G. Aggrawal, E. Bursztein, C. Jackson, and D. Boneh, An analysis of private browsing modes in modern browsers, Proc. USENIX Security, 2010.

A. Barth, A. Felt, P. Saxena, and A. Boodman, Protecting browsers from extension vulnerabilities, Proc. NDSS, 2010.

S. Bauer, D. Clark, and W. Lehr, Understanding broadband speed measurements. MITAS project white paper, 2010.

Z. S. Bischof, J. S. Otto, M. A. Sánchez, J. P. Rula, D. R. Choffnes et al., Crowdsourcing ISP characterization to the network edge, Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, W-MUST '11, 2011.
DOI : 10.1145/2018602.2018617

M. Butkiewicz, H. V. Madhyastha, and V. Sekar, Understanding website complexity, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, 2011.
DOI : 10.1145/2068816.2068846

K. Chen, D. R. Choffnes, R. Potharaju, Y. Chen, F. E. Bustamante et al., Where the sidewalk ends, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09, 2009.
DOI : 10.1145/1658939.1658964

B. Chun, D. Culler, T. Roscoe, A. Bavier, L. Peterson et al., PlanetLab, ACM SIGCOMM Computer Communication Review, vol.33, issue.3, 2003.
DOI : 10.1145/956993.956995

H. Cui and E. Biersack, Trouble shooting interactive web sessions in a home environment, Proceedings of the 2nd ACM SIGCOMM workshop on Home networks, HomeNets '11, 2011.
DOI : 10.1145/2018567.2018574

L. Dicioccio, R. Teixeira, M. May, and C. Kreibich, Probe and Pray: Using UPnP for Home Network Measurements, Passive and Active Measurement Conference (PAM), 2012.
DOI : 10.1007/978-3-642-28537-0_10

M. Dischinger, M. Marcon, S. Guha, K. P. Gummadi, R. Mahajan et al., Glasnost: Enabling end users to detect traffic differentiation, Proc. USENIX NSDI, 2010.

J. R. Douceur, J. Elson, J. Howell, and J. R. Lorch, Leveraging legacy code to deploy desktop applications on the web [14] dynaTrace Software. Diagnose and prevent AJAX performance issues, Proc. USENIX OSDI, 2008.

P. Eckersley, How Unique Is Your Web Browser?, Proc. Privacy Enhancing Technologies Symposium (PETS), 2010.
DOI : 10.1007/978-3-642-14527-8_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. P. Felt, S. Egelman, M. Finifter, D. Akhawe, and D. Wagner, How to Ask For Permission, Proc. USENIX Workshop on Hot Topics in Security, 2012.

. Fireeye, Zero-day season is not over yet

A. Giammarchi, An introduction to js-ctypes

. Google, Google Maps help forum, pp.24-446

A. Janc, C. Wills, and M. Claypool, Network performance evaluation in a web browser, Proc. IASTED PDCS, 2009.

S. Kambala, Speed metrics in Google Analytics, 2011.

P. Kanuparthy and C. Dovrolis, ShaperProbe, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, 2011.
DOI : 10.1145/2068816.2068860

A. Kingsley-hughes, Flashback Malware Worth Up To $10,000 A Day To Criminals, 2012.

C. Kreibich, N. Weaver, G. Maier, B. Nechaev, and V. Paxson, Experiences from Netalyzr with engaging users in end-system measurement, Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, W-MUST '11, 2011.
DOI : 10.1145/2018602.2018609

C. Kreibich, N. Weaver, B. Nechaev, and V. Paxson, Netalyzr, Proceedings of the 10th annual conference on Internet measurement, IMC '10, 2010.
DOI : 10.1145/1879141.1879173

V. Lam, S. Antonatos, P. Akritidis, and K. Anagnostakis, Puppetnets, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006.
DOI : 10.1145/1180405.1180434

M. Mathis, J. Heffner, P. O. Neil, and P. Siemsen, Pathdiag: Automated TCP Diagnosis, Proc. PAM, 2008.
DOI : 10.1007/978-3-540-79232-1_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

D. Meketa, Policy file changes in Flash Player 9 and Flash Player 10

J. Mickens, Rivet: Browser-agnostic Remote Debugging for Web Applications, Proc. USENIX ATC, pp.30-38, 2012.

. Mitre and . Org, Cve-2012-4681. http://cve.mitre.org/cgibin/cvename .cgi?, pp.2012-4681

. Mozilla and . Perfmeasurement, jsm. https://developer. mozilla.org/en

. Mozilla, Signed Scripts in Mozilla

. Mozilla-developer and . Network, ChromeWorker. https://developer.mozilla.org/en

M. Testpilot, Tab Switch Study

V. N. Padmanabhan, S. Ramabhadran, S. Agarwal, and J. Padhye, A study of end-to-end web access failures, Proceedings of the 2006 ACM CoNEXT conference on , CoNEXT '06, 2006.
DOI : 10.1145/1368436.1368457

P. Papageorge, J. Mccann, and M. Hicks, Passive aggressive measurement with MGRP, Proc. ACM SIGCOMM, 2009.

V. Paxson, End-to-end routing behavior in the Internet, Proc. ACM SIGCOMM, 1996.

M. Perry, Torbutton design documentation. https:// www.torproject.org/torbutton

]. C. Reis, S. Gribble, T. Kohno, and N. Weaver, Detecting in-flight page changes with web tripwires, Proc. USENIX NSDI, pp.31-44, 2008.

Y. Shavitt and E. Shir, DIMES, ACM SIGCOMM Computer Communication Review, vol.35, issue.3, 2005.
DOI : 10.1145/1096536.1096546

J. Sommers and P. Barford, An active measurement system for shared environments, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007.
DOI : 10.1145/1298306.1298348

N. Spring, D. Wetherall, and T. Anderson, Scriptroute: A public Internet measurement facility, Proc. USENIX Symposium on Internet Technologies and Systems, 2003.

J. Ullrich, Javascript DDoS Tool Analysis, 12442.

W. Foundation and . Inc, Netscape Plugin Application Programming Interface

!. Yahoo, . Exceptional-performance, and . Team, This, is boomerang

B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth et al., Native Client, Proc. IEEE S&P, 2009.
DOI : 10.1145/1629175.1629203