Proceedings 2017 Network and Distributed System Security Symposium 2017
DOI: 10.14722/ndss.2017.23152
|View full text |Cite
|
Sign up to set email alerts
|

(Cross-)Browser Fingerprinting via OS and Hardware Level Features

Abstract: In this paper, we propose a browser fingerprinting technique that can track users not only within a single browser but also across different browsers on the same machine. Specifically, our approach utilizes many novel OS and hardware level features, such as those from graphics cards, CPU, and installed writing scripts. We extract these features by asking browsers to perform tasks that rely on corresponding OS and hardware functionalities.Our evaluation shows that our approach can successfully identify 99.24% o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
101
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 133 publications
(101 citation statements)
references
References 16 publications
(24 reference statements)
0
101
0
Order By: Relevance
“…Since then, many studies have been conducted on many different aspects of this tracking technique. As new features are included within web browsers to draw images, render 3D scenes or process sounds, new attributes have been discovered to strengthen the fingerprinting process [5], [7], [9], [10], [18], [19], [20]. Additionally, researchers have performed large crawls of the web that confirm a steady growth of browser fingerprinting [1], [2], [9], [22].…”
Section: Background and Motivationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Since then, many studies have been conducted on many different aspects of this tracking technique. As new features are included within web browsers to draw images, render 3D scenes or process sounds, new attributes have been discovered to strengthen the fingerprinting process [5], [7], [9], [10], [18], [19], [20]. Additionally, researchers have performed large crawls of the web that confirm a steady growth of browser fingerprinting [1], [2], [9], [22].…”
Section: Background and Motivationsmentioning
confidence: 99%
“…He showed that 83.6 % of visitors to the PANOPTICLICK website 1 could be uniquely identified from a fingerprint composed of only 8 attributes. Further studies have focused on studying new attributes that increase browser fingerprint uniqueness [7], [10], [14], [18], [19], [20], while others have shown that websites use browser fingerprinting as a way to regenerate deleted cookies [1].…”
Section: Introductionmentioning
confidence: 99%
“…2) Cross-Browser Fingerprinting method (CBS), based on computer profiling according to the time of various graphical operations execution (per minute) [17];…”
Section: The Experiments Progressmentioning
confidence: 99%
“…First, to ensure that a client browser does not disclose the PoPSiCl that it uses for accessing a tenant server, say tenantA.com, to another server to which tenantA.com refers the client (i.e., in the HTTP Referer field), tenantA.com should set the referrer policy of its referring page to no-referrer or same-origin. 5 Second, to allow referrals to a tenant server, say tenantB.com, without disclosing the server's identity to our attacker, the cloud operator popsicls.com can support hyperlinking to it using a URL such as https://linker.p opsicls.com?tenantB.com/ ..., where linker.popsicl s.com is a cloud-operated server. Upon receiving the TLS connection from the client, linker.popsicls.com can look up the PoPSiCl that this client uses to access tenantB.com (authenticating the client using its client certificate) and then redirect the client browser to that PoPSiCl.…”
Section: Same-origin Policy and Cookiesmentioning
confidence: 99%
“…Though the cloud is trusted in our design, note that today the cloud is already typically trusted with knowing which users frequent a tenant server. Even if the user connects to a tenant server using an anonymizing service such as Tor, the cloud can access any identifying information the user provides to the tenant server, either intentionally (e.g., an email address) or not (e.g., HTTP cookies or browser fingerprints [5,28,29] 1 ). In such cases, our trust in the cloud does not substantially increase the trusted computing base for user privacy.…”
Section: Introductionmentioning
confidence: 99%