SoK: Advances and Open Problems in Web Tracking
- URL: http://arxiv.org/abs/2506.14057v1
- Date: Mon, 16 Jun 2025 23:30:54 GMT
- Title: SoK: Advances and Open Problems in Web Tracking
- Authors: Yash Vekaria, Yohan Beugin, Shaoor Munir, Gunes Acar, Nataliia Bielova, Steven Englehardt, Umar Iqbal, Alexandros Kapravelos, Pierre Laperdrix, Nick Nikiforakis, Jason Polakis, Franziska Roesner, Zubair Shafiq, Sebastian Zimmeck,
- Abstract summary: Web tracking is a pervasive and opaque practice that enables personalized advertising, and conversion tracking.<n>Web tracking is undergoing a once-in-a-generation transformation driven by shifts in the advertising industry, the adoption of anti-tracking countermeasures by browsers, and the growing enforcement of emerging privacy regulations.<n>This Systematization of Knowledge (SoK) aims to consolidate and synthesize this wide-ranging research, offering a comprehensive overview of the technical mechanisms, countermeasures, and regulations that shape the modern and rapidly evolving web tracking landscape.
- Score: 71.54586748169943
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Web tracking is a pervasive and opaque practice that enables personalized advertising, retargeting, and conversion tracking. Over time, it has evolved into a sophisticated and invasive ecosystem, employing increasingly complex techniques to monitor and profile users across the web. The research community has a long track record of analyzing new web tracking techniques, designing and evaluating the effectiveness of countermeasures, and assessing compliance with privacy regulations. Despite a substantial body of work on web tracking, the literature remains fragmented across distinctly scoped studies, making it difficult to identify overarching trends, connect new but related techniques, and identify research gaps in the field. Today, web tracking is undergoing a once-in-a-generation transformation, driven by fundamental shifts in the advertising industry, the adoption of anti-tracking countermeasures by browsers, and the growing enforcement of emerging privacy regulations. This Systematization of Knowledge (SoK) aims to consolidate and synthesize this wide-ranging research, offering a comprehensive overview of the technical mechanisms, countermeasures, and regulations that shape the modern and rapidly evolving web tracking landscape. This SoK also highlights open challenges and outlines directions for future research, aiming to serve as a unified reference and introductory material for researchers, practitioners, and policymakers alike.
Related papers
- From Web Search towards Agentic Deep Research: Incentivizing Search with Reasoning Agents [96.65646344634524]
Large Language Models (LLMs), endowed with reasoning and agentic capabilities, are ushering in a new paradigm termed Agentic Deep Research.<n>We trace the evolution from static web search to interactive, agent-based systems that plan, explore, and learn.<n>We demonstrate that Agentic Deep Research not only significantly outperforms existing approaches, but is also poised to become the dominant paradigm for future information seeking.
arXiv Detail & Related papers (2025-06-23T17:27:19Z) - Modern DDoS Threats and Countermeasures: Insights into Emerging Attacks and Detection Strategies [49.57278643040602]
Distributed Denial of Service (DDoS) attacks persist as significant threats to online services and infrastructure.<n>This paper offers a comprehensive survey of emerging DDoS attacks and detection strategies over the past decade.
arXiv Detail & Related papers (2025-02-27T11:22:25Z) - State-of-the-art AI-based Learning Approaches for Deepfake Generation and Detection, Analyzing Opportunities, Threading through Pros, Cons, and Future Prospects [0.0]
Deepfake technologies are designed to create incredibly lifelike facial imagery and video content.<n>This review paper meticulously investigates the most recent developments in deepfake generation and detection, including around 400 publications.
arXiv Detail & Related papers (2025-01-02T03:19:21Z) - Surveillance Capitalism Revealed: Tracing The Hidden World Of Web Data Collection [0.0]
This study investigates the mechanisms of Surveillance Capitalism, focusing on personal data transfer during web navigation and searching.<n>We present concrete evidence of data harvesting practices and propose strategies for enhancing data protection and transparency.
arXiv Detail & Related papers (2024-12-23T19:55:20Z) - Combining Threat Intelligence with IoT Scanning to Predict Cyber Attack [0.0]
Malicious actors, including hackers and hacktivist groups, often disseminate ideological content and coordinate activities through the "Dark Web"<n>This paper proposes a novel predictive threat intelligence framework designed to systematically collect, analyze, and visualize Dark Web data.
arXiv Detail & Related papers (2024-11-26T23:00:51Z) - WISDOM: An AI-powered framework for emerging research detection using weak signal analysis and advanced topic modeling [1.8434042562191815]
We present an automated artificial intelligence-enabled framework, called WISDOM, for detecting emerging research themes.
WISDOM detects emerging research themes using advanced topic modeling and weak signal analysis.
We assess WISDOM's performance in identifying emerging research as well as their trends, in the field of underwater sensing technologies.
arXiv Detail & Related papers (2024-09-09T18:08:08Z) - Networking Systems for Video Anomaly Detection: A Tutorial and Survey [55.28514053969056]
Video Anomaly Detection (VAD) is a fundamental research task within the Artificial Intelligence (AI) community.<n>With the advancements in deep learning and edge computing, VAD has made significant progress.<n>This article offers an exhaustive tutorial for novices in NSVAD.
arXiv Detail & Related papers (2024-05-16T02:00:44Z) - Machine Learning for Detection and Mitigation of Web Vulnerabilities and
Web Attacks [0.0]
Cross-site scripting (XSS) and cross-site request forgery (CSRF) have been a great concern in the field of web security.
Several ideas have been put forth that can be used to improve the performance of detecting these web vulnerabilities.
Machine learning techniques have lately been used by researchers to defend against XSS and CSRF.
arXiv Detail & Related papers (2023-04-27T18:27:26Z) - Constraint Programming Algorithms for Route Planning Exploiting
Geometrical Information [91.3755431537592]
We present an overview of our current research activities concerning the development of new algorithms for route planning problems.
The research so far has focused in particular on the Euclidean Traveling Salesperson Problem (Euclidean TSP)
The aim is to exploit the results obtained also to other problems of the same category, such as the Euclidean Vehicle Problem (Euclidean VRP), in the future.
arXiv Detail & Related papers (2020-09-22T00:51:45Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.