
CHAPTER 1. RELATED WORK AND THEORY 7
only 3 of them collected from smartphones (1 Android and 2 iPhone devices).
Laperdrix et al. [24] were able to implement detection of all the browser features
from Panopticlick research, add features like canvas fingerprint to their list, and collect
tens of thousands of samples. In their study, they were able to confirm that the list
of fonts and the list of browser plugins - the two features that are the most power-
ful in identifying desktop browsers - are practically unusable for smartphone browser
identification. Conversely, they found that smartphones have very rich and revealing
user-agent strings, and that the canvas fingerprint technique works better on smart-
phones than on desktops in terms of identification. The latter is mainly due to the
diversity of emojis on smartphones, which they included in the canvas fingerprint. 35%
of the 7,416 Android browser fingerprint samples, and 9% out of 5,335 iOS samples
were unique. According to Laperdrix et al., this significant difference is due to the
wealth of Android smartphone models available on the market.
Sensor fingerprinting
A number of studies took advantage of hardware sensors, present on almost every
smartphone, for their identification. Nakibly et al. [26] point out that the emergence
of the HTML5 standard provides an opportunity to identify smartphones using their
hardware properties. Using GPU, camera, microphone, motion sensor, battery, and
GPS information, they were able to develop a fingerprinting technique that yields 5.14
bits of entropy. However, they do not specify how they collected their dataset, and
how big it is. Using a similar approach, but expanding the list of sensors being used,
Bojinov et al. [15] from Stanford University were able to correctly identify 58.7% of the
3,583 devices in their dataset. They estimated that their approach can yield 7.5 bits
of entropy, making it a robust one. Lastly, Jakobsson et al. [21] introduced a notion of
implicit authentication for mobile devices using data such as the typing pattern and
rhythm, location, times active, and voice. They clustered the data they had collected
to explain how it can be used to implicitly authenticate users based on their actions.
All of these studies suggest that the use of hardware information can greatly improve
the accuracy of browser fingerprints. Nevertheless, collecting most, if not all, of this
data requires user consent prior to being able to access them via the web browser. For
example, a user needs to explicitly allow a website to use their GPS data when trying
to determine their location. Because most websites and web applications do not have a
real use for such data, other than for browser fingerprinting purposes, requiring users
to accept prompts to access their hardware sensors is not feasible in the real world.