
8. S. Englehardt and A. Narayanan. Online tracking: A 1-million-site measurement
and analysis. In Proceedings of the 2016 ACM SIGSAC Conference on Computer
and Communications Security, CCS ’16, pages 1388–1401, New York, NY, USA,
2016. ACM.
9. fingerprintjs2, modern and flexible browser fingerprinting library, a successor to
the original fingerprintjs. https://github.com/Valve/fingerprintjs2.
10. Ghostery’s browser extension. https://ghostery.com/our- solutions/
ghostery-browser-extension/.
11. Introducing the JetStream Benchmark Suite. https://webkit.org/blog/3418/
introducing-the-jetstream-benchmark- suite/.
12. JetStream benchmark. http://browserbench.org/JetStream/.
13. P. Laperdrix, W. Rudametkin, and B. Baudry. Mitigating browser fingerprint
tracking: multi-level reconfiguration and diversification. In 10th International Sym-
posium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS
2015), Firenze, Italy, May 2015.
14. P. Laperdrix, W. Rudametkin, and B. Baudry. Beauty and the beast: Diverting
modern web browsers to build unique browser fingerprints. In 37th IEEE Sympo-
sium on Security and Privacy (S&P 2016), 2016.
15. Maxmind’s Device Tracking Add-on for minFraud Services. http://dev.maxmind.
com/minfraud/device/.
16. K. Mowery and H. Shacham. Pixel perfect: Fingerprinting canvas in HTML5. In
M. Fredrikson, editor, Proceedings of W2SP 2012. IEEE Computer Society, May
2012.
17. N. Nikiforakis, W. Joosen, and B. Livshits. Privaricator: Deceiving fingerprinters
with little white lies. In Proceedings of the 24th International Conference on World
Wide Web, pages 820–830. International World Wide Web Conferences Steering
Committee, 2015.
18. N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna.
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting.
In Proc. of the Symp. on Security and Privacy, pages 541–555, 2013.
19. NoScript’s official webpage. https://noscript.net/.
20. L. Olejnik, G. Acar, C. Castelluccia, and C. Daz. The leaking battery: A pri-
vacy analysis of the html5 battery status api. IACR Cryptology ePrint Archive,
2015:616, 2015.
21. L. Olejnik and A. Janc. Stealing sensitive browser data with the
W3C Ambient Light Sensor API. https://blog.lukaszolejnik.com/
stealing-sensitive-browser-data- with-the- w3c-ambient- light-sensor- api/.
22. Wrong order in Object properties interation - V8 bug tracker. https://bugs.
chromium.org/p/v8/issues/detail?id=164.
23. High Resolution Time Level 2 (JavaScript Performance API. https://www.w3.
org/TR/hr-time/#dom-domhighrestimestamp.
24. The Design and Implementation of the Tor Browser - Cross-Origin Fingerprint-
ing Unlinkability. https://www.torproject.org/projects/torbrowser/design/
#fingerprinting-linkability.
25. C. F. Torres, H. Jonker, and S. Mauw. FP-Block: Usable Web Privacy by Control-
ling Browser Fingerprinting, pages 3–19. Springer International Publishing, Cham,
2015.
26. Tor bug tracker - Math routines are OS fingerprintable. https://trac.
torproject.org/projects/tor/ticket/13018.
27. Codepage layout - ISO/IEC 8859-1. https://en.wikipedia.org/wiki/ISO/IEC_
8859-1#Codepage_layout.