{"id":"https://openalex.org/W3133515309","doi":"https://doi.org/10.2478/popets-2021-0033","title":"D\u00e9j\u00e0 vu: Abusing Browser Cache Headers to Identify and Track Online Users","display_name":"D\u00e9j\u00e0 vu: Abusing Browser Cache Headers to Identify and Track Online Users","publication_year":2021,"publication_date":"2021-01-29","ids":{"openalex":"https://openalex.org/W3133515309","doi":"https://doi.org/10.2478/popets-2021-0033","mag":"3133515309"},"language":"en","primary_location":{"id":"doi:10.2478/popets-2021-0033","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2021-0033","pdf_url":"https://www.sciendo.com/pdf/10.2478/popets-2021-0033","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://www.sciendo.com/pdf/10.2478/popets-2021-0033","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036949069","display_name":"Vikash Kumar Mishra","orcid":"https://orcid.org/0000-0001-5481-1368"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Vikas Mishra","raw_affiliation_strings":["Inria, Univ . Lille"],"affiliations":[{"raw_affiliation_string":"Inria, Univ . Lille","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022892875","display_name":"Pierre Laperdrix","orcid":"https://orcid.org/0000-0001-6901-3596"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pierre Laperdrix","raw_affiliation_strings":["Univ. Lille , CNRS , Inria"],"affiliations":[{"raw_affiliation_string":"Univ. Lille , CNRS , Inria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030605099","display_name":"Walter Rudametkin","orcid":"https://orcid.org/0000-0003-2903-7600"},"institutions":[{"id":"https://openalex.org/I2279609970","display_name":"Universit\u00e9 de Lille","ror":"https://ror.org/02kzqn938","country_code":"FR","type":"education","lineage":["https://openalex.org/I2279609970"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Walter Rudametkin","raw_affiliation_strings":["Univ. Lille , Inria"],"affiliations":[{"raw_affiliation_string":"Univ. Lille , Inria","institution_ids":["https://openalex.org/I2279609970"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082468751","display_name":"Romain Rouvoy","orcid":"https://orcid.org/0000-0003-1771-8791"},"institutions":[{"id":"https://openalex.org/I2279609970","display_name":"Universit\u00e9 de Lille","ror":"https://ror.org/02kzqn938","country_code":"FR","type":"education","lineage":["https://openalex.org/I2279609970"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Romain Rouvoy","raw_affiliation_strings":["Univ. Lille , Inria , IUF"],"affiliations":[{"raw_affiliation_string":"Univ. Lille , Inria , IUF","institution_ids":["https://openalex.org/I2279609970"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036949069"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.02567674,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"2021","issue":"2","first_page":"391","last_page":"406"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.807951807975769},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.7789354920387268},{"id":"https://openalex.org/keywords/timeline","display_name":"Timeline","score":0.7274894714355469},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5322978496551514},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4410936236381531},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.44074663519859314},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.42302456498146057},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34532925486564636},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.25696510076522827},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.22165033221244812},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15066120028495789},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.13321438431739807}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.807951807975769},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.7789354920387268},{"id":"https://openalex.org/C4438859","wikidata":"https://www.wikidata.org/wiki/Q186117","display_name":"Timeline","level":2,"score":0.7274894714355469},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5322978496551514},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4410936236381531},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.44074663519859314},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.42302456498146057},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34532925486564636},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.25696510076522827},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.22165033221244812},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15066120028495789},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.13321438431739807},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.2478/popets-2021-0033","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2021-0033","pdf_url":"https://www.sciendo.com/pdf/10.2478/popets-2021-0033","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-03017222v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-03017222","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"PETS 