Dark patterns at scale: Findings from a crawl of 11K shopping websites

A Mathur, G Acar, MJ Friedman, E Lucherini… - Proceedings of the …, 2019 - dl.acm.org
Dark patterns are user interface design choices that benefit an online service by coercing,
steering, or deceiving users into making unintended and potentially harmful decisions. We …

Reading the tea leaves: A comparative analysis of threat intelligence

VG Li, M Dunn, P Pearce, D McCoy… - 28th USENIX security …, 2019 - usenix.org
The term" threat intelligence" has swiftly become a staple buzzword in the computer security
industry. The entirely reasonable premise is that, by compiling up-to-date information about …

Measuring cookies and web privacy in a post-gdpr world

A Dabrowski, G Merzdovnik, J Ullrich… - Passive and Active …, 2019 - Springer
Abstract In response, the European Union has adopted the General Data Protection
Regulation (GDPR), a legislative framework for data protection empowering individuals to …

Cache me if you can: Effects of DNS time-to-live

GCM Moura, J Heidemann, RO Schmidt… - Proceedings of the …, 2019 - dl.acm.org
DNS depends on extensive caching for good performance, and every DNS zone owner must
set Time-to-Live (TTL) values to control their DNS caching. Today there is relatively little …

On the Importance of {Encrypted-SNI}({{{{{ESNI}}}}}) to Censorship Circumvention

Z Chai, A Ghafari, A Houmansadr - 9th USENIX Workshop on Free and …, 2019 - usenix.org
With the increasing use of TLS encryption over web traffic, censors start to deploy SNI
filtering for more effective censorship. Specifically, a censor can identify the web domain …

Errors, misunderstandings, and attacks: Analyzing the crowdsourcing process of ad-blocking systems

M Alrizah, S Zhu, X Xing, G Wang - Proceedings of the Internet …, 2019 - dl.acm.org
Ad-blocking systems such as Adblock Plus rely on crowdsourcing to build and maintain filter
lists, which are the basis for determining which ads to block on web pages. In this work, we …

ShamFinder: An automated framework for detecting IDN homographs

H Suzuki, D Chiba, Y Yoneya, T Mori… - Proceedings of the Internet …, 2019 - dl.acm.org
The internationalized domain name (IDN) is a mechanism that enables us to use Unicode
characters in domain names. The set of Unicode characters contains several pairs of …

Inadvertently making cyber criminals rich: A comprehensive study of cryptojacking campaigns at internet scale

HLJ Bijmans, TM Booij, C Doerr - 28th USENIX Security Symposium …, 2019 - usenix.org
Since the release of a browser-based cryptominer by Coinhive in 2017, the easy use of
these miners has skyrocketed illicit cryptomining in 2017 and continued in 2018. This …

Tales from the porn: A comprehensive privacy analysis of the web porn ecosystem

P Vallina, Á Feal, J Gamba… - Proceedings of the …, 2019 - dl.acm.org
Modern privacy regulations, including the General Data Protection Regulation (GDPR) in the
European Union, aim to control user tracking activities in websites and mobile applications …

The Dagstuhl beginners guide to reproducibility for experimental networking research

V Bajpai, A Brunstrom, A Feldmann, W Kellerer… - ACM SIGCOMM …, 2019 - dl.acm.org
Reproducibility is one of the key characteristics of good science, but hard to achieve for
experimental disciplines like Internet measurements and networked systems. This guide …