Online Tracking Technologies and Web Privacy, 2017. ,
, One Leak will sink a Ship: WebRTC IP Address Leaks, International Carnahan Conference on Security Technology (ICCST, pp.1-5, 2017.
Device Fingerprinting for Augmenting Web Authentication: Classification and Analysis of Methods, Annual Conference on Computer Security Applications (ACSAC, pp.289-301, 2016. ,
Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication, Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) (2021), pp.161-172, 2021. ,
URL : https://hal.archives-ouvertes.fr/hal-02611624
A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication, 2020. ,
URL : https://hal.archives-ouvertes.fr/hal-02870826
Large-Scale Analysis of Sophisticated Web Browser Fingerprinting Scripts, 2018. ,
Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection, ACM Workshop on Privacy in the Electronic Society (WPES), pp.37-46, 2016. ,
Fingerprinting for Web Applications: From Devices to Related Groups, IEEE Trustcom/BigDataSE/ISPA, pp.144-151, 2016. ,
User Tracking on the Web via Cross-browser Fingerprinting, Nordic Conference on Information Security Technology for Applications, pp.31-46, 2012. ,
The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords, IEEE Symposium on Security and Privacy (S&P, pp.538-552, 2012. ,
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes, IEEE Symposium on Security and Privacy (S&P, pp.553-567, 2012. ,
Picasso: Lightweight Device Class Fingerprinting for Web Clients, Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pp.93-102, 2016. ,
How Unique is Your Web Browser, International Conference on Privacy Enhancing Technologies (PETS), pp.1-18, 2010. ,
Fingerprinting Web Users Through Font Metrics, Financial Cryptography and Data Security (FC), pp.107-124, 2015. ,
, Fingerprintability of WebRTC, 2016.
Browser Fingerprinting, 2012. ,
Exploring Rate-Limiting on the Web, USENIX Symposium on Usable Privacy and Security (SOUPS), pp.8-12, 2018. ,
Near-Optimal Fingerprinting with Constraints, vol.4, pp.470-487, 2016. ,
Hiding in the Crowd: an Analysis of the Effectiveness of Browser Fingerprinting at Large Scale, The Web Conference (TheWebConf), pp.2018-2022, 2018. ,
, Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis, vol.15, pp.309-320, 2018.
Use your Illusion: Secure Authentication Usable Anywhere, Symposium on Usable Privacy and Security (SOUPS), pp.35-45, 2008. ,
Support Vector Machines, vol.13, pp.18-28, 1998. ,
, Browser Fingerprinting, 2018.
, Speech and Language Processing, 2009.
, Speech and Language Processing, pp.325-326, 2009.
Zero-Permission Mobile Device Identification Based on the Similarity of Browser Fingerprints, International Conference on Computer Science and Technology (CST, 2017. ,
Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting, Network and Distributed System Security Symposium (NDSS, 2020. ,
Knapsack Problems, 2004. ,
An Empirical Evaluation of Web-Based Fingerprinting, vol.32, pp.46-52, 2015. ,
Fingerprinting Mobile Devices Using Personalized Configurations, p.1, 2016. ,
Morellian Analysis for Browsers: Making Web Authentication Stronger With Canvas Fingerprinting, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA, pp.43-66, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02881632
Mitigating Browser Fingerprint Tracking: Multi-level Reconfiguration and Diversification, IEEE/ACM International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS) (2015-05, pp.98-108, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01121108
Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints, IEEE Symposium on Security and Privacy (S&P) (2016-05, pp.878-894, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01285470
Dark Web's Doppelgängers Aim to Dupe Antifraud Systems, vol.63, pp.16-18, 2020. ,
, noPhish -Anti-phishing System using Browser Fingerprinting, 2011.
Anatomy of Account Takeover, In Enigma, 2018. ,
Fingerprinting Information in JavaScript Implementations, Proceedings of W2SP (2011-05), vol.2, 2011. ,
Pixel perfect: Fingerprinting canvas in HTML5, vol.12, 2012. ,
Fast and Reliable Browser Identification with Javascript Engine Fingerprinting, Web 2.0 Workshop on Security and Privacy (W2SP) (2013), vol.5, 2013. ,
Hardware Fingerprinting Using HTML5, 2015. ,
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation, Network and Distributed System Security Symposium (NDSS, pp.2019-2021, 2019. ,
Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption, Giorgos Tsirantonakis, Elias Athanasopoulos, and Sotiris Ioannidis, pp.1-7, 2015. ,
SmartAuth: Dynamic Context Fingerprinting for Continuous User Authentication, Annual ACM Symposium on Applied Computing (SAC), pp.2185-2191, 2015. ,
Long-Term Observation on Browser Fingerprinting: Users' Trackability and Perspective, vol.2020, pp.558-577, 2020. ,
A Web Browser Fingerprinting Method Based on the Web Audio API, 2019. ,
SWAT: Seamless Web Authentication Technology, The Web Conference (TheWebConf, pp.1579-1589, 2019. ,
, RFC 7231 -Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content, 2014.
Estimating CPU Features by Browser Fingerprinting, International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS, pp.587-592, 2016. ,
Web Browser Tampering: Inspecting CPU Features from Side-Channel Information, International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA, 2017. ,
Doing data science: Straight talk from the frontline, pp.181-182, 2014. ,
Discovering Browser Extensions via Web Accessible Resources, ACM Conference on Data and Application Security and Privacy (CODASPY, pp.329-336, 2017. ,
Risk-Based Static Authentication in Web Applications with, 2019. ,
, Behavioral Biometrics and Session Context Analytics. In Applied Cryptography and Network Security Workshops (ACNS), pp.3-23, 2019.
Mobile Device Fingerprinting Considered Harmful for Risk-based Authentication, European Workshop on System Security (EuroSec, vol.6, pp.1-6, 2015. ,
Leveraging Battery Usage from Mobile Devices for Active Authentication, 2017. ,
XHOUND: Quantifying the Fingerprintability of Browser Extensions, IEEE Symposium on Security & Privacy (S&P, pp.941-956, 2017. ,
Combining Features in Browser Fingerprinting, Advances on Broadband and Wireless Computing, pp.671-681, 2018. ,
Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials, In ACM SIGSAC Conference on Computer and Communications Security (CCS, pp.1421-1434, 2017. ,
SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting, International Conference on Availability, Reliability and Security, pp.255-261, 2013. ,
FP-STALKER: Tracking Browser Fingerprint Evolutions, IEEE Symposium on Security and Privacy (S&P), pp.728-741, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01652021
Targeted Online Password Guessing: An Underestimated Threat, ACM SIGSAC Conference on Computer and Communications Security (CCS), pp.1242-1254, 2016. ,
Password Cracking Using Probabilistic Context-Free Grammars, IEEE Symposium on Security and Privacy (S&P) (2009-05). 391-405, 2009. ,
Efficient Fingerprinting-Based Android Device Identification with Zero-Permission Identifiers, vol.4, pp.8073-8083, 2016. ,
The attributes selected by the attribute selection framework for each experimentation setup. We denote the number of explored paths, the number of fingerprint submissions, and the sensitivity threshold ,