M. Gunes-can and . Acar, Online Tracking Technologies and Web Privacy, 2017.

, One Leak will sink a Ship: WebRTC IP Address Leaks, International Carnahan Conference on Security Technology (ICCST, pp.1-5, 2017.

F. Alaca and P. C. Van-oorschot, Device Fingerprinting for Augmenting Web Authentication: Classification and Analysis of Methods, Annual Conference on Computer Security Applications (ACSAC, pp.289-301, 2016.

N. Andriamilanto, T. Allard, and G. Guelvouit, Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication, Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) (2021), pp.161-172, 2021.
URL : https://hal.archives-ouvertes.fr/hal-02611624

N. Andriamilanto, T. Allard, G. L. Guelvouit, and A. Garel, A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02870826

M. Ashouri, H. Asadian, and C. Hammer, Large-Scale Analysis of Sophisticated Web Browser Fingerprinting Scripts, 2018.

P. Baumann, S. Katzenbeisser, M. Stopczynski, and E. Tews, Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection, ACM Workshop on Privacy in the Electronic Society (WPES), pp.37-46, 2016.

C. Blakemore, J. Redol, and M. Correia, Fingerprinting for Web Applications: From Devices to Related Groups, IEEE Trustcom/BigDataSE/ISPA, pp.144-151, 2016.

K. Boda, G. Ádám-máté-földes, S. György-gulyás, and . Imre, User Tracking on the Web via Cross-browser Fingerprinting, Nordic Conference on Information Security Technology for Applications, pp.31-46, 2012.

J. Bonneau, The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords, IEEE Symposium on Security and Privacy (S&P, pp.538-552, 2012.

J. Bonneau, C. Herley, P. C. Oorschot, and F. Stajano, The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes, IEEE Symposium on Security and Privacy (S&P, pp.553-567, 2012.

E. Bursztein, A. Malyshev, T. Pietraszek, and K. Thomas, Picasso: Lightweight Device Class Fingerprinting for Web Clients, Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pp.93-102, 2016.

P. Eckersley, How Unique is Your Web Browser, International Conference on Privacy Enhancing Technologies (PETS), pp.1-18, 2010.

D. Fifield and S. Egelman, Fingerprinting Web Users Through Font Metrics, Financial Cryptography and Data Security (FC), pp.107-124, 2015.

D. Fifield and M. G. Epner, Fingerprintability of WebRTC, 2016.

E. Flood and J. Karlsson, Browser Fingerprinting, 2012.

M. Golla, T. Schnitzler, and M. Dürmuth, Exploring Rate-Limiting on the Web, USENIX Symposium on Usable Privacy and Security (SOUPS), pp.8-12, 2018.

G. Gábor-györgy-gulyás, C. Acs, and . Castelluccia, Near-Optimal Fingerprinting with Constraints, vol.4, pp.470-487, 2016.

A. Gómez-boix, P. Laperdrix, and B. Baudry, Hiding in the Crowd: an Analysis of the Effectiveness of Browser Fingerprinting at Large Scale, The Web Conference (TheWebConf), pp.2018-2022, 2018.

W. Han, Z. Li, M. Ni, G. Gu, and W. Xu, Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis, vol.15, pp.309-320, 2018.

E. Hayashi, R. Dhamija, N. Christin, and A. Perrig, Use your Illusion: Secure Authentication Usable Anywhere, Symposium on Usable Privacy and Security (SOUPS), pp.35-45, 2008.

M. A. Hearst, S. T. Dumais, E. Osuna, J. Platt, and B. Scholkopf, Support Vector Machines, vol.13, pp.18-28, 1998.

P. Hra?ka, Browser Fingerprinting, 2018.

D. Jurafsky and J. H. Martin, Speech and Language Processing, 2009.

D. Jurafsky and J. H. Martin, Speech and Language Processing, pp.325-326, 2009.

. Nian-hua, M. Kang, Y. Chen, W. Feng, C. Lin et al., Zero-Permission Mobile Device Identification Based on the Similarity of Browser Fingerprints, International Conference on Computer Science and Technology (CST, 2017.

S. Karami, P. Ilia, K. Solomos, and J. Polakis, Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting, Network and Distributed System Security Symposium (NDSS, 2020.

H. Kellerer, U. Pferschy, and D. Pisinger, Knapsack Problems, 2004.

M. Amin-faiz-khademi, K. Zulkernine, and . Weldemariam, An Empirical Evaluation of Web-Based Fingerprinting, vol.32, pp.46-52, 2015.

A. Kurtz, H. Gascon, T. Becker, K. Rieck, and F. Freiling, Fingerprinting Mobile Devices Using Personalized Configurations, p.1, 2016.

P. Laperdrix, G. Avoine, B. Baudry, and N. Nikiforakis, Morellian Analysis for Browsers: Making Web Authentication Stronger With Canvas Fingerprinting, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA, pp.43-66, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02881632

P. Laperdrix, W. Rudametkin, and B. Baudry, Mitigating Browser Fingerprint Tracking: Multi-level Reconfiguration and Diversification, IEEE/ACM International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS) (2015-05, pp.98-108, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01121108

P. Laperdrix, W. Rudametkin, and B. Baudry, Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints, IEEE Symposium on Security and Privacy (S&P) (2016-05, pp.878-894, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01285470

P. Marks, Dark Web's Doppelgängers Aim to Dupe Antifraud Systems, vol.63, pp.16-18, 2020.

J. Mendes, noPhish -Anti-phishing System using Browser Fingerprinting, 2011.

G. Milka, Anatomy of Account Takeover, In Enigma, 2018.

K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham, Fingerprinting Information in JavaScript Implementations, Proceedings of W2SP (2011-05), vol.2, 2011.

