2017
DOI: 10.1007/978-3-319-62105-0_7
|View full text |Cite
|
Sign up to set email alerts
|

FPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques

Abstract: The rich programming interfaces (APIs) provided by web browsers can be diverted to collect a browser fingerprint. A small number of queries on these interfaces are sufficient to build a fingerprint that is statistically unique and very stable over time. Consequently, the fingerprint can be used to track users. Our work aims at mitigating the risk of browser fingerprinting for users privacy by 'breaking' the stability of a fingerprint over time. We add randomness in the computation of selected browser functions… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

4
5

Authors

Journals

citations
Cited by 43 publications
(48 citation statements)
references
References 10 publications
(12 reference statements)
0
39
0
Order By: Relevance
“…However, it keeps presenting the same limitation as naive spoofers since the modified values are incomplete and can be incoherent. Laperdrix et al explored the randomization of media elements, such as canvas and audio used in fingerprinting, to break fingerprint linkability [12]. They add a slight random noise to canvas and audio, that is not perceived by users, to defeat fingerprinting algorithms.…”
Section: Background and Motivationsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it keeps presenting the same limitation as naive spoofers since the modified values are incomplete and can be incoherent. Laperdrix et al explored the randomization of media elements, such as canvas and audio used in fingerprinting, to break fingerprint linkability [12]. They add a slight random noise to canvas and audio, that is not perceived by users, to defeat fingerprinting algorithms.…”
Section: Background and Motivationsmentioning
confidence: 99%
“…One needs to keep track of these evolutions to link them to previous fingerprints. Recent approaches exploit fingerprint uniqueness as a defense mechanism by adding randomness to break uniqueness [12], [13], [21], but they did not address linkability.…”
Section: Introductionmentioning
confidence: 99%
“…They also block functionality such as Canvas elements [57]. There are also approaches to prevent fingerprinting by adding randomness instead of removing functionality [38]. The aim is always to prevent the creation of unique fingerprints of a browser and thus also user.…”
Section: Introductionmentioning
confidence: 99%
“…Laperdrix et al proposed with FPRandom to exploit browsers' untapped flexibility to introduce randomness [86]. Their goal was to increase non-determinism in browsers to reduce the side-effects that cause fingerprintable behaviours.…”
Section: Increasing Device Diversitymentioning
confidence: 99%