Search Results

1 - 10 of 12 items :

  • "browser fingerprint" x
Clear All

, February). FP-Crawlers: Studying the Resilience of Browser Fingerprinting to Block Crawlers. In NDSS Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb’20). [8] 2019. https://www.emarketer.com/content/digital-ad-fraud-2019 [9] Barker S., “Future Digital Advertising, Artificial Intelligence & Advertising Fraud 2019-2023”, Juniper Research, 2019 [10] Eckersley P., How unique is your web browser? in: Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings, 2010, pp. 1–18 [11] Laperdrix, P

References [1] P. Eckersley, “How unique is your web browser?,” in Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings , pp. 1–18, 2010. [2] H. Tillmann, “Browser fingerprinting - tracking ohne spuren zu hinterlassen,” Master’s thesis, 2013. [3] A. Vastel, P. Laperdrix, W. Rudametkin, and R. Rouvoy, “FP-STALKER: Tracking Browser Fingerprint Evolutions,” in 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA , pp. 728–741, 2018. [4] P

-scale deployment. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication , pages 183–196. ACM, 2017. [19] P. Laperdrix, W. Rudametkin, and B. Baudry. Beauty and the beast: Diverting modern web browsers to build unique browser fingerprints. In Security and Privacy (SP), 2016 IEEE Symposium on , pages 878–894. IEEE, 2016. [20] B. Laurie, A. Langley, and E. Kasper. Certificate Transparency. RFC 6962, June 2013. URL https://rfceditor.org/rfc/rfc6962.txt . [21] R. Lychev, S. Jero, A. Boldyreva, and C. Nita-Rotaru. How secure and quick is QUIC

. In Privacy Enhancing Technologies, 14th International Symposium , volume 8555 of Lecture Notes in Computer Science . July 2014. [5] Y. Cao, S. Li, and E. Williams. (cross-)browser fingerprinting via OS and hardware level features. In ISOC Network and Distributed System Security Symposium , Feb. 2017. [6] D. Chaum. The dining cryptographers problem: Unconditional sender and recipient unlinkability. Journal of Cryptology , 1(1), 1988. [7] C. Chen, D. E. Asoni, D. Barrera, G. Danezis, and A. Perrig. Hornet: High-speed onion routing at the network layer. In 22nd

CCS, pages 674-689, 2014. [4] J. P. Achara, G. Acs, and C. Castelluccia. On the unicity of smartphone applications. In Proceedings of WPES, pages 27-36. ACM, 2015. [5] Article 29 Data Protection Working Party. Opinion 05/2014 on anonymization techniques, April 2014. [6] K. Boda, A. M. Földes, G. G. Gulyás, and S. Imre. User tracking on the web via cross-browser fingerprinting. In P. Laud, editor, Information Security Technology for Applications, volume 7161 of LNCS, pages 31-46. 2012. [7] T. Bujlow, V. Carela-Espanol, J. Sole-Pareta, and P. Barlet- Ros. Web tracking

-555, IEEE, 2013. [11] G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz, “The web never forgets: Persistent tracking mechanisms in the wild,” in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS 2014), 2014. [12] K. Boda, Á. M. Földes, G. G. Gulyás, and S. Imre, “User tracking on the web via cross-browser fingerprinting,” in Information Security Technology for Applications, pp. 31-46, Springer, 2012. [13] K. Mowery and H. Shacham, “Pixel perfect: Fingerprinting canvas in html5,” Proceedings of W2SP, 2012. [14] J

Beast: Diverting modern web browsers to build unique browser fingerprints. In Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P) , pages 878–894, 2016. [26] Zang Li, Wenyuan Xu, Rob Miller, and Wade Trappe. Securing Wireless Systems via Lower Layer Enforcements. In Proceedings of the 5th ACM Workshop on Wireless Security (WiSe) , pages 33–42, 2006. [27] Gordon Lyon. Nmap: a free network mapping and security scanning tool. http://nmap.org/ . [28] S.B. Moon, P. Skelly, and D. Towsley. Estimation and removal of clock skew from network delay

] Balachander Krishnamurthy and Craig E Wills. On the leakage of personally identifiable information via online social networks. In Proceedings of the 2nd ACM workshop on Online social networks , pages 7–12. ACM, 2009. [25] Pierre Laperdrix, Walter Rudametkin, and Benoit Baudry. Beauty and the beast: Diverting modern web browsers to build unique browser fingerprints. In 37th IEEE Symposium on Security and Privacy , 2016. [26] Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner. Internet jones and the raiders of the lost trackers: An archaeological

Retargeted Ads. In Proceedings of the 25th USENIX Security Symposium , 2016. [12] Muhammad Ahmad Bashir and Christo Wilson. Diffusion of User Tracking Data in the Online Advertising Ecosystem. In Proceedings on Privacy Enhancing Technologies (PETS 2018) , 2018. [13] Yinzhi Cao, Song Li, and Erik Wijmans. (cross-)browser fingerprinting via os and hardware level features. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, 26 February - 1 March, 2017 , 2017. [14] Symantec categorization service. http

input devices. Information Sciences , 308:72–93, 2015. [18] T. Kohno, A. Broido, and K. C. Claffy. Remote physical device fingerprinting. IEEE Transactions on Dependable and Secure Computing , 2(2):93–108, 2005. [19] A. Kurtz, H. Gascon, T. Becker, K. Rieck, and F. Freiling. Fingerprinting Mobile Devices Using Personalized Configurations. Proceedings on Privacy Enhancing Technologies , 2016(1):4–19, 2016. [20] P. Laperdrix, W. Rudametkin, and B. Baudry. Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints. Proceedings - 2016