Gunes Acar
Cited by
Cited by
The web never forgets: Persistent tracking mechanisms in the wild
G Acar, C Eubank, S Englehardt, M Juarez, A Narayanan, C Diaz
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
Dark patterns at scale: Findings from a crawl of 11K shopping websites
A Mathur, G Acar, MJ Friedman, E Lucherini, J Mayer, M Chetty, ...
Proceedings of the ACM on human-computer interaction 3 (CSCW), 1-32, 2019
FPDetective: dusting the web for fingerprinters
G Acar, M Juarez, N Nikiforakis, C Diaz, S Gürses, F Piessens, B Preneel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
A critical evaluation of website fingerprinting attacks
M Juarez, S Afroz, G Acar, C Diaz, R Greenstadt
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
IoT inspector: Crowdsourcing labeled network traffic from smart home devices at scale
DY Huang, N Apthorpe, F Li, G Acar, N Feamster
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
The leaking battery: A privacy analysis of the HTML5 Battery Status API
L Olejnik, G Acar, C Casteluccia, C Diaz
Lecture Notes in Computer Science, 2015
Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset
R Amos, G Acar, E Lucherini, M Kshirsagar, A Narayanan, J Mayer
The Web Conference (WWW), 2021
Watching you watch: The tracking ecosystem of over-the-top TV streaming devices
H Mohajeri Moghaddam, G Acar, B Burgess, A Mathur, DY Huang, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
The Web’s Sixth Sense: A Study of Scripts Accessing Smartphone Sensors
A Das, G Acar, N Borisov, A Pradeep
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
How Unique is Your. onion? An Analysis of the Fingerprintability of Tor Onion Services
R Overdorf, M Juarez, G Acar, R Greenstadt, C Diaz
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Web-based attacks to discover and control local IoT devices
G Acar, DY Huang, F Li, A Narayanan, N Feamster
Proceedings of the 2018 Workshop on IoT Security and Privacy, 29-35, 2018
Shopping for privacy: Purchase details leaked to PayPal
S Preibusch, T Peetz, G Acar, B Berendt
Electronic Commerce Research and Applications 15, 52-64, 2016
No boundaries: data exfiltration by third parties embedded on web pages
G Acar, S Englehardt, A Narayanan
Proceedings on Privacy Enhancing Technologies, 2020
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion
Y Dimova, G Acar, L Olejnik, W Joosen, T Van Goethem
Proceedings on Privacy Enhancing Technologies 2021 (3), 2021
Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission
A Senol, G Acar, M Humbert, FZ Borgesius
USENIX Security, 2022
From social media service to advertising network: a critical analysis of Facebook’s Revised Policies and Terms
B Van Alsenoy, V Verdoodt, R Heyman, E Wauters, J Ausloos, G Acar
Facebook tracking through social plug-ins
G Acar, B Van Alsenoy, F Piessens, C Diaz, B Preneel
Belgian Privacy Commission, Ver 1, 2, 2015
Browse at your own risk
N Nikiforakis, G Acar
IEEE Spectrum 51 (8), 30-35, 2014
Leaky Birds: Exploiting Mobile Application Traffic for Surveillance
E Vanrykel, G Acar, M Herrmann, C Diaz
Financial Cryptography and Data Security - 20th International Conference, FC …, 2016
Sustaining a corpus for spoken Turkish discourse: Accessibility and corpus management issues
Ş Ruhi, B Eröz-Tuğa, Ç Hatipoğlu, H Işık-Güler, G Acar, K Eryılmaz, H Can, ...
Language Resources: From Storyboard to Sustainability and LR Lifecycle …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20