Filters








3,130 Hits in 2.5 sec

Browser Fingerprinting: A survey [article]

Pierre Laperdrix and Nataliia Bielova and Benoit Baudry and Gildas Avoine
2019 arXiv   pre-print
With this paper, we survey the research performed in the domain of browser fingerprinting, while providing an accessible entry point to newcomers in the field.  ...  We analyze the related work in detail to understand the composition of modern fingerprints and see how this technique is currently used online.  ...  The aim of this section is to provide a thorough survey of the research conducted in the domain of browser fingerprinting with a summary of current techniques.  ... 
arXiv:1905.01051v2 fatcat:garoieeijnc7hjd46sp3wgwrgu

FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting [article]

Pouneh Nikkhah Bahrami, Umar Iqbal, Zubair Shafiq
2021 arXiv   pre-print
browser fingerprinting techniques.  ...  Browser fingerprinting is a stateless tracking technique that attempts to combine information exposed by multiple different web APIs to create a unique identifier for tracking users across the web.  ...  the ecosystem of web-based device fingerprinting. In 2013 Browser fingerprinting: A survey. ACM Transactions on IEEE Symposium on Security and Privacy, pages 541–555.  ... 
arXiv:2112.01662v2 fatcat:gaaium5lpzboblh3eh2smnlxqq

Long-Term Observation on Browser Fingerprinting: Users' Trackability and Perspective

Gaston Pugliese, Christian Riess, Freya Gassmann, Zinaida Benenson
2020 Proceedings on Privacy Enhancing Technologies  
We present the results of a 3-year online study on browser fingerprinting with more than 1,300 users.  ...  AbstractBrowser fingerprinting as a tracking technique to recognize users based on their browsers' unique features or behavior has been known for more than a decade.  ...  User Survey 2: Impact of Our Study To answer RQ4 about users' perception of browser fingerprinting, applied countermeasures, and impact of our study, we developed a second user study.  ... 
doi:10.2478/popets-2020-0041 fatcat:cvs44jl4sfbevb6hwyvdkq2xru

FPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques [chapter]

Pierre Laperdrix, Benoit Baudry, Vikas Mishra
2017 Lecture Notes in Computer Science  
The rich programming interfaces (APIs) provided by web browsers can be diverted to collect a browser fingerprint.  ...  Our work aims at mitigating the risk of browser fingerprinting for users privacy by 'breaking' the stability of a fingerprint over time.  ...  The link to our survey was communicated through regular channels like social networks and team mailing lists.  ... 
doi:10.1007/978-3-319-62105-0_7 fatcat:n732a6jjvfhfbprvk3isy5bh4i

Device Fingerprinting: Analysis of Chosen Fingerprinting Methods

Anna Kobusińska, Jerzy Brzeziński, Kamil Pawulczuk
2017 Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security  
As a result, the paper provides a noticeable progress in the analysis of fingerprinting solutions.  ...  Device fingerprinting is a modern technique of using available information to distinguish devices.  ...  Depending on the type of used fingerprinting method, such identifier should be called a device, browser or user fingerprint.  ... 
doi:10.5220/0006375701670177 dblp:conf/iotbd/KobusinskaBP17 fatcat:hmgcpp5l2jc2lk2wtq4r6yax54

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets [article]

Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez
2021 arXiv   pre-print
With this goal in mind, a promising research field emerged focusing on creating and managing fingerprints that model the behavior of both the device actions and its components.  ...  The article at hand studies the recent growth of the device behavior fingerprinting field in terms of application scenarios, behavioral sources, and processing and evaluation techniques.  ...  Besides, no previous survey contemplates device behavior fingerprinting for component malfunctioning detection.  ... 
arXiv:2008.03343v2 fatcat:ujj7ka2txvfj7fbawyhloloac4

Fingerprintability of WebRTC [article]

David Fifield, Mia Gil Epner
2016 arXiv   pre-print
We run a fingerprinting script on a day's worth of network traffic in order to quantify WebRTC's prevalence and diversity.  ...  We examine WebRTC's suitability as a means of Internet censorship circumvention. WebRTC is a framework and suite of protocols for peer-to-peer communication between web browsers.  ...  DTLS fingerprinting in a large traffic trace We wrote a DTLS fingerprinting script for Bro [14] .  ... 
arXiv:1605.08805v1 fatcat:4totay4xsve37gfknhowprlugm

Website fingerprinting

Dominik Herrmann, Rolf Wendolsky, Hannes Federrath
2009 Proceedings of the 2009 ACM workshop on Cloud computing security - CCSW '09  
Furthermore, we discuss important real-world issues, namely false alarms and the influence of the browser cache on accuracy.  ...  Our classifier correctly identifies up to 97 % of requests on a sample of 775 sites and over 300,000 real-world traffic dumps recorded over a two-month period.  ...  Furthermore, we present the first comparative survey of the protection offered by a selection of popular PETs against our fingerprinting attack.  ... 
doi:10.1145/1655008.1655013 dblp:conf/ccs/HerrmannWF09 fatcat:jdfexdmx3fbr3i2lzb2b4aiz7y

