-
Staying at the Roach Motel: Cross-Country Analysis of Manipulative
Subscription and Cancellation Flows
A. Sheil, G. Acar, H. Schraffenberger, R. Gellert, D. Malone.
To appear, The ACM CHI Conference on Human Factors in Computing Systems, 2024.
-
Targeted and Troublesome: Tracking and Advertising on Children's Websites
Z. Moti, A. Senol, H. Bostani, F. Z. Borgesius, V. Moonsamy, A. Mathur, G. Acar.
To appear, 2024 IEEE Symposium on Security and Privacy, 2024.
-
Unveiling the Impact of User-Agent Reduction and Client Hints: A Measurement Study ()
A. Senol, G. Acar.
In Proceedings of the Workshop on Privacy in the Electronic Society (WPES), 2023.
-
The Time is Ticking: The Effect of Limited Time Discounts on Consumers’
Buying Behavior and Experience
J. Tiemessen, H. Schraffenberger, G. Acar. In
Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023.
-
Leaky Forms:
A Study of Email and Password Exfiltration Before Form Submission ()
A. Senol, G. Acar, M. Humbert, F. Z. Borgesius. In
Proceedings of the 31st USENIX Security Symposium (USENIX), 2022.
-
From “Onion Not Found” to
Guard Discovery
L. Oldenburg, G. Acar, Claudia Diaz. In
Proceedings on Privacy Enhancing Technologies, 2022(1), 22 pages, 2022.
-
The CNAME of the Game:
Large-scale Analysis of DNS-based Tracking Evasion
Y. Dimova, G. Acar, L. Olejnik, W. Joosen, and T. Van Goethem. In
Proceedings on Privacy Enhancing Technologies, 2021(3), 21 pages, 2021.
-
Privacy
Policies over Time: Curation and Analysis of a Million-Document Dataset
R. Amos, G. Acar, E. Lucherini, M. Kshirsagar, A. Narayanan, and J. Mayer
In Proceedings of the The Web (WWW) Conference, 22 pages, 2021.
-
IoT
Inspector: Crowdsourcing Labeled Network Traffic from
Smart Home Devices at Scale
D. Yuxing Huang, N. Apthorpe, F. Li, G. Acar, and
N. Feamster. In
Proceedings of the ACM on Interactive, Mobile, Wearable
and Ubiquitous Technologies
4(2), 14 pages, 2020.
-
No
boundaries: data exfiltration by third parties
embedded on web pages
G. Acar, S. Englehardt, and A. Narayanan. In
Proceedings on Privacy Enhancing Technologies
2020(4), 19 pages, 2020.
-
Improving
Privacy through Fast Passive Wi-Fi Scanning
F. Goovaerts, G. Acar, R. Galvez, F. Piessens, and
M. Vanhoef. In
Proceedings of the 2019th Nordic Workshop on Secure
Computer Systems (NORDSEC 2019)
LNCS, 11875, A. Askarov, and W. Rafnsson (eds.), pp.
37-52, 2019.
-
Watching You
Watch: The Tracking Ecosystem of
Over-the-Top TV Streaming Devices
H. Mohajeri Moghaddam, G. Acar, B. Burgess, A.
Mathur, N. Feamster, E. W. Felten, P. Mittal, A.
Narayanan, and D. Yuxing Huang. In
ACM Conference on Computer and Communications
Security
2019, J. Katz, and X. Wang (eds.), ACM, pp. 131-147, 2019.
-
Dark Patterns
at Scale: Findings from a Crawl of 11K
Shopping Websites
A. Mathur, G. Acar, M. Chetty, M. Friedman, E.
Lucherini, J. Mayer, and A. Narayanan. In
Proceedings of the ACM on Human-Computer Interaction
3, ACM, pp. 81:1-81:32, 2019.
-
The Web's
Sixth Sense: A Study of Scripts Accessing
Smartphone Sensors
A. Das, A. Pradeep, G. Acar, and N. Borisov. In
ACM Conference on Computer and Communications
Security, ACM, pp. 1515-1532, 2018.
-
Web-based
attacks to discover and control local IoT
devices
G. Acar, D. Yuxing Huang, F. Li, A. Narayanan, and
N. Feamster. In
Proceedings of the 2018 Workshop on IoT Security and
Privacy, ACM, pp. 29-35, 2018.
-
How Unique is
Your .onion? An Analysis of the
Fingerprintability of Tor Onion Services
R. Overdorf, M. Juarez, G. Acar, C. Diaz, and R.
Greenstadt. In
ACM Conference on Computer and Communications
Security, ACM, pp. 2021-2036, 2017.
-
Online Tracking
Technologies and Web Privacy
G. Acar, PhD thesis, KU Leuven, C. Diaz, and
B. Preneel (promotors), 242 pages, 2017.
-
Leaky Birds:
Exploiting Mobile Application Traffic for
Surveillance
E. Vanrykel, G. Acar, M. Herrmann, and C. Diaz. In
Financial Cryptography and Data Security - 20th
International Conference, FC 2016, Lecture Notes in Computer Science 9603,
Springer-Verlag, pp. 367-384, 2016.
-
Shopping for
privacy: Purchase details leaked to
PayPal
S. Preibusch, T. Peetz, G. Acar, and B. Berendt.
Electronic Commerce Research and Applications(15),
pp. 52-64, 2016.
-
The leaking
battery: A privacy analysis of the HTML5
Battery Status API
L. Olejnik, G. Acar, C. Casteluccia, and C. Diaz.
In
Data Privacy Management, Autonomous Spontaneous
Security, and Security Assurance, Lecture Notes in Computer Science 9481,
Springer-Verlag, pp. 254 - 263, 2015.
-
Facebook
Tracking Through Social Plug-ins
G. Acar, B. Van Alsenoy, F. Piessens, C. Diaz, and
B. Preneel, Technical report prepared for the Belgian
Privacy Commission, 24 pages, 2015.
-
Purchase
details leaked to PayPal
S. Preibusch, T. Peetz, G. Acar, and B. Berendt. In
Financial Cryptography and Data Security - 19th
International Conference, FC 2015, Lecture Notes in Computer Science, Springer-Verlag, pp.
217 - 226, 2015.
-
The Web never
forgets: Persistent tracking mechanisms in
the wild
G. Acar, C. Eubank, S. Englehardt, M. Juarez, A.
Narayanan, and C. Diaz. In
ACM Conference on Computer and Communications
Security, ACM, pp. 674-689, 2014.
-
A Critical
Evaluation of Website Fingerprinting
Attacks
M. Juarez, S. Afroz, G. Acar, C. Diaz, and R.
Greenstadt. In
ACM Conference on Computer and Communications
Security, ACM, pp. 263-274, 2014.
-
Browse at your own risk
N. Nikiforakis, G. Acar, and D. Salinger.
IEEE Spectrum Magazine 35(8), pp. 30-35, 2014.
-
FPDetective:
Dusting the web for fingerprinters
G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S.
Gurses, F. Piessens, and B. Preneel. In
20th ACM Conference on Computer and Communications
Security, ACM, pp. 1129-1140, 2013.