
TABLE V: Statistics of Browser Usage
Single >2>3 Chrome& Chrome&
browser browsers browsers Firefox Microsoft IE/Edge
30% 70% 13% 33% 20%
[16] F. T. Commission. Cross-device tracking. https://www.ftc.gov/news-
events/events-calendar/2015/11/cross-device-tracking.
[17] P. Eckersley, “How unique is your web browser?” in Proceedings of
the 10th International Conference on Privacy Enhancing Technologies,
ser. PETS’10, 2010.
[18] S. Englehardt and A. Narayanan, “Online tracking: A 1-million-site
measurement and analysis,” in Proceedings of the 22Nd ACM SIGSAC
Conference on Computer and Communications Security, ser. CCS ’16,
2016.
[19] A. Etienne and J. Etienne. Classical suzanne monkey from
blender to get your game started with threex.suzanne.
http://learningthreejs.com/blog/2014/05/09/classical-suzanne- monkey-
from-blender-to-get-your-game-started- with-threex- dot-suzanne/.
[20] D. Fifield and S. Egelman, “Fingerprinting web users through font
metrics,” in Financial Cryptography and Data Security. Springer, 2015,
pp. 107–124.
[21] S. Kamkar. Evercookie. http://samy.pl/evercookie/.
[22] B. Krishnamurthy, K. Naryshkin, and C. Wills, “Privacy leakage vs.
protection measures: the growing disconnect,” in Web 2.0 Security and
Privacy Workshop, 2011.
[23] B. Krishnamurthy and C. Wills, “Privacy diffusion on the web: a
longitudinal perspective,” in Proceedings of the 18th international
conference on World wide web. ACM, 2009, pp. 541–550.
[24] B. Krishnamurthy and C. E. Wills, “Generating a privacy footprint on
the internet,” in Proceedings of the 6th ACM SIGCOMM conference on
Internet measurement. ACM, 2006, pp. 65–70.
[25] ——, “Characterizing privacy in online social networks,” in Proceed-
ings of the first workshop on Online social networks. ACM, 2008, pp.
37–42.
[26] P. Laperdrix, W. Rudametkin, and B. Baudry, “Beauty and the beast:
Diverting modern web browsers to build unique browser fingerprints,”
in 37th IEEE Symposium on Security and Privacy (S&P 2016), 2016.
[27] A. Lerner, A. K. Simpson, T. Kohno, and F. Roesner, “Internet jones and
the raiders of the lost trackers: An archaeological study of web tracking
from 1996 to 2016,” in 25th USENIX Security Symposium (USENIX
Security 16), Austin, TX, 2016.
[28] J. R. Mayer and J. C. Mitchell, “Third-party web tracking: Policy and
technology,” in Security and Privacy (SP), 2012 IEEE Symposium on.
IEEE, 2012, pp. 413–427.
[29] W. Meng, B. Lee, X. Xing, and W. Lee, “Trackmeornot: Enabling flex-
ible control on web tracking,” in Proceedings of the 25th International
Conference on World Wide Web, ser. WWW ’16, 2016, pp. 99–109.
[30] H. Metwalley and S. Traverso, “Unsupervised detection of web track-
ers,” in Globecom, 2015.
[31] K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham, “Fingerprinting
information in javascript implementations,” 2011.
[32] K. Mowery and H. Shacham, “Pixel perfect: Fingerprinting canvas in
html5,” 2012.
[33] M. Mulazzani, P. Reschl, M. Huber, M. Leithner, S. Schrittwieser,
E. Weippl, and F. Wien, “Fast and reliable browser identification with
javascript engine fingerprinting,” in W2SP, 2013.
[34] G. Nakibly, G. Shelef, and S. Yudilevich, “Hardware fingerprinting
using html5,” arXiv preprint arXiv:1503.01408, 2015.
[35] N. Nikiforakis, W. Joosen, and B. Livshits, “Privaricator: Deceiving
fingerprinters with little white lies,” in Proceedings of the 24th Inter-
national Conference on World Wide Web, ser. WWW ’15, 2015, pp.
820–830.
[36] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and
G. Vigna, “Cookieless monster: Exploring the ecosystem of web-based
device fingerprinting,” in IEEE Symposium on Security and Privacy,
2013.
[37] X. Pan, Y. Cao, and Y. Chen, “I do not know what you visited
last summer - protecting users from third-party web tracking with
trackingfree browser,” in NDSS, 2015.
[38] M. Perry, E. Clark, and S. Murdoch, “The design and implementation
of the tor browser [draft][online], united states,” 2015.
[39] F. Roesner, T. Kohno, and D. Wetherall, “Detecting and defending
against third-party tracking on the web,” in Proceedings of the 9th
USENIX Conference on Networked Systems Design and Implementa-
tion, ser. NSDI’12, 2012, pp. 12–12.
[40] I. S´
anchez-Rola, X. Ugarte-Pedrero, I. Santos, and P. G. Bringas,
“Tracking users like there is no tomorrow: Privacy on the current
internet,” in International Joint Conference. Springer, 2015, pp. 473–
483.
[41] A. Soltani, S. Canty, Q. Mayo, L. Thomas, and C. J. Hoofnagle,
“Flash cookies and privacy,” in AAAI Spring Symposium: Intelligent
Information Privacy Management, 2010.
[42] US-CERT. Securing your web browser. https://www.us- cert.gov/
publications/securing-your-web-browser.
[43] Wikipedia. Do Not Track Policy. http://en.wikipedia.org/wiki/Do Not
Track Policy.
[44] ——. Privacy Mode. http://en.wikipedia.org/wiki/Privacy mode.
[45] M. Xu, Y. Jang, X. Xing, T. Kim, and W. Lee, “Ucognito: Private
browsing without tears,” in Proceedings of the 22Nd ACM SIGSAC
Conference on Computer and Communications Security, ser. CCS ’15,
2015, pp. 438–449.
[46] T.-F. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi, “Host fingerprinting
and tracking on the web: Privacy and security implications,” in Pro-
ceedings of NDSS, 2012.
APPENDIX A
SURVEY OF PEOPLE’SUSAG E OF MU LTIP LE BROWS ER S
In this appendix, we study the statistics of people who
use multiple browsers on the same machine. Note that this
is a small-scale, separate study from all other designs and
experiments of the paper. We perform the study to strengthen
the motivation of the paper. Our results show that people
do use more than one browser on the same machine with a
considerable amount of time.
Now let us introduce our experiment setup on MicroWork-
ers, a crowdsourcing website. We conduct a survey with an
open question that ask survey takers which browser(s) they
have and normally use as well as how much time in terms of
percentage they spend on each browser. They are free to write
anything into a multiple-line text box.
Here are our experiment results. We have collected 102
answers with one answer just copying our survey link and an-
other mentioning a browser that does not exist. After excluding
these two invalid answers, we have exactly 100 in total. 95%
of the surveyed users have installed more than two browsers
because IE or Edge are installed by default. We further count
the percentage of them using two or more browser regularly,
i.e., they spend at least more than 5% time on one of the
browser.
The results of people using browsers are shown in Table V.
70% of the surveyed takers use two or more browsers regularly,
and only 30% use a single browser. Browser types in the
survey answers include Chrome, Firefox, IE, Edge, Safari,
Coconut Browser, and Maxthon. The results show that people
do use multiple browsers, and cross-browser fingerprinting is
important and necessary.
15