The web browser factor in traffic analysis attacks

Sami Zhioua
2015 Security and Communication Networks  
Website fingerprinting is a known type of traffic analysis attacks that aims to identify which websites are visited in encrypted traffic traces.  ...  Because most of existing fingerprinting techniques have been evaluated using Firefox web browser, we expect the accuracy results of existing work to be reduced in case Opera or Safari browser is used.  ...  In this paper, we presented a detailed survey on website fingerprinting techniques, which recently reached high accuracy rates (90%) [17] on Tor anonymity system.  ... 
doi:10.1002/sec.1338 fatcat:jcy2odc3ijctpov7vcas63feqe

Survey of existing fingerprint countermeasures

Sakchan Luangmaneerote, Ed Zaluska, Leslie Carr
2016 2016 International Conference on Information Society (i-Society)  
A number of fingerprint countermeasures have claimed that their countermeasures can prevent the user away from fingerprint tracking.  ...  Also, the increasing number of fingerprint attributes are increasing cause of unusual combination inside the Internet browser.  ...  This site had also studied the value of fingerprinting attributes of the web browser while rendering a web page as a real fingerprint website by using font, plugin, canvas and JavaScript object fingerprint  ... 
doi:10.1109/i-society.2016.7854198 fatcat:af2nqw4qire57cmqqnrzij276e

Hardware Fingerprinting Using HTML5 [article]

Gabi Nakibly, Gilad Shelef, Shiran Yudilevich
2015 arXiv   pre-print
We propose several possible fingerprint methods that allow a HTML5 web application to identify a device's hardware. We also present an initial experiment to fingerprint a device's GPU.  ...  Such features are much harder to mask or change thus provide a higher degree of confidence in the fingerprint.  ...  For a comprehensive survey of the features used to fingerprint a device see [1] .  ... 
arXiv:1503.01408v3 fatcat:fqnkfdcyo5clhfxo4fsbfqxtgm

Managing Potentially Intrusive Practices in the Browser: A User-Centered Perspective

Daniel Smullen, Yaxing Yao, Yuanyuan Feng, Norman Sadeh, Arthur Edelstein, Rebecca Weiss
2021 Proceedings on Privacy Enhancing Technologies  
Browser users encounter a broad array of potentially intrusive practices: from behavioral profiling, to crypto-mining, fingerprinting, and more.  ...  Standardizing these settings in the browser rather than being left to individual websites would have the advantage of providing a uniform interface to support notification, control, and could help mitigate  ...  Our survey text specifically pointed out that fingerprinting did not refer to physical fingerprints or biometrics.  ... 
doi:10.2478/popets-2021-0082 fatcat:eocy7ldi75fr5ipogqqjjucjli

SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser

John Vilk, David Molnar, Benjamin Livshits, Eyal Ofek, Chris Rossbach, Alexander Moshchuk, Helen J. Wang, Ran Gal
2015 2015 IEEE Symposium on Security and Privacy  
This paper presents SurroundWeb, the first 3D web browser, which provides the novel functionality of rendering web content onto a room while tackling many of the inherent privacy challenges.  ...  Through user surveys, we validate that these abstractions limit the amount of revealed information to an acceptable degree.  ...  Browser fingerprinting: Browser fingerprinting allows a web page to uniquely identify a user based on the instance of her browser.  ... 
doi:10.1109/sp.2015.33 dblp:conf/sp/VilkMLORMWG15 fatcat:c4jcy7xedjg7vhnuxigzlqzlxa

PrivacyMeter: Designing and Developing a Privacy-Preserving Browser Extension [chapter]

Oleksii Starov, Nick Nikiforakis
2018 Lecture Notes in Computer Science  
To effectively inform users about the privacy consequences of visiting particular websites, we design, implement, and evaluate PrivacyMeter, a browser extension that, on-the-fly, computes a relative privacy  ...  score for any website that a user is visiting.  ...  Chameleon [2] attempts to unify fingerprinting features of the Chrome browser (similar to the Tor Browser), in order to break fingerprintability.  ... 
doi:10.1007/978-3-319-94496-8_6 fatcat:mixyiqh7a5fyjm2pkx6kiar6fe

Browser Feature Usage on the Modern Web

Peter Snyder, Lara Ansari, Cynthia Taylor, Chris Kanich
2016 Proceedings of the 2016 ACM on Internet Measurement Conference - IMC '16  
We further measure other aspects of browser feature usage on the web, including how many features websites use, how the length of time a browser feature has been in the browser relates to its usage on  ...  We also look at how popular ad and tracking blockers change the features used by sites, and identify a set of approximately 10% of features that are disproportionately blocked (prevented from executing  ...  These include browser fingerprinting [16] , JavaScript fingerprinting [37, 40] , Canvas fingerprinting [38] , clock skew fingerprinting [29] , history sniffing [27] , cross origin timing attacks  ... 
doi:10.1145/2987443.2987466 fatcat:4onqcrovnzbb5e6yt2sdjfaroe
« Previous Showing results 1 — 15 out of 3,130 results