{"id":"https://openalex.org/W4387149989","doi":"https://doi.org/10.1145/3565287.3617625","title":"Taking a Look into the Cookie Jar: A Comprehensive Study towards the Security of Web Cookies","display_name":"Taking a Look into the Cookie Jar: A Comprehensive Study towards the Security of Web Cookies","publication_year":2023,"publication_date":"2023-09-28","ids":{"openalex":"https://openalex.org/W4387149989","doi":"https://doi.org/10.1145/3565287.3617625"},"language":"en","primary_location":{"id":"doi:10.1145/3565287.3617625","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3565287.3617625","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101716424","display_name":"Sean Chen","orcid":"https://orcid.org/0009-0004-8493-7921"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sean Chen","raw_affiliation_strings":["Texas A&amp;M University, College Station, USA"],"affiliations":[{"raw_affiliation_string":"Texas A&amp;M University, College Station, USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080251585","display_name":"J. Elaine McCracken","orcid":"https://orcid.org/0009-0001-2207-185X"},"institutions":[{"id":"https://openalex.org/I4322298","display_name":"Towson University","ror":"https://ror.org/044w7a341","country_code":"US","type":"education","lineage":["https://openalex.org/I4322298"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jaelyn McCracken","raw_affiliation_strings":["Towson University, Towson, USA"],"affiliations":[{"raw_affiliation_string":"Towson University, Towson, USA","institution_ids":["https://openalex.org/I4322298"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101647388","display_name":"Kevin Lu","orcid":"https://orcid.org/0009-0001-9300-3643"},"institutions":[{"id":"https://openalex.org/I4210107136","display_name":"St. Mark's School of Texas","ror":"https://ror.org/01q3wpv10","country_code":"US","type":"education","lineage":["https://openalex.org/I4210107136"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin Lu","raw_affiliation_strings":["St. Mark's School of Texas, Dallas, USA"],"affiliations":[{"raw_affiliation_string":"St. Mark's School of Texas, Dallas, USA","institution_ids":["https://openalex.org/I4210107136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100453448","display_name":"Tao Wang","orcid":"https://orcid.org/0000-0001-9744-107X"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tao Wang","raw_affiliation_strings":["University of North Carolina at Charlotte, Charlotte, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte, Charlotte, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102965694","display_name":"Tao Hou","orcid":"https://orcid.org/0000-0003-3775-6170"},"institutions":[{"id":"https://openalex.org/I13511017","display_name":"Texas State University","ror":"https://ror.org/05h9q1g27","country_code":"US","type":"education","lineage":["https://openalex.org/I13511017"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tao Hou","raw_affiliation_strings":["Texas State University, San Marcos, USA"],"affiliations":[{"raw_affiliation_string":"Texas State University, San Marcos, USA","institution_ids":["https://openalex.org/I13511017"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101716424"],"corresponding_institution_ids":["https://openalex.org/I91045830"],"apc_list":null,"apc_paid":null,"fwci":0.3994,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62398633,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"474","last_page":"479"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cross-site-scripting","display_name":"Cross-site scripting","score":0.9012835025787354},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7042328119277954},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.6421471834182739},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.6285979747772217},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6278268694877625},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5941295623779297},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5891304016113281},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5631041526794434},{"id":"https://openalex.org/keywords/internet-security","display_name":"Internet security","score":0.5152183175086975},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.4821628928184509},{"id":"https://openalex.org/keywords/multitude","display_name":"Multitude","score":0.44004225730895996},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.41416212916374207},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.33872324228286743},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2913694381713867},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.13705068826675415}],"concepts":[{"id":"https://openalex.org/C39569185","wikidata":"https://www.wikidata.org/wiki/Q371199","display_name":"Cross-site scripting","level":5,"score":0.9012835025787354},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7042328119277954},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.6421471834182739},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.6285979747772217},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6278268694877625},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5941295623779297},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5891304016113281},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5631041526794434},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.5152183175086975},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.4821628928184509},{"id":"https://openalex.org/C2780565519","wikidata":"https://www.wikidata.org/wiki/Q1208937","display_name":"Multitude","level":2,"score":0.44004225730895996},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.41416212916374207},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.33872324228286743},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2913694381713867},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.13705068826675415},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3565287.3617625","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3565287.3617625","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1663388364","https://openalex.org/W2076014973","https://openalex.org/W2093077836","https://openalex.org/W2104692292","https://openalex.org/W2129630219","https://openalex.org/W2529834042","https://openalex.org/W2810885715","https://openalex.org/W2889348755","https://openalex.org/W3003872486","https://openalex.org/W3047462855","https://openalex.org/W3175349171","https://openalex.org/W3192272693","https://openalex.org/W4206702214","https://openalex.org/W4211261703","https://openalex.org/W4283207051","https://openalex.org/W4285064429","https://openalex.org/W4309679199","https://openalex.org/W6679045160"],"related_works":["https://openalex.org/W2997044556","https://openalex.org/W2901797044","https://openalex.org/W4319431564","https://openalex.org/W1531015913","https://openalex.org/W2046312985","https://openalex.org/W4250914548","https://openalex.org/W2892056795","https://openalex.org/W3156816392","https://openalex.org/W3092270246","https://openalex.org/W2037704314"],"abstract_inverted_index":{"Cookies":[0],"play":[1],"a":[2,66,99,104,131],"vital":[3],"role":[4],"in":[5,24],"our":[6,61],"Internet":[7,73],"browsing":[8],"experience,":[9],"enabling":[10],"various":[11],"functions":[12],"on":[13,81,95,108,126],"websites.":[14,96],"However,":[15],"their":[16],"significance":[17],"also":[18],"extends":[19],"to":[20,64,78,89,102],"potential":[21,83,143],"vulnerabilities,":[22],"especially":[23],"the":[25,71,82,87,109,118,135],"face":[26],"of":[27,106,121,134,138,145],"cyber-attacks":[28],"like":[29],"cross-site":[30],"scripting.":[31],"As":[32],"we":[33,129],"interact":[34],"with":[35],"websites":[36,107],"daily,":[37],"it":[38],"remains":[39],"uncertain":[40],"how":[41,52],"well":[42],"these":[43,59],"platforms":[44],"protect":[45],"user":[46],"data":[47],"from":[48],"such":[49],"attacks":[50],"or":[51],"efficiently":[53],"they":[54],"address":[55,58],"vulnerabilities.":[56],"To":[57],"concerns,":[60],"research":[62],"endeavors":[63],"conduct":[65],"comprehensive":[67],"measurement":[68],"study":[69,125],"across":[70],"entire":[72],"landscape.":[74],"Our":[75],"goal":[76],"is":[77],"shed":[79],"light":[80],"security":[84,119,140],"risks":[85],"and":[86,141],"extent":[88],"which":[90],"protective":[91],"measures":[92],"are":[93],"deployed":[94],"We":[97],"developed":[98],"customized":[100],"toolkit":[101],"scrape":[103],"multitude":[105],"Internet,":[110],"this":[111,124],"objective":[112],"can":[113],"be":[114],"assessed":[115],"by":[116],"analyzing":[117],"flags":[120],"cookies.":[122],"Through":[123],"web":[127,139],"cookies,":[128],"obtained":[130],"better":[132],"understanding":[133],"current":[136],"state":[137],"identified":[142],"areas":[144],"improvement.":[146]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
