ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1901.07699
  4. Cited By
The Chain of Implicit Trust: An Analysis of the Web Third-party
  Resources Loading
v1v2 (latest)

The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading

23 January 2019
Muhammad Ikram
Rahat Masood
Gareth Tyson
M. Kâafar
Noha Loizon
Roya Ensafi
    LRM
ArXiv (abs)PDFHTML

Papers citing "The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading"

12 / 12 papers shown
Title
An Empirical Study of JavaScript Inclusion Security Issues in Chrome Extensions
An Empirical Study of JavaScript Inclusion Security Issues in Chrome Extensions
Chong Guan
40
0
0
26 May 2025
Analysis of DNS Dependencies and their Security Implications in
  Australia: A Comparative Study of General and Indigenous Populations
Analysis of DNS Dependencies and their Security Implications in Australia: A Comparative Study of General and Indigenous Populations
Niousha Nazemi
Omid Tavallaie
A. Mandalari
Hamed Haddadi
Ralph Holz
Albert Y. Zomaya
ELM
128
0
0
23 Aug 2024
COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar
COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar
Pouneh Nikkhah Bahrami
Aurore Fass
Zubair Shafiq
152
1
0
08 Jun 2024
An Empirical Assessment of Security and Privacy Risks of Web
  based-Chatbots
An Empirical Assessment of Security and Privacy Risks of Web based-Chatbots
Nazar Waheed
Muhammad Ikram
S. S. Hashmi
Xiangjian He
P. Nanda
SILM
68
7
0
17 May 2022
A Study of Third-party Resources Loading on Web
A Study of Third-party Resources Loading on Web
Muhammad Ikram
Rahat Masood
Gareth Tyson
M. Kâafar
Roya Ensafi
LRM
28
2
0
07 Mar 2022
Jettisoning Junk Messaging in the Era of End-to-End Encryption: A Case
  Study of WhatsApp
Jettisoning Junk Messaging in the Era of End-to-End Encryption: A Case Study of WhatsApp
Pushkal Agarwal
Aravindh Raman
Damilola Ibosiola
Gareth Tyson
Nishanth R. Sastry
Venkata Rama Kiran Garimella
35
3
0
08 Jun 2021
Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based
  Website Fingerprinting
Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting
Nguyen Phong Hoang
Arian Akhavan Niaki
Phillipa Gill
M. Polychronakis
74
26
0
16 Feb 2021
Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph
Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph
Amir Hossein Kargaran
Mohammad Sadegh Akhondzadeh
M. R. Heidarpour
M. Manshaei
Kave Salamatian
Masoud Nejad Sattary
157
1
0
29 Apr 2020
Beyond the Front Page: Measuring Third Party Dynamics in the Field
Beyond the Front Page: Measuring Third Party Dynamics in the Field
Tobias Urban
Martin Degeling
Thorsten Holz
N. Pohlmann
66
67
0
28 Jan 2020
K-resolver: Towards Decentralizing Encrypted DNS Resolution
K-resolver: Towards Decentralizing Encrypted DNS Resolution
Nguyen Phong Hoang
Ivan Lin
Seyedhamed Ghavamnia
M. Polychronakis
44
23
0
24 Jan 2020
A Longitudinal Analysis of Online Ad-Blocking Blacklists
A Longitudinal Analysis of Online Ad-Blocking Blacklists
S. S. Hashmi
Muhammad Ikram
M. Kâafar
MLAU
133
17
0
01 Jun 2019
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet
  Malicious Activity Blacklists
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists
Benjamin Zi Hao Zhao
Muhammad Ikram
Hassan Jameel Asghar
M. Kâafar
Abdelberi Chaabane
Kanchana Thilakarathna
75
23
0
24 Apr 2019
1