default search action
Gunes Acar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Ashley Sheil, Gunes Acar, Hanna Schraffenberger, Raphaël Gellert, David Malone:
Staying at the Roach Motel: Cross-Country Analysis of Manipulative Subscription and Cancellation Flows. CHI 2024: 298:1-298:24 - [c16]Zahra Moti, Asuman Senol, Hamid Bostani, Frederik J. Zuiderveen Borgesius, Veelasha Moonsamy, Arunesh Mathur, Gunes Acar:
Targeted and Troublesome: Tracking and Advertising on Children's Websites. SP 2024: 1517-1535 - 2023
- [c15]Jelmer Tiemessen, Hanna Schraffenberger, Gunes Acar:
The Time is Ticking: The Effect of Limited Time Discounts on Consumers' Buying Behavior and Experience. CHI Extended Abstracts 2023: 277:1-277:11 - [c14]Asuman Senol, Gunes Acar:
Unveiling the Impact of User-Agent Reduction and Client Hints: A Measurement Study. WPES@CCS 2023: 91-106 - [i8]Zahra Moti, Asuman Senol, Hamid Bostani, Frederik J. Zuiderveen Borgesius, Veelasha Moonsamy, Arunesh Mathur, Gunes Acar:
Targeted and Troublesome: Tracking and Advertising on Children's Websites. CoRR abs/2308.04887 (2023) - [i7]Ashley Sheil, Gunes Acar, Hanna Schraffenberger, Raphaël Gellert, David Malone:
Staying at the Roach Motel: Cross-Country Analysis of Manipulative Subscription and Cancellation Flows. CoRR abs/2309.17145 (2023) - 2022
- [j6]Lennart Oldenburg, Gunes Acar, Claudia Díaz:
From "Onion Not Found" to Guard Discovery. Proc. Priv. Enhancing Technol. 2022(1): 522-543 (2022) - [c13]Asuman Senol, Gunes Acar, Mathias Humbert, Frederik J. Zuiderveen Borgesius:
Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission. USENIX Security Symposium 2022: 1813-1830 - 2021
- [j5]Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom van Goethem:
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion. Proc. Priv. Enhancing Technol. 2021(3): 394-412 (2021) - [c12]Ryan Amos, Gunes Acar, Elena Lucherini, Mihir Kshirsagar, Arvind Narayanan, Jonathan R. Mayer:
Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset. WWW 2021: 2165-2176 - [i6]Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom van Goethem:
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion. CoRR abs/2102.09301 (2021) - 2020
- [j4]Danny Yuxing Huang, Noah J. Apthorpe, Frank Li, Gunes Acar, Nick Feamster:
IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(2): 46:1-46:21 (2020) - [j3]Gunes Acar, Steven Englehardt, Arvind Narayanan:
No boundaries: data exfiltration by third parties embedded on web pages. Proc. Priv. Enhancing Technol. 2020(4): 220-238 (2020) - [i5]Ryan Amos, Gunes Acar, Elena Lucherini, Mihir Kshirsagar, Arvind Narayanan, Jonathan R. Mayer:
Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset. CoRR abs/2008.09159 (2020)
2010 – 2019
- 2019
- [j2]Arunesh Mathur, Gunes Acar, Michael Friedman, Elena Lucherini, Jonathan R. Mayer, Marshini Chetty, Arvind Narayanan:
Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites. Proc. ACM Hum. Comput. Interact. 3(CSCW): 81:1-81:32 (2019) - [c11]Hooman Mohajeri Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Yuxing Huang, Nick Feamster, Edward W. Felten, Prateek Mittal, Arvind Narayanan:
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices. CCS 2019: 131-147 - [c10]Frederik Goovaerts, Gunes Acar, Rafael Galvez, Frank Piessens, Mathy Vanhoef:
Improving Privacy Through Fast Passive Wi-Fi Scanning. NordSec 2019: 37-52 - [i4]Arunesh Mathur, Gunes Acar, Michael Friedman, Elena Lucherini, Jonathan R. Mayer, Marshini Chetty, Arvind Narayanan:
Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites. CoRR abs/1907.07032 (2019) - [i3]Danny Yuxing Huang, Noah J. Apthorpe, Gunes Acar, Frank Li, Nick Feamster:
IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale. CoRR abs/1909.09848 (2019) - 2018
- [c9]Anupam Das, Gunes Acar, Nikita Borisov, Amogh Pradeep:
The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors. CCS 2018: 1515-1532 - [c8]Gunes Acar, Danny Yuxing Huang, Frank Li, Arvind Narayanan, Nick Feamster:
Web-based Attacks to Discover and Control Local IoT Devices. IoT S&P@SIGCOMM 2018: 29-35 - 2017
- [c7]Rebekah Overdorf, Marc Juárez, Gunes Acar, Rachel Greenstadt, Claudia Díaz:
How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services. CCS 2017: 2021-2036 - [i2]Rebekah Overdorf, Marc Juárez, Gunes Acar, Rachel Greenstadt, Claudia Díaz:
How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services. CoRR abs/1708.08475 (2017) - 2016
- [j1]Sören Preibusch, Thomas Peetz, Gunes Acar, Bettina Berendt:
Shopping for privacy: Purchase details leaked to PayPal. Electron. Commer. Res. Appl. 15: 52-64 (2016) - [c6]Eline Vanrykel, Gunes Acar, Michael Herrmann, Claudia Díaz:
Leaky Birds: Exploiting Mobile Application Traffic for Surveillance. Financial Cryptography 2016: 367-384 - 2015
- [c5]Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Díaz:
The Leaking Battery - A Privacy Analysis of the HTML5 Battery Status API. DPM/QASA@ESORICS 2015: 254-263 - [c4]Sören Preibusch, Thomas Peetz, Gunes Acar, Bettina Berendt:
Purchase Details Leaked to PayPal. Financial Cryptography 2015: 217-226 - [i1]Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Díaz:
The leaking battery: A privacy analysis of the HTML5 Battery Status API. IACR Cryptol. ePrint Arch. 2015: 616 (2015) - 2014
- [c3]Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Díaz, Rachel Greenstadt:
A Critical Evaluation of Website Fingerprinting Attacks. CCS 2014: 263-274 - [c2]Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, Claudia Díaz:
The Web Never Forgets: Persistent Tracking Mechanisms in the Wild. CCS 2014: 674-689 - 2013
- [c1]Gunes Acar, Marc Juarez, Nick Nikiforakis, Claudia Díaz, Seda F. Gürses, Frank Piessens, Bart Preneel:
FPDetective: dusting the web for fingerprinters. CCS 2013: 1129-1140
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint