{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:53:59Z","timestamp":1740102839362,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645709","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T11:08:13Z","timestamp":1715166493000},"page":"1295-1306","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Automating Website Registration for Studying GDPR Compliance"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7419-2784","authenticated-orcid":false,"given":"Karel","family":"Kubicek","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5841-7091","authenticated-orcid":false,"given":"Jakob","family":"Merane","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5549-4568","authenticated-orcid":false,"given":"Ahmed","family":"Bouhoula","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2952-939X","authenticated-orcid":false,"given":"David","family":"Basin","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-022-01096--4"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i8.16826"},{"key":"e_1_3_2_2_3_1","unstructured":"Baden-W\u00fcrttemberg Data Protection Authority (LfDI Baden-W\u00fcrttemberg). 2018. LfDI - O 1018\/115. https:\/\/gdprhub.eu\/index.php?title=LfDI_-_O_1018\/115."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1086\/674424"},{"key":"e_1_3_2_2_5_1","unstructured":"Bayerisches Landesamt f\u00fcr Datenschutzaufsicht. 2022. Guidance from supervisory authorities for the processing of personal data for direct advertising purposes under the General Data Protection Regulation (GDPR) (Orientierungshilfe der Aufsichtsbeh\u00f6rden zur Verarbeitung von personenbezogenen Daten f\u00fcr Zwecke der Direktwerbung unter Geltung der Datenschutz-Grundverordnung (DS-GVO)). https:\/\/www.datenschutzkonferenz-online.de\/media\/oh\/OHWerbung_ Februar%202022_final.pdf"},{"key":"e_1_3_2_2_6_1","volume-title":"Automated Large-Scale Analysis of Cookie Notice Compliance. In 33st USENIX Security Symposium (USENIX Security 24)","author":"Bouhoula Ahmed","year":"2024","unstructured":"Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, and David Basin. 2024. Automated Large-Scale Analysis of Cookie Notice Compliance. In 33st USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA, 17 pages. https:\/\/ahmedbouhoula.github.io\/post\/automated"},{"key":"e_1_3_2_2_7_1","volume-title":"Nan Hua, Nicole Limtiaco, Rhomni St. John, Noah Constant, Mario Guajardo-Cespedes, Steve Yuan, Chris Tar, Yun-Hsuan Sung, Brian Strope, and Ray Kurzweil.","author":"Cer Daniel","year":"2018","unstructured":"Daniel Cer, Yinfei Yang, Sheng yi Kong, Nan Hua, Nicole Limtiaco, Rhomni St. John, Noah Constant, Mario Guajardo-Cespedes, Steve Yuan, Chris Tar, Yun-Hsuan Sung, Brian Strope, and Ray Kurzweil. 2018. Universal Sentence Encoder. arXiv:1803.11175 [cs.CL]"},{"volume-title":"Computer Security","author":"Chatzimpyrros Manolis","key":"e_1_3_2_2_8_1","unstructured":"Manolis Chatzimpyrros, Konstantinos Solomos, and Sotiris Ioannidis. 2019. You Shall Not Register! Detecting Privacy Leaks Across Registration Forms. In Computer Security. Springer, Cham, 91--104."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_2_10_1","unstructured":"CNIL. 2020. GDPR Developer Guide -- Secure your websites applications and servers. https:\/\/lincnil.github.io\/GDPR-Developer-Guide\/#Sheet_n%C2%B06: _Secure_your_websites _applications_and_servers"},{"key":"e_1_3_2_2_11_1","unstructured":"CNN. 2004. AOL worker arrested in spam scheme. https:\/\/money.cnn.com\/2004\/ 06\/23\/technology\/aol_spam\/."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512214"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0119"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417869"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0006"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479521"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00166"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.7970450"},{"key":"e_1_3_2_2_20_1","unstructured":"Information Commissioner's Officer (ICO). 2020. Monetary Penalty on Marriott International Inc. COM0804337. https:\/\/gdprhub.eu\/index.php?title=ICO_-_Monetary_Penalty_on_Marriott_International_Inc.."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/madweb.2020.23008"},{"key":"e_1_3_2_2_22_1","first-page":"1190","article-title":"Lemmagen: Multilingual lemmatisation with induced ripple-down rules","volume":"16","author":"Matjaz","year":"2010","unstructured":"Matjaz Jur?ic, Igor Mozetic, Tomaz Erjavec, and Nada Lavrac. 