Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022
DOI: 10.1145/3548606.3560576
|View full text |Cite
|
Sign up to set email alerts
|

Escaping the Confines of Time

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Additionally, they revealed that about 67% of extensions triggered by mouse or keyboard events could be detected through artificial user actions. Additionally, Solomos et al [45] proposed continuous fingerprinting, a technique capable of capturing transient modifications made by extensions, previously undetectable due to their ephemeral nature. This technique substantially increases the coverage of extensions detectable through their DOM modifications.…”
Section: Extension Detectionmentioning
confidence: 99%
“…Additionally, they revealed that about 67% of extensions triggered by mouse or keyboard events could be detected through artificial user actions. Additionally, Solomos et al [45] proposed continuous fingerprinting, a technique capable of capturing transient modifications made by extensions, previously undetectable due to their ephemeral nature. This technique substantially increases the coverage of extensions detectable through their DOM modifications.…”
Section: Extension Detectionmentioning
confidence: 99%