
3. Beltran, V., Bertin, E., Crespi, N.: User identity for webrtc services: A matter of
trust. IEEE Internet Computing 18(6), 18–25 (2014)
4. Bergkvist, A., Burnett, D.C., Jennings, C., Narayanan, A., Aboba, B.: We-
bRTC 1.0: Real-time communication between browsers. https://www.w3.org/TR/
webrtc/ (2016)
5. Blog, A.D.: Changes to device identifiers in android
o. https://android-developers.googleblog.com/2017/04/
changes-to-device-identifiers- in.html (2017)
6. Bojinov, H., Michalevsky, Y., Nakibly, G., Boneh, D.: Mobile device identification
via sensor fingerprinting. arXiv preprint arXiv:1408.1416 (2014)
7. C´aceres, M., Jim´enez Moreno, F., Grigorik, I.: Network information API. http:
//wicg.github.io/netinfo/ (2017)
8. Chandra, S., Lin, Z., Kundu, A., Khan, L.: Towards a systematic study of the
covert channel attacks in smartphones. In: International Conference on Security
and Privacy in Communication Systems. pp. 427–435. Springer (2014)
9. Dey, S., Roy, N., Xu, W., Choudhury, R.R., Nelakuditi, S.: Accelprint: Imperfec-
tions of accelerometers make smartphones trackable. In: Proceedings of the Net-
work and Distributed System Security Symposium (NDSS) (2014)
10. Eckersley, P.: How unique is your web browser? In: International Symposium on
Privacy Enhancing Technologies Symposium. pp. 1–18. Springer (2010)
11. Gasior, W., Yang, L.: Exploring covert channel in android platform. In: Cyber
Security (CyberSecurity), 2012 International Conference on. pp. 173–177. IEEE
(2012)
12. Goodin, D.: Beware of ads that use inaudible sound to link your phone,
tv, tablet, and pc. http://arstechnica.com/tech-policy/2015/11/
beware-of-ads-that- use-inaudible- sound-to-link-your-phone-tv-tablet- and-pc/
(2015)
13. Grace, M.C., Zhou, W., Jiang, X., Sadeghi, A.R.: Unsafe exposure analysis of
mobile in-app advertisements. In: Proceedings of the Fifth ACM Conference on
Security and Privacy in Wireless and Mobile Networks. pp. 101–112. WISEC ’12,
ACM (2012)
14. Kapravelos, A., Grier, C., Chachra, N., Kruegel, C., Vigna, G., Paxson, V.: Hulk:
Eliciting malicious behavior in browser extensions. In: USENIX Security. pp. 641–
654 (2014)
15. Mowery, K., Bogenreif, D., Yilek, S., Shacham, H.: Fingerprinting information in
javascript implementations. Proceedings of W2SP 2, 180–193 (2011)
16. Mowery, K., Shacham, H.: Pixel perfect: Fingerprinting canvas in html5 pp. 1–12
(2012)
17. Popescu, A.: Geolocation api specification 2nd edition. https://www.w3.org/TR/
geolocation-API/ (2016)
18. Rushanan, M., Russell, D., Rubin, A.D.: Malloryworker: Stealthy computation
and covert channels using web workers. In: International Workshop on Security
and Trust Management. pp. 196–211. Springer (2016)
19. Stevens, R., Gibler, C., Crussell, J., Erickson, J., Chen, H.: Investigating user
privacy in android ad libraries. In: Proceedings of the 2012 Workshop on Mobile
Security Technologies (MoST) (2012)
20. Zhou, Z., Diao, W., Liu, X., Zhang, K.: Acoustic fingerprinting revisited: Generate
stable device id stealthily with inaudible sound. In: Proceedings of the 2014 ACM
SIGSAC Conference on Computer and Communications Security. pp. 429–440.
ACM (2014)