
Tahoma, Times, Times New Roman, Times New Roman PS, Tre-
buchet MS, Verdana, Wingdings, Wingdings 2, Wingdings 3
REFERENCES
[1]
2015. Pale Moon browser - Version 25.6.0 adds a canvas poisoning feature. (2015).
https://www.palemoon.org/releasenotes.shtml.
[2]
2017. Fingerprinting protection in Firefox as part of the Tor Uplift Project –
Mozilla Wiki. (2017). https://wiki.mozilla.org/Security/Fingerprinting.
[3]
2017. Fingerprinting Protection Mode – Brave browser. (2017). https:
//github.com/brave/browser-laptop/wiki/Fingerprinting- Protection-Mode.
[4]
2017. Flash & The Future of Interactive Content – Adobe. (2017). https:
//blogs.adobe.com/conversations/2017/07/adobe- ash- update.html.
[5]
2017. Mitigating Browser Fingerprinting in Web Specications – W3C Draft.
(2017). https://w3c.github.io/ngerprinting- guidance/.
[6]
2017. Operating System Market Share Worldwide – StatCounter. (2017). http:
//gs.statcounter.com/os- market-share.
[7]
2017. The Design and Implementation of the Tor Browser [DRAFT] “Cross-
Origin Fingerprinting Unlinkability” – Tor Project Ocial website. (2017). https:
//www.torproject.org/projects/torbrowser/design/#ngerprinting-linkability.
[8]
2017. The state of the blocked web - 2017 Global Adblock Report by Page-
Fair. (2017). https://pagefair
.
com/downloads/2017/01/PageFair-2017- Adblock-
Report.pdf .
[9]
2017. Tor Uplift Project – Mozilla Wiki. (2017). https://wiki
.
mozilla
.
org/Security/
TorUplift.
[10]
Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind
Narayanan, and Claudia Diaz. 2014. The Web Never Forgets: Persistent Tracking
Mechanisms in the Wild. In Proceedings of the 2014 ACM SIGSAC Conference on
Computer and Communications Security (CCS ’14). ACM, New York, NY, USA,
674–689. https://doi.org/10.1145/2660267.2660347
[11]
Gunes Acar, Marc Juarez, Nick Nikiforakis, Claudia Diaz, Seda Gürses, Frank
Piessens, and Bart Preneel. 2013. FPDetective: dusting the web for nger-
printers. In Proceedings of the 2013 ACM SIGSAC Conference on Computer &
Communications Security (CCS ’13). ACM, New York, NY, USA, 1129–1140.
https://doi.org/10.1145/2508859.2516674
[12] Peter Baumann, Stefan Katzenbeisser, Martin Stopczynski, and Erik Tews. 2016.
Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting
Protection. In Proceedings of the 2016 ACM on Workshopon Privacy in the Electronic
Society (WPES ’16). ACM, New York, NY, USA, 37–46. https://doi
.
org/10
.
1145/
2994620.2994621
[13]
Károly Boda, Ádám Máté Földes, Gábor György Gulyás, and Sándor Imre. 2012.
User Tracking on the Web via Cross-Browser Fingerprinting. Lecture Notes in
Computer Science, Vol. 7161. Springer Berlin Heidelberg, Berlin, Heidelberg,
31–46. https://doi.org/10.1007/978- 3-642-29615- 44
[14]
Yinzhi Cao, Song Li, and Erik Wijmans. 2017. (Cross-)Browser Fingerprinting
via OS and Hardware Level Features. In 24nd Annual Network and Distributed
System Security Symposium, NDSS.
[15]
Peter Eckersley. 2010. How Unique is Your Web Browser?. In Proceedings of
the 10th International Conference on Privacy Enhancing Technologies (PETS’10).
Springer-Verlag, Berlin, Heidelberg, 1–18. http://dl
.
acm
.
org/citation
.
cfm?id
=
1881151.1881152
[16]
Steven Englehardt and Arvind Narayanan. 2016. Online Tracking: A 1-million-site
Measurement and Analysis. In Proceedings of the 2016 ACM SIGSAC Conference
on Computer and Communications Security (CCS ’16). ACM, New York, NY, USA,
1388–1401. https://doi.org/10.1145/2976749.2978313
[17]
Amin FaizKhademi, Mohammad Zulkernine, and Komminist Weldemariam. 2015.
FPGuard: Detection and Prevention of Browser Fingerprinting. In Data and
Applications Security and Privacy XXIX. Lecture Notes in Computer Science,
Vol. 9149. Springer International Publishing, 293–308. https://doi
.
org/10
.
1007/
978-3- 319-20810- 721
[18]
David Field and Serge Egelman. 2015. Fingerprinting web users through font
metrics. In Proceedings of the 19th international conference on Financial Cryptog-
raphy and Data Security. Springer-Verlag, Berlin, Heidelberg.
[19]
Ugo Fiore, Aniello Castiglione, Alfredo De Santis, and Francesco Palmieri. 2014.
Countering Browser Fingerprinting Techniques: Constructing a Fake Prole
with Google Chrome. In Network-Based Information Systems (NBiS), 2014 17th
International Conference on. IEEE, 355–360.
