Corpus ID: 236493454

A Study of Feasibility and Diversity of Web Audio Fingerprints

  title={A Study of Feasibility and Diversity of Web Audio Fingerprints},
  author={Shekhar Chalise and Phani Vadrevu},
Prior measurement studies on browser fingerprinting have unfortunately largely excluded Web Audio API-based fingerprinting in their analysis. We aim to address this issue by conducting the first systematic study of effectiveness of web audio fingerprinting mechanisms. We focus on studying the feasibility (which includes stability and timing aspects) and diversity properties of web audio fingerprinting. Along with 3 known audio fingerprinting vectors, we designed and implemented 4 new audio… Expand


Hiding in the Crowd: an Analysis of the Effectiveness of Browser Fingerprinting at Large Scale
The key insight is that the percentage of unique fingerprints in the dataset is much lower than what was reported in the past: only 33.6% of fingerprints are unique by opposition to over 80% in previous studies. Expand
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors
FP-Inspector, a machine learning based syntactic-semantic approach to accurately detect browser fingerprinting performs well, allowing it to detect 26% more fingerprinting scripts than the state-of-the-art, and an API-level fingerprinting countermeasure is shown to help reduce website breakage. Expand
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting
By analyzing the code of three popular browser-fingerprinting code providers, it is revealed the techniques that allow websites to track users without the need of client-side identifiers and how fragile the browser ecosystem is against fingerprinting through the use of novel browser-identifying techniques. Expand
FPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques
FPRandom is presented, a modified version of Firefox that adds randomness to mitigate the most recent fingerprinting algorithms, namely canvas fingerprinting, AudioContext fingerprinting and the unmasking of browsers through the order of JavaScript properties. Expand
PriVaricator: Deceiving Fingerprinters with Little White Lies
In PriVaricator the power of randomization is used to "break" linkability by exploring a space of parameterized randomization policies, and renders all the fingerprinters tested ineffective, while causing minimal damage on a set of 1000 Alexa sites on which they were tested. Expand
FP-STALKER: Tracking Browser Fingerprint Evolutions
It is shown that browser fingerprints tend to change frequently—from every few hours to days—due to, for example, software updates or configuration changes, yet, despite these frequent changes, it is show thatbrowser fingerprints can still be linked, thus enabling long-term tracking. Expand
The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors
It is found that popular tracking protection lists such as EasyList and Disconnect commonly fail to block most tracking scripts that misuse sensors and even privacy-focused browsers fail to implement mitigations suggested by W3C, which includes limiting sensor access from insecure contexts and cross-origin iframes. Expand
Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints
This work explores the validity of browser fingerprinting in today's environment, and shows that innovations in HTML5 provide access to highly discriminating attributes, notably with the use of the Canvas API which relies on multiple layers of the user's system. Expand
(Cross-)Browser Fingerprinting via OS and Hardware Level Features
This paper proposes a browser fingerprinting technique that can track users not only within a single browser but also across different browsers on the same machine, and can achieve higher uniqueness rate than the only cross-browser approach in the literature with similar stability. Expand
Mitigating Browser Fingerprint Tracking: Multi-level Reconfiguration and Diversification
This work is the first application of software reconfiguration to build a moving target defense against browser fingerprint tracking, and the main objective is to automatically modify the fingerprint a platform exhibits. Expand