features have benefited from Origin Attributes, making
them more easily maintainable and less error prone.
Finally, we have surveyed newly developing fea-
tures that could also leverage Origin Attributes to sim-
plify their implementations in the future.
ACKNOWLEDGEMENTS
Thanks to everyone in Security Engineering at Mozilla
for their feedback, reviews, and provoking discussions.
In particular, thanks to Jonas Sicking, Boris Zbarsky,
Olli Pettay, Dan Veditz, Paul Theriault, Ethan Tseng,
Steven Englehardt, Monica Chew, Richard Barnes, and
Eric Rescorla. Finally, also thank you to the Engineers
Jonathan Hao, Tim Huang, Yoshi Huang, Dave Huseby,
and Ehsan Akhgari.
REFERENCES
Acar, G., Eubank, C., , Englehardt, S., Juarez, M.,
Narayanan, A., and Diaz, C. (2014). The Web never
forgets: Persistent tracking mechanisms in the wild.
In Proceedings of the Conference on Computer and
Communications Security. ACM.
Barth, A. (2011). HTTP State Management Mechanism.
https://tools.ietf.org/html/rfc6265. (checked: October,
2016).
Barth, A., Jackson, C., and Hickson, I. (2009). The Web
Origin Concept. https://tools.ietf.org/html/draft-abarth-
origin-06. (checked: October, 2016).
Datta, A., Carl, M., Tschantz, C., and Datta, A. (2015). Au-
tomated Experiments on Ad Privacy Settings - A Tale
of Opacity, Choice, and Discrimination. In Proceed-
ings on Privacy Enhancing Technologies. USENIX
Association.
Englehardt, S. and Narayanan, A. (2016). Online Track-
ing: A 1-million-site Measurement and Analysis. In
Proceedings of the Conference on Computer and Com-
munications Security. ACM.
Englehardt, S., Reisman, D., Eubank, C., Zimmerman, P.,
Mayer, J., Narayanan, A., and Felten, E. W. (2015).
Cookies That Give You Away: The Surveillance Impli-
cations of Web Tracking. In World Wide Web Confer-
ence. ACM.
Google (2012). Safe Browsing. https://developers.
google.com/safe-browsing/. (checked: October, 2016).
Jackson, C. and Barth, A. (2008). Beware of finer-
grained origins. http://www.adambarth.com/papers/
2008/jackson-barth-b.pdf. (checked: October, 2016).
L
´
ecuyer, M., Ducoffe, G., Lan, F., Papancea, A., Petsios, T.,
Spahn, R., Chaintreau, A., and Geambasu, R. (2014).
XRay: Enhancing the Web’s Transparency with Dif-
ferential Correlation. In Proceedings of the USENIX
Security Symposium. USENIX Association.
Lerner, A., Simpson, A. K., Kohno, T., and Roesner, F.
(2016). Internet Jones and the Raiders of the Lost
Trackers: An Archaeological Study of Web Tracking
from 1996 to 2016. In Proceedings of the USENIX
Security Symposium. USENIX Association.
Libert, T. (2015). Exposing the Hidden Web: An Analysis of
Third-Party HTTP Requests on One Million Websites.
International Journal of Communication.
Mozilla (2009). Private Browsing. https://support.mozilla.
org/en-US/kb/private-browsing-use-firefox-without-
history. (checked: October, 2016).
Mozilla (2016). Firefox Containers. https://wiki.mozilla.org/
Security/Contextual Identity Project/Containers.
(checked: October, 2016).
Perry, M., Clark, E., and Murdoch, S. (2016). Cross-Origin
Identifier Unlinkability. https://www.torproject.
org/projects/torbrowser/design/#identifier-linkability.
(checked: October, 2016).
Stark, E., West, M., and Weinberger, J. (2016). Isolate-
Me. https://wicg.github.io/isolation/explainer.html.
(checked: October, 2016).
Stefan, D., Yang, E. Z., Marchenko, P., Russo, A., Herman,
D., Karp, B., and Mazieres, D. (2014). Protecting users
by confining JavaScript with COWL. In Proceedings of
the USENIX Symposium on Operating Systems Design
and Implementation.
The Tor Project (2012). Tor (anonymity network).
https://www.torproject.org/. (checked: October, 2016).
Tran, M., Dong, X., Liang, Z., and Jiang, X. (2012). Track-
ing the Trackers: Fast and Scalable Dynamic Analysis
of Web Content for Privacy Violations. In Applied
Cryptography and Network Security. Springer.
Weinberger, J. and Akhawe, D. (2016). Suborigins.
https://w3c.github.io/webappsec-suborigins/. (checked:
October, 2016).
Xu, M., Jang, Y., Xing, X., Kim, T., and Lee, W. (2015).
UCognito: Private Browsing Without Tears. In Pro-
ceedings of the Conference on Computer and Commu-
nications Security. ACM.
Yu, Z., Macbeth, S., Modi, K., and Pujol, J. M. (2016).
Tracking the Trackers. In International Conference on
World Wide Web.
Zhao, B. and Liu, P. (2015). Private Browsing Mode Not Re-
ally That Private: Dealing with Privacy Breach Caused
by Browser Extensions. In International Conference
on Dependable Systems and Networks. IEEE.
Extending the Same Origin Policy with Origin Attributes
473