[20]
Pierre Laperdrix, Benoit Baudry, and Vikas Mishra. 2017. FPRandom: Randomiz-
ing core browser objects to break advanced device ngerprinting techniques. In
9th International Symposium on Engineering Secure Software and Systems (ESSoS
2017). Bonn, Germany. https://hal .inria.fr/hal- 01527580
[21]
Pierre Laperdrix, Walter Rudametkin, and Benoit Baudry. 2015. Mitigating
browser ngerprint tracking: multi-level reconguration and diversication.
In 10th International Symposium on Software Engineering for Adaptive and Self-
Managing Systems (SEAMS 2015). Firenze, Italy. https://hal
.
inria
.
fr/hal-01121108
[22]
Pierre Laperdrix, Walter Rudametkin, and Benoit Baudry. 2016. Beauty and the
Beast: Diverting modern web browsers to build unique browser ngerprints. In
37th IEEE Symposium on Security and Privacy (S&P 2016). San Jose, United States.
https://hal.inria.fr/hal- 01285470
[23]
Rob McCarney, James Warner, Steve Ilie, Robbert Van Haselen, Mark Grin,
and Peter Fisher. 2007. The Hawthorne Eect: a randomised, controlled trial.
BMC medical research methodology 7, 1 (2007), 30.
[24]
Keaton Mowery, Dillon Bogenreif, Scott Yilek, and Hovav Shacham. 2011. Fin-
gerprinting Information in JavaScript Implementations. In Proceedings of W2SP
2011, Helen Wang (Ed.). IEEE Computer Society.
[25]
Keaton Mowery and Hovav Shacham. 2012. Pixel Perfect: Fingerprinting Canvas
in HTML5. In Proceedings of W2SP 2012, Matt Fredrikson (Ed.). IEEE Computer
Society.
[26]
Martin Mulazzani, Philipp Reschl, Markus Huber, Manuel Leithner, Sebastian
Schrittwieser, Edgar Weippl, and FH Campus Wien. 2013. Fast and reliable
browser identication with javascript engine ngerprinting. In Web 2.0 Workshop
on Security and Privacy (W2SP), Vol. 5.
[27]
Mozilla Developer Network and individual contributors. 2017. Firefox 52 for
developers. (2017). https://developer.mozilla.org/en- US/Firefox/Releases/52
[28]
Nick Nikiforakis, Wouter Joosen, and Benjamin Livshits. 2015. PriVaricator:
Deceiving Fingerprinters with Little White Lies. In Proceedings of the 24th In-
ternational Conference on World Wide Web (WWW ’15). International World
Wide Web Conferences Steering Committee, Republic and Canton of Geneva,
Switzerland, 820–830. https://doi.org/10.1145/2736277.2741090
[29]
Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel,
Frank Piessens, and Giovanni Vigna. 2013. Cookieless Monster: Exploring the
Ecosystem of Web-Based Device Fingerprinting. In Proceedings of the 2013 IEEE
Symposium on Security and Privacy (SP ’13). IEEE Computer Society, Washington,
DC, USA, 541–555. https://doi.org/10.1109/SP.2013 .43
[30]
Łukasz Olejnik, Gunes Acar, Claude Castelluccia, and Claudia Diaz. 2016. The
Leaking Battery. Springer International Publishing, Cham, 254–263. https:
//doi.org/10.1007/978- 3-319-29883- 218
[31]
Lukasz Olejnik, Steven Englehardt, and Arvind Narayanan. 2017. Battery Status
Not Included: Assessing Privacy in Web Standards. In 3rd International Workshop
on Privacy Engineering (IWPE’17). San Jose, United States.
[32]
Iskander Sanchez-Rola, Igor Santos, and Davide Balzarotti. 2017. Extension
Breakdown: Security Analysis of Browsers Extension Resources Control Policies.
In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association,
Vancouver, BC. https://www
.
usenix
.
org/conference/usenixsecurity17/technical-
sessions/presentation/sanchez-rola
[33]
J. Schuh. 2013. Saying Goodbye to Our Old Friend NPAPI. (September 2013). https:
//blog.chromium.org/2013/09/saying- goodbye-to-our- old-friend-npapi.html.
[34]
Alexander Sjösten, Steven Van Acker, and Andrei Sabelfeld. 2017. Discovering
Browser Extensions via Web Accessible Resources. In Proceedings of the Seventh
ACM on Conference on Data and Application Security and Privacy (CODASPY ’17).
ACM, New York, NY, USA, 329–336. https://doi.org/10.1145/3029806.3029820
[35]
Jan Spooren, Davy Preuveneers, and Wouter Joosen. 2015. Mobile Device Finger-
printing Considered Harmful for Risk-based Authentication. In Proceedings of
the Eighth European Workshop on System Security (EuroSec ’15). ACM, New York,
NY, USA, Article 6, 6 pages. https://doi.org/10.1145/2751323.2751329
[36]
Oleksii Starov and Nick Nikiforakis. 2017. XHOUND: Quantifying the Finger-
printability of Browser Extensions. In 38th IEEE Symposium on Security and
Privacy (S&P 2017). San Jose, United States.
[37]
Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. 2018.
FP-STALKER: Tracking Browser Fingerprint Evolutions. In 39th IEEE Symposium
on Security and Privacy (S&P 2018). San Fransisco, United States.
[38]
W. Wu, J. Wu, Y. Wang, Z. Ling, and M. Yang. 2016. Ecient Fingerprinting-Based
Android Device Identication With Zero-Permission Identiers. IEEE Access 4
(2016), 8073–8083. https://doi.org/10.1109/ACCESS.2016.2626395