User Tracking on the Web via Cross-Browser Fingerprinting

@inproceedings{Boda2011UserTO,
  title={User Tracking on the Web via Cross-Browser Fingerprinting},
  author={K{\'a}roly Boda and {\'A}. F{\"o}ldes and G. Guly{\'a}s and S. Imre},
  booktitle={NordSec},
  year={2011}
}
The techniques of tracking users through their web browsers have greatly evolved since the birth of the World Wide Web, posing an increasingly significant privacy risk. An important branch of these methods, called fingerprinting, is getting more and more attention, because it does not rely on client-side information storage, in contrast to cookie-like techniques. In this paper, we propose a new, browser-independent fingerprinting method. We have tested it on a data set of almost a thousand… Expand
A classification of web browser fingerprinting techniques
TLDR
This paper classify web browser fingerprinting into four main categories: (1) Browser Specific, (2) Canvas, (3) JavaScript Engine, and (4) Cross-browser. Expand
Browser Fingerprinting as user tracking technology
TLDR
This research will study about how the fingerprinting was evolved, its positives and negatives, what threat it poses to users' online privacy and what countermeasures could be used to prevent it. Expand
XHOUND: Quantifying the Fingerprintability of Browser Extensions
TLDR
It is shown that an extension's organic activity in a page's DOM can be used to infer its presence, and XHound, the first fully automated system for fingerprinting browser extensions is developed, is developed. Expand
A Collaborative Strategy for Mitigating Tracking through Browser Fingerprinting
TLDR
This work exploits clustering algorithms to identify the devices that are prone to share the same or similar fingerprints and to provide them with a new non-unique fingerprint, which is then used to automatically assemble and run web browsers through virtualization within a docker container. Expand
Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking
TLDR
C crawled the 10,000 most popular websites to give insights into the number of websites that are using the technique, which websites are collecting fingerprinting information, and exactly what information is being retrieved. Expand
Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking
TLDR
C crawled the 10,000 most popular websites to give insights into the number of websites that are using the technique, which websites are collecting fingerprinting information, and exactly what information is being retrieved. Expand
My Site Knows Where You Are: A Novel Browser Fingerprint to Track User Position
  • Tianqi Wu, Yubo Song, Fan Zhang, Shang Gao, Bin Chen
  • Computer Science
  • ICC 2021 - IEEE International Conference on Communications
  • 2021
TLDR
This research finds a novel method based on localization fingerprints that may still threaten user privacy and implements a multilateration cross-site image resource request scheme to collect link-state information of users and develops a prototype called PingLoc, which is robust against various anti-fingerprint mechanisms. Expand
Inhibiting Browser Fingerprinting and Tracking
  • Sakchan Luangmaneerote, E. Zaluska, L. Carr
  • Computer Science
  • 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS)
  • 2017
TLDR
Using a new browser extension is proposed as the best way to inhibit fingerprinting as it could probably inhibit some of the fingerprinting techniques used and also diminish the side-effects on the user browser experience, compared with existing techniques. Expand
Browser Fingerprinting: Analysis, Detection, and Prevention at Runtime
TLDR
This work first analyzes and reverse engineer the most widely used fingerprinting methods on the Web and unify these methods for developing a hybrid fingerprinting tool, called Fybrid, which is integrated with a similar tool for detecting and preventing fingerprinters. Expand
(Cross-)Browser Fingerprinting via OS and Hardware Level Features
TLDR
This paper proposes a browser fingerprinting technique that can track users not only within a single browser but also across different browsers on the same machine, and can achieve higher uniqueness rate than the only cross-browser approach in the literature with similar stability. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 19 REFERENCES
How Unique Is Your Web Browser?
  • P. Eckersley
  • Computer Science
  • Privacy Enhancing Technologies
  • 2010
TLDR
The degree to which modern web browsers are subject to "device fingerprinting" via the version and configuration information that they will transmit to websites upon request is investigated, and what countermeasures may be appropriate to prevent it is discussed. Expand
Fingerprinting Information in JavaScript Implementations
TLDR
This paper identifies two new avenues for browser fingerprinting, one of which subverts the whitelist mechanism of the popular NoScript Firefox extension, which selectively enables web pages’ scripting privileges to increase privacy by allowing a site to determine if particular domains exist in a user's NoScript whitelist. Expand
Comprehensive Analysis of Web Privacy and Anonymous Web Browsers: Are Next Generation Services Based on Collaborative Filtering?
In general, networking privacy enhancing technolog ies are better on larger user bases such criteria that can be enhan ced by combining them with community based services. In this paper we presentExpand
A Practical Attack to De-anonymize Social Network Users
TLDR
A novel de-anonymization attack is introduced that exploits group membership information that is available on social networking sites and shows that information about the group memberships of a user is sufficient to uniquely identify this person, or to significantly reduce the set of possible candidates. Expand
I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks
TLDR
It is demonstrated that history sniffing remains feasible via interactive techniques which are not covered by the defense of the major browsers, and there is no practical way to defend against them. Expand
Flash Cookies and Privacy
TLDR
It is found that more than 50% of the sites in this sample are using flash cookies to store information about the user, and some are using it to 'respawn' or re-instantiate HTTP cookies deleted by the user. Expand
BlogCrypt: Private Content Publishing on the Web
TLDR
This paper evaluates currently existing solutions for addressing the intrinsic threat that malicious third parties collect and combine information the authors publish about ourselves, then proposes a model of its own for providing access control for a user over information she published and analyses the implementation thereof. Expand
Fingerprinting Information in Java- Script Implementations
  • W2SP 2011: Web 2.0 Security and Privacy 2011 (2011) 5. evercookie – virtually irrevocable persistent cookies
  • 2011
I know where you've been, http://jeremiahgrossman.blogspot.com/2006/08/i-know-where- youve-been.html (retrieved on
  • I know where you've been, http://jeremiahgrossman.blogspot.com/2006/08/i-know-where- youve-been.html (retrieved on
  • 2011
I still know what youvisited last summer
  • Proc. of the 2011 IEEE Symposium on Security and Privacy
  • 2011
...
1
2
...