K. Mowery and H. Shacham, Pixel perfect: Fingerprinting canvas in HTML5, vol.12, 2012.

M. Mulazzani, P. Reschl, M. Huber, M. Leithner, S. Schrittwieser et al., Fast and Reliable Browser Identification with Javascript Engine Fingerprinting, Web 2.0 Workshop on Security and Privacy (W2SP) (2013), vol.5, 2013.

G. Nakibly, G. Shelef, and S. Yudilevich, Hardware Fingerprinting Using HTML5, 2015.

P. Papadopoulos, P. Ilia, M. Polychronakis, and E. P. Markatos, Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation, Network and Distributed System Security Symposium (NDSS, pp.2019-2021, 2019.

T. Petsas, Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption, Giorgos Tsirantonakis, Elias Athanasopoulos, and Sotiris Ioannidis, pp.1-7, 2015.

D. Preuveneers and W. Joosen, SmartAuth: Dynamic Context Fingerprinting for Continuous User Authentication, Annual ACM Symposium on Applied Computing (SAC), pp.2185-2191, 2015.

G. Pugliese, C. Riess, F. Gassmann, and Z. Benenson, Long-Term Observation on Browser Fingerprinting: Users' Trackability and Perspective, vol.2020, pp.558-577, 2020.

J. S. Queiroz and E. L. Feitosa, A Web Browser Fingerprinting Method Based on the Web Audio API, 2019.

F. Rochet, K. Efthymiadis, F. Koeune, and O. Pereira, SWAT: Seamless Web Authentication Technology, The Web Conference (TheWebConf, pp.1579-1589, 2019.

F. R. Julian, T. Roy, and . Fielding, RFC 7231 -Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content, 2014.

T. Saito, K. Yasuda, T. Ishikawa, R. Hosoi, K. Takahashi et al., Estimating CPU Features by Browser Fingerprinting, International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS, pp.587-592, 2016.

T. Saito, K. Yasuda, K. Tanabe, and K. Takahashi, Web Browser Tampering: Inspecting CPU Features from Side-Channel Information, International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA, 2017.

R. Schutt and C. Neil, Doing data science: Straight talk from the frontline, pp.181-182, 2014.

A. Sjösten, S. Van-acker, and A. Sabelfeld, Discovering Browser Extensions via Web Accessible Resources, ACM Conference on Data and Application Security and Privacy (CODASPY, pp.329-336, 2017.

J. Solano, L. Camacho, A. Correa, C. Deiro, J. Vargas et al., Risk-Based Static Authentication in Web Applications with, 2019.

, Behavioral Biometrics and Session Context Analytics. In Applied Cryptography and Network Security Workshops (ACNS), pp.3-23, 2019.

J. Spooren, D. Preuveneers, and W. Joosen, Mobile Device Fingerprinting Considered Harmful for Risk-based Authentication, European Workshop on System Security (EuroSec, vol.6, pp.1-6, 2015.

J. Spooren, D. Preuveneers, and W. Joosen, Leveraging Battery Usage from Mobile Devices for Active Authentication, 2017.

O. Starov and N. Nikiforakis, XHOUND: Quantifying the Fingerprintability of Browser Extensions, IEEE Symposium on Security & Privacy (S&P, pp.941-956, 2017.

K. Tanabe, R. Hosoya, and T. Saito, Combining Features in Browser Fingerprinting, Advances on Broadband and Wireless Computing, pp.671-681, 2018.

K. Thomas, F. Li, A. Zand, J. Barrett, J. Ranieri et al., Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials, In ACM SIGSAC Conference on Computer and Communications Security (CCS, pp.1421-1434, 2017.

T. Unger, M. Mulazzani, D. Frühwirt, M. Huber, S. Schrittwieser et al., SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting, International Conference on Availability, Reliability and Security, pp.255-261, 2013.

A. Vastel, P. Laperdrix, W. Rudametkin, and R. Rouvoy, FP-STALKER: Tracking Browser Fingerprint Evolutions, IEEE Symposium on Security and Privacy (S&P), pp.728-741, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01652021

D. Wang, Z. Zhang, P. Wang, J. Yan, and X. Huang, Targeted Online Password Guessing: An Underestimated Threat, ACM SIGSAC Conference on Computer and Communications Security (CCS), pp.1242-1254, 2016.

M. Weir, S. Aggarwal, B. Breno-de-medeiros, and . Glodek, Password Cracking Using Probabilistic Context-Free Grammars, IEEE Symposium on Security and Privacy (S&P) (2009-05). 391-405, 2009.

W. Wu, J. Wu, Y. Wang, Z. Ling, and M. Yang, Efficient Fingerprinting-Based Android Device Identification with Zero-Permission Identifiers, vol.4, pp.8073-8083, 2016.

W. Innerheight-?-?-?-?-?-?-?-?-?-?-?-?-?-?-?-?-?-?-4, The attributes selected by the attribute selection framework for each experimentation setup. We denote the number of explored paths, the number of fingerprint submissions, and the sensitivity threshold