
devices that are based in hardware features (e.g., HTML5 Canvas
API or the WebGL API [30]).
8 CONCLUSIONS
Device fingerprinting is an active research topic within web security,
specially web device fingerprinting, in the last years. These methods
can be used for a wide variety of tasks such as user access control,
web tracking or analytics, or targeted attacks.
In this paper, we introduced a time-based device fingerprinting
technique. This fingerprinting technique is generic and can work
with different functions, making the method adaptable to differ-
ent environments. In addition, we introduced a set of properties
to properly assess the functionality of fingerprinting techniques,
filling the gap in current fingerprinting evaluation and proposing a
new homogeneous scenario evaluation procedure.
We built a specific native version of our method, CrytoFP, us-
ing the function for generating random numbers and evaluating it
in a homogeneous scenario with two large sets of machines with
the exact same hardware and software installed, showing that is
capable of distinguishing every machine. Based upon this imple-
mentation, we built an application to web device fingerprinting
using the HTML5 Cryptography API that internally uses the same
native functions that the machine-version, evaluating and com-
paring it with state-of-the-art hardware-level web fingerprinting
techniques. In a homogeneous scenario evaluation CryptoFP was
not as accurate as its native counterpart due to the timing limita-
tions of the JavaScript engine, but still capable of discriminating
several of the identical hardware and software machines, outper-
forming the state-of-the-art methods that were not able to uniquely
identity none of the machines. The heterogeneous in-the-wild eval-
uation shows that the percentage of unique computers identified
by CryptoFP was much higher than any other existing method.
ACKNOWLEDGMENTS
We would like to thank the reviewers for their insightful comments
and our shepherd Yinzhi Cao for his assistance to improve this
paper. This work is partially supported by the Basque Government
under a pre-doctoral grant given to Iskander Sanchez-Rola.
REFERENCES
[1]
M Ayenson, DJ Wambach, A Soltani, N Good, and CJ Hoofnagle. 2011. Flash
cookies and privacy II: Now with HTML5 and Etags respawning (2011). Social
Science Research Network Working Paper Series (2011).
[2]
Suman Banerjee and Vladimir Brik. 2011. Wireless device fingerprinting. In
Encyclopedia of Cryptography and Security. Springer, 1388–1390.
[3]
Duane S Boning and James E Chung. 1996. Statistical metrology: Understanding
spatial variation in semiconductor manufacturing. In Proceedings of the Micro-
electronic Manufacturing. International Society for Optics and Photonics.
[4]
Andrew Bortz and Dan Boneh. 2007. Exposing private information by timing
web applications. In Proceedings of the 16th international conference on World
Wide Web (WWW). ACM, 621–628.
[5]
Keith A Bowman, Steven G Duvall, and James D Meindl. 2002. Impact of die-
to-die and within-die parameter fluctuations on the maximum clock frequency
distribution for gigascale integration. IEEE Journal of solid-state circuits 37, 2
(2002), 183–190.
[6]
Yinzhi Cao, Song Li, and Erik Wijmans. 2017. (Cross-)Browser Fingerprinting via
OS and Hardware Level Features. In Proceedings of the Network and Distributed
System Symposium (NDSS).
[7]
Anupam Das, Nikita Borisov, and Matthew Caesar. 2016. Tracking Mobile Web
Users Through Motion Sensors: Attacks and Defenses.. In Proceedings of the
Network and Distributed System Symposium (NDSS).
[8]
Sanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury, and Srihari
Nelakuditi. 2014. AccelPrint: Imperfections of Accelerometers Make Smartphones
Trackable.. In Proceedings of the Network and Distributed System Symposium
(NDSS).
[9]
Peter Eckersley. 2010. How unique is your web browser?. In Proceedings of the
Privacy Enhancing Technologies (PETS).
[10]
Steven Englehardt and Arvind Narayanan. 2016. Online tracking: A 1-million-site
measurement and analysis. In Proceedings of the 2016 ACM SIGSAC Conference on
Computer and Communications Security. ACM, 1388–1401.
[11]
Edward W Felten and Michael A Schneider. 2000. Timing attacks on web privacy.
In Proceedings of the 7th ACM conference on Computer and Communications
Security (CCS). ACM.
[12]
Russ Fink. 2007. A statistical approach to remote physical device fingerprinting.
In Proceedings of the Military Communications Conference (MILCOM).
[13]
Jason Franklin, Damon McCoy, Parisa Tabriz, Vicentiu Neagoe, Jamie V Randwyk,
and Douglas Sicker. 2006. Passive Data Link Layer 802.11 Wireless Device Driver
Fingerprinting.. In Proceedings of the USENIX Security Symposium (SEC).
[14]
Blaise Gassend, Dwaine Clarke, Marten Van Dijk, and Srinivas Devadas. 2002.
