Advertisement

Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education

  • Adil Alsaid
  • David Martin
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2482)

Abstract

This article is a case study in the design, implementation, and deployment of the Bugnosis privacy enhancing tool. Downloaded and installed by over 100,000 users to date, Bugnosis contributes to network privacy indirectly — without any technical protection measures such as filtering or anonymization — by raising awareness about Web bugs and arming users with specific information about current Web site practices.

Keywords

Covert Channel Origin Server User Tracking Dynamically Link Library Document Object Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Alsaid, A., Martin, D.: Bugnosis Web bug detector software (2001) http://www.bugnosis.org/.
  2. 2.
    Smith, R.M.: Web bug search page (1999) http://www.computerbytesman.com/privacy/wbfind.htm.
  3. 3.
    Martin, D., Wu, H., Alsaid, A.: Hidden surveillance by Web sites: Web bugs in contemporary use (2001) http://www.cs.bu.edu/fac/dm/pubs/draft-pt.pdf.
  4. 4.
    WebWasher: Webwasher filtering software (2001) http://www.webwasher.com/.
  5. 5.
    AdExtinguisher: Adextinguisher filtering software (2001) http://adext.magenet.net/.
  6. 6.
    Murray, B.H., Cowart, J.J.: Web bugs: A study of the presence and growth rate of Web bugs on the internet. Technical report, Cyveillance, Inc. (2001) http://www.cyveillance.com/.
  7. 7.
    IDCide Inc.: Privacywall site analyzer software (2001) http://www.idcide.com/.
  8. 8.
    Reinke, T.: Web bug report. Technical report, E-Soft Inc. and SecuritySpace (2001) http://www.securityspace.com/ssurvey/data/man.200110/webbug.html.
  9. 9.
    Kristol, D., Montulli, L.: HTTP state management mechanism. RFC 2965 (2000)Google Scholar
  10. 10.
    Martin, D., Rubin, A., Rajagopalan, S.: Blocking Java applets at the firewall. In: Proceedings of the 1997 Symposium on Network and Distributed System Security, IEEE (1997) 16–26 See also http://www.cs.bu.edu/techreports.
  11. 11.
    Swiderski, F.: WebProxy auditing and editing tool (2002) http://www.atst ake.com/research/tools/index.html#WebProxy.
  12. 12.
    World Wide Web Consortium: Document object model (2001) http://www.w3c.org/DOM/.
  13. 13.
    Microsoft Corp.: Microsoft developer network (2001) http://msdn.microsoft.com/.
  14. 14.
    Network Advertising Initiative: Web bug standards to be developed (2001) http://www.networkadvertising.org/.
  15. 15.
    Roberts, S.: Programming Microsoft Internet Explorer 5. Microsoft Press (1999)Google Scholar
  16. 16.
    Postel Services Inc.: Confirm.to e-mail tracking service (2001) http://www.confirm.to/.
  17. 17.
    ITraceYou.com: Itraceyou e-mail tracking service (2001) http://www.itraceyou.com/.
  18. 18.
    Smith, R.M., Martin, D.M.: E-mail wiretapping (2001) http://www.privacyfoundation.org/privacywatch/report.asp?id=54&action=0.
  19. 19.
    World Wide Web Consortium: Platform for privacy preferences project (2000) http://www.w3c.org/P3P/.

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Adil Alsaid
    • 1
  • David Martin
    • 2
  1. 1.Saudi Arabian Monetary AgencyThe Institute of BankingSaudi Arabia
  2. 2.Computer Science DepartmentBoston UniversityUSA

Personalised recommendations