Fingerprinting
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.00 |
As a follow up to characterizing traffic deemed as unwanted by Web clients such as advertisements, we examine how information related to individual users is aggregated as a result of browsing seemingly unrelated Web sites. We examine the privacy diffusion on the Internet, hidden transactions, and the potential for a few sites to be able to construct a profile of individual users. We define and generate a privacy footprint allowing us to assess and compare the diffusion of privacy information across a wide variety of sites. We examine the effectiveness of existing and new techniques to reduce this diffusion. Our results show that the size of the privacy footprint is a legitimate cause for concern across the sets of sites that we study.