2,771 Hits in 5.8 sec

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors [article]

Umar Iqbal
2020 arXiv   pre-print
We propose FP-Inspector, a machine learning based syntactic-semantic approach to accurately detect browser fingerprinting.  ...  We show that FP-Inspector performs well, allowing us to detect 26% more fingerprinting scripts than the state-of-the-art.  ...  ACKNOWLEDGEMENTS The authors would like to thank Charlie Wolfe (NSF REU Scholar) for his help with the breakage analysis.  ... 
arXiv:2008.04480v1 fatcat:7za4lootuzdplmza4bo5jxjhl4

Device Fingerprinting: Analysis of Chosen Fingerprinting Methods

Anna Kobusińska, Jerzy Brzeziński, Kamil Pawulczuk
2017 Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security  
As a result, the paper provides a noticeable progress in the analysis of fingerprinting solutions.  ...  Device fingerprinting is a modern technique of using available information to distinguish devices.  ...  Therefore, various timing attacks were invented to detect when browsers are trying to mislead. The battle between browsers and attackers is still in place today, in the name of users privacy.  ... 
doi:10.5220/0006375701670177 dblp:conf/iotbd/KobusinskaBP17 fatcat:hmgcpp5l2jc2lk2wtq4r6yax54

Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView [article]

Abhishek Tiwari, Jyoti Prakash, Alimerdan Rahimov, Christian Hammer
2022 arXiv   pre-print
Numerous studies demonstrated that browser fingerprinting is detrimental to users' security and privacy.  ...  To this end, we instrument the Android framework to record and extract information leveraged for fingerprinting. We study over 20,000 apps, including the most popular apps from the Google play store.  ...  They used the changes in the DOM model introduced by the browsers to detect extensions.  ... 
arXiv:2208.01968v1 fatcat:5lrkqjvn2ray3cn3ni75uvif4i

Robust Website Fingerprinting Through the Cache Occupancy Channel [article]

Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom
2019 arXiv   pre-print
Specifically, we use machine learning techniques to classify traces of cache activity.  ...  We further show that our techniques are resilient both to network-based defenses and to side-channel countermeasures introduced to modern browsers as a response to the Spectre attack.  ...  We would also like to thank Roger Dingledine and our shepherd Rob Jansen for reviewing and commenting on the final version of this paper.  ... 
arXiv:1811.07153v3 fatcat:46xvcm6uive2nlsq5bf76xoqyq

On the Robustness of Mobile Device Fingerprinting

Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, Giorgio Giacinto
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robustness of tracking techniques.  ...  Fingerprinting of web clients is often seen as an offence to web users' privacy as it usually takes place without the users' knowledge, awareness, and consent.  ...  We would like to thank our shepherd Adam Aviv for his support in finalizing this paper and the anonymous reviewers for their constructive and valuable comments.  ... 
doi:10.1145/2818000.2818032 dblp:conf/acsac/HupperichMKHG15 fatcat:svdfsg6ip5brdces6ro2s3ow6q

Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques [article]

Zengrui Liu, Prakash Shrestha, Nitesh Saxena
2021 arXiv   pre-print
We present a simple yet potentially devastating and hard-to-detect threat, called Gummy Browsers, whereby the browser fingerprinting information can be collected and spoofed without the victim's awareness  ...  a wide variety of fingerprinting features to mimic many different browsers (including mobile browsers and the Tor browser).  ...  To learn the identity of an unknown fingerprint ' ', Panopticlick compares with each of the pre-stored fingerprints ' '.  ... 
arXiv:2110.10129v1 fatcat:dwhqf64orjffxpdywdb7wuhusq

Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks [article]

Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright
2020 arXiv   pre-print
A passive local eavesdropper can leverage Website Fingerprinting (WF) to deanonymize the web browsing activity of Tor users.  ...  Then we evaluate the effectiveness of both raw timing and directional timing which is a combination of raw timing and direction in a deep-learning-based WF attack.  ...  We give special thanks to Tao Wang for providing details about the technical implementation of the W-T defense, and to Marc Juarez for providing guidelines on developing the W-T prototype.  ... 
arXiv:1902.06421v4 fatcat:sik2drrqy5g7jmrpuvv7kcg7lu

Mobile device fingerprinting considered harmful for risk-based authentication

Jan Spooren, Davy Preuveneers, Wouter Joosen
2015 Proceedings of the Eighth European Workshop on System Security - EuroSec '15  
Contemporary identity and access management systems frequently leverage browser-based device fingerprints to recognize trusted devices of a certain individual.  ...  We analyzed the variability and the predictability of mobile device fingerprints.  ...  Acknowledgment This research is partially funded by the Research Fund KU Leuven.  ... 
doi:10.1145/2751323.2751329 dblp:conf/eurosec/SpoorenPJ15 fatcat:eo6w76w3rfbdfp43musskurttm

