R. Gomer, E. M. Rodrigues, N. Milic-frayling, and M. Schraefel, Network Analysis of Third Party Tracking: User Exposure to Tracking Cookies through Search, 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), 2013.
DOI : 10.1109/WI-IAT.2013.77

J. P. Carrascal, C. Riederer, V. Erramilli, M. Cherubini, and R. De-oliveira, Your browsing behavior for a big mac, Proceedings of the 22nd international conference on World Wide Web, WWW '13, 2013.
DOI : 10.1145/2488388.2488406

. Truste, Behavioral Targeting: Not that Bad?! TRUSTe Survey Shows Decline in Concern for Behavioral Targeting, 2009.

E. W. Felten and M. A. Schneider, Timing attacks on Web privacy, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000.
DOI : 10.1145/352600.352606

C. Jackson, A. Bortz, D. Boneh, and J. C. Mitchell, Protecting browser state from web privacy attacks, Proceedings of the 15th international conference on World Wide Web , WWW '06, 2006.
DOI : 10.1145/1135777.1135884

G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, A Practical Attack to De-anonymize Social Network Users, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.21

C. Jackson, SafeCache: Add-ons for Firefox Available: https://addons.mozilla, 2006.

Y. Jia, X. Dongy, Z. Liang, and P. Saxena, I Know Where You've Been: Geo-Inference Attacks via the Browser Cache, IEEE Internet Computing, vol.19, issue.1, p.p. forthcoming, 2014.
DOI : 10.1109/MIC.2014.103

G. Yan, G. Chen, S. Eidenbenz, and N. Li, Malware propagation in online social networks, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, 2011.
DOI : 10.1145/1966913.1966939

N. Provos, D. Mcnamee, P. Mavrommatis, K. Wang, and N. Modadugu, The Ghost in the Browser: Analysis of Web-based Malware, First Workshop on Hot Topics in Understanding Botnets (HotBots), 2007.

M. Zalewski, Chrome & Opera PoC: rapid history extraction through non-destructive cache timing, 2011.

A. Internet and . Inc, Top Sites in United States, 2014.

. Facebook, Company Info | Facebook Newsroom Available: https, 2014.

J. Bonneau and S. Preibusch, The Privacy Jungle: On the Market for Data Protection in Social Networks, Eighth Workshop on the Economics of Information Security, 2009.

A. Pironti, P. Strub, and K. Bhargavan, Identifying Website Users by TLS Traffic Analysis: New Attacks and Effective Countermeasures, p.2012
URL : https://hal.archives-ouvertes.fr/hal-00732449

S. Chen, R. Wang, X. Wang, and K. Zhang, Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.20

. Datanyze and . Com, CDN market share in the Alexa top 1K Available: http://www.datanyze.com/market-share, 2014.

M. Caching and I. Explorer-ieinternals, Available: http://blogs.msdn.cominternet-explorer-may-bypass- cache-for-cross-domain-https-content, 2010.

M. Knowledge-base, Browser.cache.disk cache ssl, 2014.

G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gürses et al., FPDetective, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013.
DOI : 10.1145/2508859.2516674

M. Holter, KISSmetrics Settles ETags Tracking Class Action Lawsuit Available: http://topclassactions.com/lawsuit- settlements/lawsuit-news/2731-kissmetrics-settles-etags-tracking-class-action-lawsuit, Top Class Actions LLC, 2012.