334 Hits in 7.6 sec

Hiding in the Crowd

Alejandro Gómez-Boix, Pierre Laperdrix, Benoit Baudry
2018 Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18  
With this work, we want to evaluate if browser fingerprinting is still effective at uniquely identifying a large group of users when analyzing millions of fingerprints over a few months.  ...  The key insight is that the percentage of unique fingerprints in this dataset is much lower than what was reported in the past: only 33.6% of fingerprints are unique by opposition to over 80% in previous  ...  ACKNOWLEDGMENT We thank the b<>com Institute of Research and Technology (IRT) for their support and we are particularly grateful to Alexandre Garel for his collaboration in setting up the script on the  ... 
doi:10.1145/3178876.3186097 dblp:conf/www/Gomez-BoixLB18 fatcat:nn4g5of3hjb6jeeq7jsrczxnlu

"Guess Who ?" Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication [article]

Nampoina Andriamilanto, Tristan Allard, Gaëtan Le Guelvouit
2020 arXiv   pre-print
In this work, we assess the adequacy of browser fingerprints as an authentication factor, on a dataset of 4,145,408 fingerprints composed of 216 attributes.  ...  We show that considering a large surface of 216 fingerprinting attributes leads to an 81.8% unicity rate on a population of1,989,365 browsers.  ...  Acknowledgements We want to thank Benot Baudry and David Gross-Amblard for their valuable comments, together with Alexandre Garel for his work on the experiment.  ... 
arXiv:2005.09353v1 fatcat:6vk4b4rwtzbi3kgz6fcie5imwy

Browser Fingerprinting: A survey [article]

Pierre Laperdrix and Nataliia Bielova and Benoit Baudry and Gildas Avoine
2019 arXiv   pre-print
With this paper, we survey the research performed in the domain of browser fingerprinting, while providing an accessible entry point to newcomers in the field.  ...  We analyze the related work in detail to understand the composition of modern fingerprints and see how this technique is currently used online.  ...  We detail here the only three large scale studies performed on the effectiveness of tracking with browser fingerprinting.  ... 
arXiv:1905.01051v2 fatcat:garoieeijnc7hjd46sp3wgwrgu

A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication [article]

Nampoina Andriamilanto, Tristan Allard, Gaëtan Le Guelvouit, Alexandre Garel
2020 arXiv   pre-print
We assess these properties on a large-scale dataset of 4,145,408 fingerprints composed of 216 attributes, and collected from 1,989,365 browsers.  ...  In this paper, we investigate the adequacy of browser fingerprints for web authentication.  ...  Fingerprints collection To study the properties of browser fingerprints on a real-world browser population, we launched an experiment in collaboration with the authors of the Hiding in the Crowd study  ... 
arXiv:2006.09511v1 fatcat:z24bm7lbzbhprbd2gutuxyh4su

Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools

Georg Merzdovnik, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, Edgar Weippl
2017 2017 IEEE European Symposium on Security and Privacy (EuroS&P)  
In this paper, we quantify the effectiveness of thirdparty tracker blockers on a large scale.  ...  Overall, the contributions of this paper advance the field of web privacy by providing not only the largest study to date on the effectiveness of tracker-blocking tools, but also by highlighting the most  ...  Acknowledgements This work has been carried out within the scope of "u'smile", the Josef Ressel Center for User-Friendly Secure  ... 
doi:10.1109/eurosp.2017.26 dblp:conf/eurosp/MerzdovnikHBNNS17 fatcat:p4okv545a5f7zbi5ctfuc5gf3i

Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting

N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, G. Vigna
2013 2013 IEEE Symposium on Security and Privacy  
At the same time, we show how fragile the browser ecosystem is against fingerprinting through the use of novel browseridentifying techniques.  ...  The web has become an essential part of our society and is currently the main medium of information delivery.  ...  The users who install these extensions in an effort to hide themselves in a crowd of popular browsers, install software that actually makes them more visible and more distinguishable from the rest of the  ... 
doi:10.1109/sp.2013.43 dblp:conf/sp/NikiforakisKJKPV13 fatcat:sq4oa6okfrgwvbgl5nlo4clxei


Andrea Bittau, Bernhard Seefeld, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnes
2017 Proceedings of the 26th Symposium on Operating Systems Principles - SOSP '17  
The large-scale monitoring of computer users' software activities has become commonplace, e.g., for application telemetry, error reporting, or demographic profiling.  ...  The ESA design, and its Prochlo implementation, are informed by our practical experiences with an existing, large deployment of privacy-preserving software monitoring. (cont.; see the paper)  ...  Acknowledgments This paper is dedicated to the memory of Andrea Bittau, our colleague who wrote much of PROCHLO. We thank Kunal Talwar for his help analyzing Stash Shuffle's security properties.  ... 
doi:10.1145/3132747.3132769 dblp:conf/sosp/BittauEMMRLRKTS17 fatcat:s5icmqnn6jgznjqhh4fo4fzahm

To Extend or not to Extend: on the Uniqueness of Browser Extensions and Web Logins [article]

Gabor Gyorgy Gulyas, Doliere Francis Some, Nataliia Bielova, Claude Castelluccia
2018 arXiv   pre-print
We use an advanced fingerprinting algorithm and show that it is possible to identify a user in less than 625 milliseconds by selecting the most unique combinations of extensions.  ...  This paper reports on the first large-scale behavioral uniqueness study based on 16,393 users who visited our website.  ...  ACKNOWLEDGMENT First of all, we would like to thank the valuable comments and suggestions of the anonymous reviewers of our paper.  ... 
arXiv:1808.07359v1 fatcat:nt3kylwe75fj5owmviquhhooxu