Silicon physical random functions. In Proceedings of the ACM Conference on
Computer and CBommunications Security (CCS).
[15]
GNU/Linux. 2018. Stress, tool to impose load on and stress test systems. https:
//linux.die.net/man/1/stress.
[16]
Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, and Cristiano Giuffrida. 2017.
ASLR on the Line: Practical Cache Attacks on the MMU. In Proceedings of the
Network and Distributed System Symposium (NDSS).
[17]
WebAssembly W3C Community Group. 2018. WebAssembly. http://webassembly.
org/.
[18]
Jun Huang, Wahhab Albazrqaoe, and Guoliang Xing. 2014. Blueid: A practical
system for bluetooth device identification. In INFOCOM, 2014 Proceedings IEEE.
IEEE, 2849–2857.
[19] Clint Huffman. 2014. Windows Performance Analysis Field Guide. Elsevier.
[20]
Suman Jana and Sneha K Kasera. 2010. On fast and accurate detection of unau-
thorized wireless access points using clock skews. IEEE Transactions on Mobile
Computing 9, 3 (2010), 449–462.
[21]
Samy Kamkar. 2018. Evercookie – virtually irrevocable persistent cookies. http:
//samy.pl/evercookie/.
[22]
David Kohlbrenner and Hovav Shacham. 2016. Trusted Browsers for Uncertain
Times. In Proceedings of the USENIX Security Symposium (Sec).
[23]
Tadayoshi Kohno, Andre Broido, and Kimberly C Claffy. 2005. Remote physical
device fingerprinting. IEEE Transactions on Dependable and Secure Computing 2,
2 (2005), 93–108.
[24]
Robert Kotcher, Yutong Pei, Pranjal Jumde, and Collin Jackson. 2013. Cross-origin
pixel stealing: timing attacks using CSS filters. In Proceedings of the 2013 ACM
SIGSAC conference on Computer & communications security. ACM, 1055–1062.
[25]
Fabian Lanze, Andriy Panchenko, Benjamin Braatz, and Thomas Engel. 2014.
Letting the puss in boots sweat: Detecting fake access points using dependency
of clock skews on temperature. In Proceedings of the 9th ACM symposium on
Information, computer and communications security. ACM, 3–14.
[26]
Pierre Laperdrix, Walter Rudametkin, and Benoit Baudry. 2016. Beauty and the
Beast: Diverting modern web browsers to build unique browser fingerprints. In
Proceedings of the IEEE Symposium on Security and Privacy (Oakland).
[27]
Jae W Lee, Daihyun Lim, Blaise Gassend, G Edward Suh, Marten Van Dijk, and
Srinivas Devadas. [n. d.]. A technique to build a secret key in integrated circuits
for identification and authentication applications. In Proceedings of the Symposium
on VLSI Circuits. IEEE.
[28]
Robert Martin, John Demme, and Simha Sethumadhavan. 2012. TimeWarp:
Rethinking timekeeping and performance monitoring mechanisms to mitigate
side-channel attacks. In Proceedings of the Annual International Symposium on
Computer Architecture (ISCA).
[29]
Keaton Mowery, Dillon Bogenreif, Scott Yilek, and Hovav Shacham. 2011. Fin-
gerprinting information in JavaScript implementations. In Proceedings of the Web
2.0 Workshop on Security and Privacy (W2SP).
[30]
Keaton Mowery and Hovav Shacham. 2012. Pixel perfect: Fingerprinting canvas
in HTML5. In Proceedings of the Web 2.0 Workshopon Security and Privacy (W2SP).
[31]
Steven J Murdoch. 2006. Hot or not: Revealing hidden services by their clock
skew. In Proceedings of the 13th ACM conference on Computer and communications
security. ACM, 27–36.
[32]
Sani R Nassif. 2000. Modeling and forecasting of manufacturing variations. In
Proceedings of the International Workshop on Statistical Metrology.
[33]
Ravikanth Pappu, Ben Recht, Jason Taylor, and Neil Gershenfeld. 2002. Physical
one-way functions. Science 297, 5589 (2002), 2026–2030.
[34]
Libor Polčák and Barbora Franková. 2014. On reliability of clock-skew-based
remote computer identification. In Security and Cryptography (SECRYPT), 2014
11th International Conference on. IEEE, 1–8.
[35]
Timothy J Salo. 2007. Multi-Factor Fingerprints for Personal Computer Hardware.
In Proceedings of the Military Communications Conference (MILCOM). IEEE.
[36]
Iskander Sanchez-Rola, Igor Santos, and Davide Balzarotti. 2017. Extension
Breakdown: Security Analysis of Browsers Extension Resources Control Policies.
In Proceedings of the USENIX Security Symposium (Sec).