Pixel Perfect : Fingerprinting Canvas in HTML 5

@inproceedings{Mowery2012PixelP,
  title={Pixel Perfect : Fingerprinting Canvas in HTML 5},
  author={Keaton Mowery and Hovav Shacham},
  year={2012}
}
Tying the browser more closely to operating system functionality and system hardware means that websites have more access to these resources, and that browser behavior varies depending on the behavior of these resources. We propose a new system fingerprint, inspired by the observation above: render text and WebGL scenes to a <canvas> element, then examine the pixels produced. The new fingerprint is consistent, high-entropy, orthogonal to other fingerprints, transparent to the user, and readily… CONTINUE READING

Figures, Tables, and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 134 CITATIONS, ESTIMATED 32% COVERAGE

Towards Mobile Modeling of Knowledge and Business Processes

  • 2016 49th Hawaii International Conference on System Sciences (HICSS)
  • 2016
VIEW 9 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Automated discovery of privacy violations on the web

VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Clock Around the Clock: Time-Based Device Fingerprinting

  • ACM Conference on Computer and Communications Security
  • 2018
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

A Survey on Web Tracking: Mechanisms, Implications, and Defenses

VIEW 10 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Detecting malicious user accounts using Canvas Fingerprint

  • 2017 8th International Conference on Information and Communication Systems (ICICS)
  • 2017
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints

  • 2016 IEEE Symposium on Security and Privacy (SP)
  • 2016
VIEW 7 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

A classification of web browser fingerprinting techniques

  • 2015 7th International Conference on New Technologies, Mobility and Security (NTMS)
  • 2015
VIEW 9 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Fingerprinting Web Users Through Font Metrics

  • Financial Cryptography
  • 2015
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2013
2019

CITATION STATISTICS

  • 19 Highly Influenced Citations

  • Averaged 31 Citations per year over the last 3 years

  • 8% Increase in citations per year in 2018 over 2017

References

Publications referenced by this paper.
SHOWING 1-10 OF 14 REFERENCES

Torbutton design documentation, June 2010. Online: http://www.torproject.org/ torbutton/en/design/index.html.en

M. Perry
  • 2010
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Webgl - a new dimension for browser exploitation

J. Forshaw
  • Online: http://www.contextis.com/resources/blog/webgl/, May
  • 2011
VIEW 2 EXCERPTS

How Unique Is Your Web Browser?

  • Privacy Enhancing Technologies
  • 2010
VIEW 1 EXCERPT

Re: [public WebGL] about the VENDOR, RENDERER, and VERSION strings

B. Jacob
  • Public WebGL mailing list, Nov.
  • 2010

Re: [public WebGL] about the VENDOR, RENDERER, and VERSION strings

S. Baker
  • Public WebGL mailing list, Nov.
  • 2010
VIEW 2 EXCERPTS

Re: [public WebGL] information leakage and the extension regisrty

B. Jacob
  • Public WebGL mailing list, Dec.
  • 2010
VIEW 1 EXCERPT

Similar Papers

Loading similar papers…