7 Hits in 2.8 sec

FP-STALKER: Tracking Browser Fingerprint Evolutions

Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy
2018 2018 IEEE Symposium on Security and Privacy (SP)  
Yet, despite these frequent changes, we show that browser fingerprints can still be linked, thus enabling long-term tracking. FP-STALKER is an approach to link browser fingerprint evolutions.  ...  To evaluate FP-STALKER, we conduct an empirical study using 98, 598 fingerprints we collected from 1, 905 distinct browser instances.  ...  By doing so, FP-STALKER captures the atomic evolutions that occur between two consecutive fingerprints from the same browser instance.  ... 
doi:10.1109/sp.2018.00008 dblp:conf/sp/VastelLRR18 fatcat:esa72hll2rh4rpkwvc2aqfcwom

Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques [article]

Zengrui Liu, Prakash Shrestha, Nitesh Saxena
2021 arXiv   pre-print
tracking of U and when only collecting U's fingerprinting information only once.  ...  a wide variety of fingerprinting features to mimic many different browsers (including mobile browsers and the Tor browser).  ...  These algorithms aim to link browser fingerprint evolutions for tracking the user.  ... 
arXiv:2110.10129v1 fatcat:dwhqf64orjffxpdywdb7wuhusq

Long-Term Observation on Browser Fingerprinting: Users' Trackability and Perspective

Gaston Pugliese, Christian Riess, Freya Gassmann, Zinaida Benenson
2020 Proceedings on Privacy Enhancing Technologies  
AbstractBrowser fingerprinting as a tracking technique to recognize users based on their browsers' unique features or behavior has been known for more than a decade.  ...  We present the results of a 3-year online study on browser fingerprinting with more than 1,300 users.  ...  Do-not-track" as user-triggered evolutions [3] .  ... 
doi:10.2478/popets-2020-0041 fatcat:cvs44jl4sfbevb6hwyvdkq2xru

Browser Fingerprinting: A survey [article]

Pierre Laperdrix and Nataliia Bielova and Benoit Baudry and Gildas Avoine
2019 arXiv   pre-print
With this paper, we survey the research performed in the domain of browser fingerprinting, while providing an accessible entry point to newcomers in the field.  ...  We analyze the related work in detail to understand the composition of modern fingerprints and see how this technique is currently used online.  ...  By collecting a fingerprint every three days, the algorithm behind FP-Stalker was capable of tracking a device for 51.8 days on average.  ... 
arXiv:1905.01051v2 fatcat:garoieeijnc7hjd46sp3wgwrgu

DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting [article]

Tomer Laor
2022 pre-print
In the second scenario, we integrate a one-shot learning version of our technique into a state-of-the-art browser fingerprint tracking algorithm.  ...  DrawnApart makes two contributions to the state of the art in browser fingerprinting.  ...  To track a user, an adversary must link fingerprint evolutions into a single coherent chain.  ... 
doi:10.14722/ndss.2022.24093 arXiv:2201.09956v1 fatcat:rxrjjunlvfgpld7nor33k6c4fy

Web Application Security (Dagstuhl Seminar 18321)

Martin Johns, Nick Nikiforakis, Melanie Volkamer, John Wilander
In this third seminar on the topic, a healthy mix of academics, practitioners and representatives of all major browser vendors reflected on the last decade of web security research and discussed the upcoming  ...  *3 papers: FP-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy (USENIX Sec. 2018) FP-STALKER: Tracking Browser  ...  Fingerprint Evolutions Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy (S&P 2018) Hiding in the Crowd: an Analysis of the Effectiveness of Browser Fingerprinting at Large Scale Alejandro  ... 
doi:10.5445/ir/1000117998 fatcat:fzhobqzrpbap3bt233kexwvxhi

Tales of Favicons and Caches: Persistent Tracking in Modern Browsers

Konstantinos Solomos, John Kristoff, Chris Kanich, Jason Polakis
2021 Proceedings 2021 Network and Distributed System Security Symposium   unpublished
[82] , designed FP-STALKER, a system the monitors the evolution of browser fingerprints across time, and found that the evolution of fingerprints strongly depends on the device's type and utilization  ...  We find that combining our favicon-based tracking technique with immutable browser-fingerprinting attributes that do not change over time allows a website to reconstruct a 32-bit tracking identifier in  ... 
doi:10.14722/ndss.2021.24202 fatcat:jj3hp5hyvvb7zcr5ajds32ir7i