Unveiling Web Fingerprinting in the Wild Via Code Mining and Machine Learning

Valentino Rizzo, Stefano Traverso, Marco Mellia
2021 Proceedings on Privacy Enhancing Technologies  
In this paper, we design, engineer and evaluate a methodology which combines the analysis of JavaScript code and machine learning for the automatic detection of web fingerprinters.We apply our methodology  ...  We compare approaches based on both static and dynamic code analysis to automatically detect fingerprinters and show they provide different angles complementing each other.  ...  This fingerprinting approach detects the device being used, and works independently from the browser in use.  ... 
doi:10.2478/popets-2021-0004 fatcat:mk5egzkvlbcfbit45aqkklscum

Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic

Marcin Gabryel, Konrad Grzanek, Yoichi Hayashi
2020 Journal of Artificial Intelligence and Soft Computing Research  
AbstractWeb-based browser fingerprint (or device fingerprint) is a tool used to identify and track user activity in web traffic.  ...  On the other hand, omitting these unstable values when creating a hash, significantly limits the ability of the fingerprint to distinguish between devices.  ...  behavior analysis.  ... 
doi:10.2478/jaiscr-2020-0016 fatcat:ihnls33fdjgbxijyxditjkezxy

Authorship identification and author fuzzy "fingerprints"

Nuno Homem, Joao Paulo Carvalho
2011 2011 Annual Meeting of the North American Fuzzy Information Processing Society  
The basic idea of identifying a subject based on a set of features left by the subject actions or behavior can be applied to other domains.  ...  It presents an innovative fuzzy fingerprint algorithm based on vector valued fuzzy sets. Words and other stylometric features are used to create the fingerprint.  ...  Fuzzy Fingerprint Detection In order to find the author of an unknown text D, one starts by computing the size-k fingerprint of D, Φ(D).  ... 
doi:10.1109/nafips.2011.5751998 fatcat:ujsue3qz6fcq3hul5d7yzzvb6a

Website fingerprinting in onion routing based anonymization networks

Andriy Panchenko, Lukas Niessen, Andreas Zinnen, Thomas Engel
2011 Proceedings of the 10th annual ACM workshop on Privacy in the electronic society - WPES '11  
For JAP, the detection rate decreases from 80% to 4% and for Tor it drops from 55% to about 3%.  ...  Finally, we show preliminary results of a proof-of-concept implementation that applies camouflage as a countermeasure to hamper the fingerprinting attack.  ...  Acknowledgements Parts of this work have been funded by the National Research Found (FNR) of Luxembourg within the CORE grant project MOVE and by the EU FP7 IP OUTSMART.  ... 
doi:10.1145/2046556.2046570 dblp:conf/wpes/PanchenkoNZE11 fatcat:sximlfo36ff2jdikllfi52m5sq

Linguistic Fingerprints of Internet Censorship: the Case of SinaWeibo [article]

Kei Yin Ng, Anna Feldman, Jing Peng
2020 arXiv   pre-print
The crowdsourcing results suggest that while humans tend to see censored blogposts as more controversial and more likely to trigger action in real life than the uncensored counterparts, they in general  ...  cannot make a better guess than our model when it comes to 'reading the mind' of the censors in deciding whether a blogpost should be censored.  ...  Acknowledgments This work is supported by the National Science Foundation under Grant No.: 1704113, Division of Computer and Networked Systems, Secure and Trustworthy Cyberspace (SaTC).  ... 
arXiv:2001.08845v1 fatcat:ubwshmi4njczvl2nwbaxnrwxgi

Analyzing the Performance of Block-Splitting in LLVM Fingerprinting

William Mahoney, Philip Sigillito, Jeff Smolinski, Todd McDonald, George Grispos
2022 International Conference on Cyber Warfare and Security (ICIW)  
In our previous work, it was noted that "fingerprints are a special case of watermarks, with the difference being that each fingerprint is unique to each copy of a program".  ...  First, the experimental infrastructure has been refined so that the fingerprinting actions take place within the compiler itself as opposed to an external LLVM parser.  ...  The project is a collaborative effort between the University of Nebraska at Omaha (UNO) and the University of South Alabama (USA).  ... 
doi:10.34190/iccws.17.1.39 fatcat:7f5pp2owmnbi3cl2pr4nlsw6bm


Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Thomas Hupperich, Maarten H. Everts, Reza Rafati, Willem Jonker, Pieter Hartel, Andreas Peter
2020 Proceedings of the 35th Annual ACM Symposium on Applied Computing  
Passive application fingerprinting is a technique to detect anomalous outgoing connections.  ...  By monitoring the network traffic, a security monitor passively learns the network characteristics of the applications installed on each machine, and uses them to detect the presence of new applications  ...  HEADPRINT FOR ANOMALY DETECTION The anomaly detection setting works as follows: (1) during a training phase, we passively learn the fingerprints of applications installed on a machine; (2) during testing  ... 
doi:10.1145/3341105.3373862 dblp:conf/sac/BortolameottiEC20 fatcat:kmezjsb5jzbvzok7jf7vwccag4
« Previous Showing results 1 — 15 out of 2,771 results