2021 - The 21th International Symposium on Privacy Enhancing Technologies, Jul 2021, Virtual, France","raw_type":"Conference papers"},{"id":"pmh:oai:doaj.org/article:1501bba9111942ed8694cd23c0561cff","is_oa":true,"landing_page_url":"https://doaj.org/article/1501bba9111942ed8694cd23c0561cff","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings on Privacy Enhancing Technologies, Vol 2021, Iss 2, Pp 391-406 (2021)","raw_type":"article"},{"id":"pmh:oai:lilloa.univ-lille.fr:20.500.12210/57495","is_oa":true,"landing_page_url":"http://hdl.handle.net/20.500.12210/57495","pdf_url":null,"source":{"id":"https://openalex.org/S4306402203","display_name":"LillOA (Universit\u00e9 de Lille (University Of Lille))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210123514","host_organization_name":"Centre d'Etudes en Civilisations, Langues et Litt\u00e9ratures Etrang\u00e8res","host_organization_lineage":["https://openalex.org/I4210123514"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"doi:10.2478/popets-2021-0033","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2021-0033","pdf_url":"https://www.sciendo.com/pdf/10.2478/popets-2021-0033","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5400000214576721,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3133515309.pdf","grobid_xml":"https://content.openalex.org/works/W3133515309.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W647029926","https://openalex.org/W1504028050","https://openalex.org/W1770989051","https://openalex.org/W1972524097","https://openalex.org/W1980800818","https://openalex.org/W1997546092","https://openalex.org/W2026485478","https://openalex.org/W2040210405","https://openalex.org/W2143445293","https://openalex.org/W2297075900","https://openalex.org/W2535603283","https://openalex.org/W2612608334","https://openalex.org/W2888996757","https://openalex.org/W2904027722","https://openalex.org/W2962940036","https://openalex.org/W3081017056","https://openalex.org/W4295023194"],"related_works":["https://openalex.org/W1858249912","https://openalex.org/W2114034199","https://openalex.org/W4391249598","https://openalex.org/W2317428717","https://openalex.org/W2734259032","https://openalex.org/W3094038556","https://openalex.org/W4212981280","https://openalex.org/W1549794385","https://openalex.org/W4300944728","https://openalex.org/W3097779317"],"abstract_inverted_index":{"Abstract":[0],"Many":[1],"browser":[2,220],"cache":[3,33],"attacks":[4,118],"have":[5,201],"been":[6],"proposed":[7],"in":[8,31],"the":[9,13,32,37,56,64,75,98,109,131,135,154,176,219],"literature":[10],"to":[11,25,62,90,161,170,224],"sniff":[12],"user\u2019s":[14,110,128],"browsing":[15],"history.":[16],"All":[17],"of":[18,108,124,137,151,186],"them":[19,187],"rely":[20],"on":[21,42,130,143,157],"specific":[22,167],"time":[23,68],"measurements":[24],"infer":[26],"if":[27,92],"a":[28,43,50,70,93,106],"resource":[29,71],"is":[30,48],"or":[34],"not.":[35],"Unlike":[36],"state-of-the-art,":[38],"this":[39,83],"paper":[40],"reports":[41],"novel":[44],"cache-based":[45],"attack":[46,52,165],"that":[47,54,149,200],"not":[49,86],"timing":[51],"but":[53,100],"abuses":[55],"HTTP":[57,168],"cache-control":[58],"and":[59,67,126,147,182,221],"expires":[60],"headers":[61,169],"extract":[63],"exact":[65],"date":[66],"when":[69],"was":[72,95],"cached":[73],"by":[74,97],"browser.":[76],"The":[77],"privacy":[78],"implications":[79],"are":[80,159],"serious":[81],"as":[82,119],"information":[84],"can":[85,102,121,188],"only":[87],"be":[88,171,189],"utilized":[89],"detect":[91],"website":[94],"visited":[96],"user":[99,210],"it":[101,142],"also":[103,174],"help":[104],"build":[105],"timeline":[107],"visits.":[111],"This":[112],"goes":[113],"beyond":[114],"traditional":[115],"history":[116],"sniffing":[117],"we":[120,140,173,213],"observe":[122],"patterns":[123],"visit":[125],"model":[127],"behavior":[129],"web.":[132],"To":[133],"evaluate":[134],"impact":[136],"our":[138,164,192],"attack,":[139],"tested":[141],"all":[144,150],"major":[145],"browsers":[146],"found":[148],"them,":[152,195],"except":[153],"ones":[155],"based":[156],"WebKit,":[158],"vulnerable":[160],"it.":[162],"Since":[163],"requires":[166],"present,":[172],"crawled":[175],"T":[177],"ranco":[178],"Top":[179],"100K":[180],"websites":[181],"identified":[183],"12,":[184],"970":[185],"detected":[190],"with":[191],"approach.":[193],"Among":[194],"1,":[196],"910":[197],"deliver":[198],"resources":[199],"expiry":[202],"dates":[203],"greater":[204],"than":[205],"100":[206],"days,":[207],"enabling":[208],"long-term":[209],"tracking.":[211],"Finally,":[212],"discuss":[214],"possible":[215],"defenses":[216],"at":[217],"both":[218],"standard":[222],"levels":[223],"prevent":[225],"users":[226],"from":[227],"being":[228],"tracked.":[229]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