2010. Lemmagen: Multilingual lemmatisation with induced ripple-down rules. Journal of Universal Computer Science 16, 9 (2010), 1190--1214.","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_2_23_1","unstructured":"Patrice Kast. 2021. Automating website registration for GDPR compliance analysis. Bachelor's thesis. ETH Zurich."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466722"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0046"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_2_27_1","first-page":"3544","article-title":"Exposing the Hidden Web: An Analysis of Third-Party HTTP Requests on One MillionWebsites","volume":"9","author":"Libert Timothy","year":"2015","unstructured":"Timothy Libert. 2015. Exposing the Hidden Web: An Analysis of Third-Party HTTP Requests on One MillionWebsites. International Journal of Communication 9 (2015), 3544--3561.","journal-title":"International Journal of Communication"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0004"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","unstructured":"Luka Lodrant. 2022. Designing a generic web forms crawler to enable legal compliance analysis of authentication sections. Master's thesis. ETH Zurich. https:\/\/doi.org\/10.3929\/ethz-b-000534764","DOI":"10.3929\/ethz-b-000534764"},{"key":"e_1_3_2_2_30_1","unstructured":"Arunesh Mathur AngelinaWang Carsten Schwemmer Maia Hamin Brandon M. Stewart and Arvind Narayanan. 2020. Manipulative tactics are the norm in political emails: Evidence from 100K emails from the 2020 U.S. election cycle. https:\/\/electionemails2020.org."},{"key":"e_1_3_2_2_31_1","unstructured":"David McCandless and Tom Evans. 2022. World's Biggest Data Breaches & Hacks. https:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggestdata-breaches-hacks\/."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0111"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3083897"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561444"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00045"},{"key":"e_1_3_2_2_36_1","volume-title":"Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Senol Asuman","year":"2022","unstructured":"Asuman Senol, Gunes Acar, Mathias Humbert, and Frederik Zuiderveen Borgesius. 2022. Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, USA, 1813--1830. https:\/\/www.usenix.org\/conference\/ usenixsecurity22\/presentation\/senol"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380203"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0076"},{"volume-title":"The Evolution of Third-Party Web Tracking","author":"Wambach Tim","key":"e_1_3_2_2_39_1","unstructured":"Tim Wambach and Katharina Br\u00e4unlich. 2017. The Evolution of Third-Party Web Tracking. In Information Systems Security and Privacy, Olivier Camp, Steven Furnell, and Paolo Mori (Eds.). Springer International Publishing, Cham, 130--147."},{"key":"e_1_3_2_2_40_1","volume-title":"International Conference on Machine Learning","volume":"80","author":"Zhao Junbo","year":"2018","unstructured":"Junbo Zhao, Yoon Kim, Kelly Zhang, Alexander Rush, and Yann LeCun. 2018. Adversarially regularized autoencoders. In International Conference on Machine Learning, Vol. 80. PMLR, Stockholm, Sweden, 5902--5911. https:\/\/proceedings.mlr.press\/v80\/zhao18b.html"},{"key":"e_1_3_2_2_41_1","volume-title":"Generating Natural Adversarial Examples. In International Conference on Learning Representations ICLR. OpenReview.net","author":"Zhao Zhengli","year":"2018","unstructured":"Zhengli Zhao, Dheeru Dua, and Sameer Singh. 2018. Generating Natural Adversarial Examples. In International Conference on Learning Representations ICLR. OpenReview.net, Vancouver, BC, Canada, 16 pages."},{"key":"e_1_3_2_2_42_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Zhou Yuchen","year":"2014","unstructured":"Yuchen Zhou and David Evans. 2014. SSOScan: Automated testing of web applications for Single Sign-On vulnerabilities. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, USA, 495?510."}],"event":{"name":"WWW '24: The ACM Web Conference 2024","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Singapore Singapore","acronym":"WWW '24"},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:03:34Z","timestamp":1725984214000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645709"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":42,"alternative-id":["10.1145\/3589334.3645709","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645709","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}