Dark patterns at scale: Findings from a crawl of 11K shopping websites
Dark patterns are user interface design choices that benefit an online service by coercing,
steering, or deceiving users into making unintended and potentially harmful decisions. We …
steering, or deceiving users into making unintended and potentially harmful decisions. We …
Reading the tea leaves: A comparative analysis of threat intelligence
The term" threat intelligence" has swiftly become a staple buzzword in the computer security
industry. The entirely reasonable premise is that, by compiling up-to-date information about …
industry. The entirely reasonable premise is that, by compiling up-to-date information about …
Measuring cookies and web privacy in a post-gdpr world
Abstract In response, the European Union has adopted the General Data Protection
Regulation (GDPR), a legislative framework for data protection empowering individuals to …
Regulation (GDPR), a legislative framework for data protection empowering individuals to …
Cache me if you can: Effects of DNS time-to-live
DNS depends on extensive caching for good performance, and every DNS zone owner must
set Time-to-Live (TTL) values to control their DNS caching. Today there is relatively little …
set Time-to-Live (TTL) values to control their DNS caching. Today there is relatively little …
On the Importance of {Encrypted-SNI}({{{{{ESNI}}}}}) to Censorship Circumvention
Z Chai, A Ghafari, A Houmansadr - 9th USENIX Workshop on Free and …, 2019 - usenix.org
With the increasing use of TLS encryption over web traffic, censors start to deploy SNI
filtering for more effective censorship. Specifically, a censor can identify the web domain …
filtering for more effective censorship. Specifically, a censor can identify the web domain …
Errors, misunderstandings, and attacks: Analyzing the crowdsourcing process of ad-blocking systems
Ad-blocking systems such as Adblock Plus rely on crowdsourcing to build and maintain filter
lists, which are the basis for determining which ads to block on web pages. In this work, we …
lists, which are the basis for determining which ads to block on web pages. In this work, we …
ShamFinder: An automated framework for detecting IDN homographs
The internationalized domain name (IDN) is a mechanism that enables us to use Unicode
characters in domain names. The set of Unicode characters contains several pairs of …
characters in domain names. The set of Unicode characters contains several pairs of …
Inadvertently making cyber criminals rich: A comprehensive study of cryptojacking campaigns at internet scale
HLJ Bijmans, TM Booij, C Doerr - 28th USENIX Security Symposium …, 2019 - usenix.org
Since the release of a browser-based cryptominer by Coinhive in 2017, the easy use of
these miners has skyrocketed illicit cryptomining in 2017 and continued in 2018. This …
these miners has skyrocketed illicit cryptomining in 2017 and continued in 2018. This …
Tales from the porn: A comprehensive privacy analysis of the web porn ecosystem
Modern privacy regulations, including the General Data Protection Regulation (GDPR) in the
European Union, aim to control user tracking activities in websites and mobile applications …
European Union, aim to control user tracking activities in websites and mobile applications …
The Dagstuhl beginners guide to reproducibility for experimental networking research
Reproducibility is one of the key characteristics of good science, but hard to achieve for
experimental disciplines like Internet measurements and networked systems. This guide …
experimental disciplines like Internet measurements and networked systems. This guide …