Sanchez-Rola et al., 2019 - Google Patents
Bakingtimer: privacy analysis of server-side request processing timeSanchez-Rola et al., 2019
View PDF- Document ID
- 16683317456233026458
- Author
- Sanchez-Rola I
- Balzarotti D
- Santos I
- Publication year
- Publication venue
- Proceedings of the 35th Annual Computer Security Applications Conference
External Links
Snippet
Cookies were originally introduced as a way to provide state awareness to websites, and are now one of the backbones of the current web. However, their use is not limited to store the login information or to save the current state of user browsing. In several cases, third …
- 238000004458 analytical method 0 title description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
- G06F11/3414—Workload generation, e.g. scripts, playback
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3438—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/875—Monitoring of systems including the internet
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30873—Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Van Goethem et al. | The clock is still ticking: Timing attacks in the modern web | |
Hong et al. | How you get shot in the back: A systematical study about cryptojacking in the real world | |
Mehnaz et al. | Are your sensitive attributes private? novel model inversion attribute inference attacks on classification models | |
Acar et al. | The web never forgets: Persistent tracking mechanisms in the wild | |
Nikiforakis et al. | You are what you include: large-scale evaluation of remote javascript inclusions | |
Franken et al. | Who Left Open the Cookie Jar? A Comprehensive Evaluation of {Third-Party} Cookie Policies | |
Yan et al. | Rolling colors: Adversarial laser exploits against traffic light recognition | |
US8850567B1 (en) | Unauthorized URL requests detection | |
Sanchez-Rola et al. | Bakingtimer: privacy analysis of server-side request processing time | |
US20200213333A1 (en) | Detection of remote fraudulent activity in a client-server-system | |
Cassel et al. | Omnicrawl: Comprehensive measurement of web tracking with real desktop and mobile browsers | |
Karaj et al. | WhoTracks. Me: Shedding light on the opaque world of online tracking | |
Bujlow et al. | Web tracking: Mechanisms, implications, and defenses | |
RU2697950C2 (en) | System and method of detecting latent behaviour of browser extension | |
Kaur et al. | Browser fingerprinting as user tracking technology | |
Kim et al. | Inferring browser activity and status through remote monitoring of storage usage | |
Sanchez-Rola et al. | Cookies from the past: Timing server-side request processing code for history sniffing | |
Mishra et al. | Intelligent phishing detection system using similarity matching algorithms | |
Durey et al. | FP-Redemption: Studying browser fingerprinting adoption for the sake of web security | |
US11303670B1 (en) | Pre-filtering detection of an injected script on a webpage accessed by a computing device | |
Urban et al. | Towards understanding privacy implications of adware and potentially unwanted programs | |
Munir et al. | Cookiegraph: Understanding and detecting first-party tracking cookies | |
Zhang et al. | A survey of browser fingerprint research and application | |
Zaheri et al. | Targeted deanonymization via the cache side channel: Attacks and defenses | |
Criscione et al. | ZARATHUSTRA: Extracting Webinject signatures from banking trojans |