The Price of Free Illegal Live Streaming Services [article]

Luke Hsiao, Hudson Ayers
2019 arXiv   pre-print
In this paper, we explore the ecosystem of free illegal live streaming services by collecting and examining the behavior of a large corpus of illegal sports streaming websites.  ...  Overall, we find that despite recent improvements in mechanisms for detecting malicious browser extensions, ad-blocking, and browser warnings, users of free illegal live streaming services are still exposed  ...  We would also like to acknowledge the constructive feedback offered by the students of CS356 at Stanford University.  ... 
arXiv:1901.00579v1 fatcat:pzj4gjtifrgfvkkw6p2jzx2upy

Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks

Shui Yu, Guofeng Zhao, Wanchun Dou, Simon James
2012 IEEE Transactions on Information Forensics and Security  
We formulated the traffic analysis attack and defense problem, and defined a metric, cost coefficient of anonymization (CCA), to measure the performance of anonymization.  ...  We thoroughly analyzed the problem with the characteristics of web browsing and concluded that the proposed strategy is better than the current dummy packet padding strategy in theory.  ...  to improve the quality of the paper.  ... 
doi:10.1109/tifs.2012.2197392 fatcat:tuzmk4zumbcmldxw3gigzaqq3e

Hot, Flat, and Crowded: Why We Need a Green Revolution—and How It Can Renew America, by Thomas L. Friedman. New York: Farrar, Straus and Giroux, 2008. Hardcover, 448 pages, $27.95. ISBN-10: 0-374-16685-4

Denis Collins
2010 Business Ethics Quarterly  
In his brilliant, essential new book, Friedman takes a fresh and provocative look at two of the biggest chal lenges we face today: America's surprising loss of focus and national purpose since 9/11; and  ...  In this groundbreaking account of where we stand now, he shows us how the solutions to these two big problems are linked -how we can restore the world and revive America at the same time.  ...  Acknowledgments Index Acknowledgments When I think about what I hoped to accomplish in writing this book, I  ... 
doi:10.5840/beq20102019 fatcat:xiwdmrhqcngk3nxq5shehrrhsy

Managing Potentially Intrusive Practices in the Browser: A User-Centered Perspective

Daniel Smullen, Yaxing Yao, Yuanyuan Feng, Norman Sadeh, Arthur Edelstein, Rebecca Weiss
2021 Proceedings on Privacy Enhancing Technologies  
Browser users encounter a broad array of potentially intrusive practices: from behavioral profiling, to crypto-mining, fingerprinting, and more.  ...  Standardizing these settings in the browser rather than being left to individual websites would have the advantage of providing a uniform interface to support notification, control, and could help mitigate  ...  Analysis occurred in unison, proscribing measures of inter-rater reliability [49] . The qualitative results were used to design a follow-up, large-scale, quantitative survey, as described below.  ... 
doi:10.2478/popets-2021-0082 fatcat:eocy7ldi75fr5ipogqqjjucjli

Towards Understanding First-Party Cookie Tracking in the Field [article]

Nurullah Demir, Daniel Theis, Tobias Urban, Norbert Pohlmann
2022 arXiv   pre-print
Using this data, we show that 76% sites in our dataset effectively utilize such tracking techniques, and in a long-running analysis, we show that the usage of such cookies increased by more than 50% over  ...  ., the recent step of browser vendors to ban all third-party cookies).  ...  Furthermore, we would like to thank Norman Schmidt and Katharina Meyer for their efforts in developing the analysis pipeline.  ... 
arXiv:2202.01498v2 fatcat:uja4bimeondihmzrw5ye7m6ry4

Keeping out the Masses: Understanding the Popularity and Implications of Internet Paywalls [article]

Panagiotis Papadopoulos and Peter Snyder and Dimitrios Athanasakis and Benjamin Livshits
2020 arXiv   pre-print
users interact with sites (e.g. higher bounce rates, less incoming links), (iv) the median cost of an annual paywall access is 108 per site, and (v) paywalls are in general trivial to circumvent.  ...  Finally, we present the design of a novel, automated system for detecting whether a site uses a paywall, through the combination of runtime browser instrumentation and repeated programmatic interactions  ...  and industry. (4) An in-depth, large scale analysis of deployed paywall policies, including subscription costs, how paywall adoption impacts the hosting website, how robust paywalls are to evasion, the  ... 
arXiv:1903.01406v4 fatcat:srnx5iekh5bsxmveocily32mkm

LUNAR: A Practical Anonymous Network Simulation Platform

Xianchun Zheng, Haonan Yan, Rui Wang, Ziwei Zhang, Hui Li, Jinbo Xiong
2022 Security and Communication Networks  
However, when we repeat the existing experiment in an anonymous network, there are many problems such as too old version, low realism, poor operability, and so on.  ...  In this paper, we analyzed the design requirements and topology of the new experimental platform. Two topologies with different levels of complexity are designed.  ...  Reference [27] shows an anonymous network named Crowds. ey use Peersim [28] for Crowds anonymous network simulation. In this kind of network, researchers can conduct anonymous tracking.  ... 
doi:10.1155/2022/5832124 fatcat:ykyd4qpasna7lhvhciuw6twiba
« Previous Showing results 1 — 15 out of 334 results