
Browser Fingerprinting: A survey 31
[106]
Lukasz Olejnik, Steven Englehardt, and Arvind Narayanan. 2017. Battery Status Not Included: Assessing Privacy in
Web Standards. In 3rd International Workshop on Privacy Engineering (IWPE’17). San Jose, United States.
[107]
Florentin Rochet, Kyriakos Efthymiadis, François Koeune, and Olivier Pereira. 2019. SWAT: Seamless Web Au-
thentication Technology. In The World Wide Web Conference (WWW ’19). ACM, New York, NY, USA, 1579–1589.
https://doi.org/10.1145/3308558.3313637
[108]
T. Saito, K. Yasuda, T. Ishikawa, R. Hosoi, K. Takahashi, Y. Chen, and M. Zalasiński. 2016. Estimating CPU Features by
Browser Fingerprinting. In 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous
Computing (IMIS). 587–592. https://doi.org/10.1109/IMIS.2016.108
[109]
Takamichi Saito, Koki Yasuda, Kazuhisa Tanabe, and Kazushi Takahashi. 2017. Web Browser Tampering: Inspecting
CPU Features from Side-Channel Information. In 2017 12th International Conference on Broadband and Wireless
Computing, Communication and Applications (BWCCA). 392–403. https://doi.org/10.1007/978- 3-319- 69811-336
[110]
Iskander Sánchez-Rola, Igor Santos, and Davide Balzarotti. 2017. Extension Breakdown: Security Analysis of Browsers
Extension Resources Control Policies. In 26th USENIX Security Symposium. 679–694.
[111]
Iskander Sanchez-Rola, Igor Santos, and Davide Balzarotti. 2018. Clock Around the Clock: Time-Based Device
Fingerprinting. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS
’18). ACM, New York, NY, USA, 1502–1514. https://doi.org/10.1145/3243734.3243796
[112]
J. Schuh. 2013. Saying Goodbye to Our Old Friend NPAPI. https:
//
blog
.
chromium
.
org
/
2013
/
09
/
saying-goodbye- to-
our-old-friend-npapi.html.
[113]
Michael Schwarz, Florian Lackner, and Daniel Gruss. 2019. JavaScript Template Attacks: Automatically Inferring
Host Information for Targeted Exploits. In 26th Annual Network and Distributed System Security Symposium, NDSS
2019, San Diego, California, USA, February 24-27, 2019.https:
//
www
.
ndss-symposium
.
org
/
ndss-paper
/
javascript-
template-attacks-automatically-inferring- host-information- for-targeted-exploits/
[114]
Suphannee Sivakorn, Jason Polakis, and Angelos D Keromytis. 2016. I’m not a human: Breaking the Google re-
CAPTCHA. (2016). https:
//
www
.
blackhat
.
com
/
docs
/
asia-16
/
materials
/
asia-16-Sivakorn-Im- Not-a- Human-
Breaking-the-Google-reCAPTCHA-wp.pdf.
[115]
Alexander Sjösten, Steven Van Acker, Pablo Picazo-Sanchez, and Andrei Sabelfeld. 2019. Latex Gloves: Protecting
Browser Extensions from Probing and Revelation Attacks. In 26th Annual Network and Distributed System Security
Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019.https:
//
www
.
ndss-symposium
.
org
/
ndss-
paper/latex-gloves-protecting-browser-extensions-from-probing-and-revelation-attacks/
[116]
Alexander Sjösten, Steven Van Acker, and Andrei Sabelfeld. 2017. Discovering Browser Extensions via Web Accessible
Resources. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy (CODASPY
’17). ACM, New York, NY, USA, 329–336. https://doi.org/10.1145/3029806.3029820
[117]
Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas, and Chris Jay Hoofnagle. 2010. Flash Cookies and
Privacy. In AAAI spring symposium: intelligent information privacy management, Vol. 2010. 158–163.
[118]
Jan Spooren, Davy Preuveneers, and Wouter Joosen. 2015. Mobile Device Fingerprinting Considered Harmful for
Risk-based Authentication. In Proceedings of the Eighth European Workshop on System Security (EuroSec ’15). ACM,
New York, NY, USA, Article 6, 6 pages. https://doi.org/10.1145/2751323.2751329
[119]
Jan Spooren, Davy Preuveneers, and Wouter Joosen. 2017. Leveraging Battery Usage from Mobile De-
vices for Active Authentication. Mobile Information Systems 2017 (2017), 1367064:1–1367064:14. https:
//doi.org/10.1155/2017/1367064
[120]
Oleksii Starov, Pierre Laperdrix, Alexandros Kapravelos, and Nick Nikiforakis. 2019. Unnecessarily Identifiable:
Quantifying the Fingerprintability of Browser Extensions Due to Bloat. In The World Wide Web Conference (WWW
’19). ACM, New York, NY, USA, 3244–3250. https://doi.org/10.1145/3308558.3313458
[121]
Oleksii Starov and Nick Nikiforakis. 2017. XHOUND: Quantifying the Fingerprintability of Browser Extensions. In
38th IEEE Symposium on Security and Privacy (S&P 2017). San Jose, United States.
[122]
N. Takei, T. Saito, K. Takasu, and T. Yamada. 2015. Web Browser Fingerprinting Using Only Cascading Style Sheets. In
2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA).
57–63. https://doi.org/10.1109/BWCCA.2015.105
[123]
Christof Torres, Hugo Jonker, and Sjouke Mauw. 2015. FP-Block: usable web privacy by controlling browser
fingerprinting. In Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015).
[124]
Erik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, and Adam Doupé. 2019. Every-
one is Different: Client-side Diversification for Defending Against Extension Fingerprinting. In 28th USENIX
Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1679–1696. https:
//www.usenix.org/conference/usenixsecurity19/presentation/trickel
[125]
T. Unger, M. Mulazzani, D. Frühwirt, M. Huber, S. Schrittwieser, and E. Weippl. 2013. SHPF: Enhancing HTTP(S)
Session Security with Browser Fingerprinting. In 2013 International Conference on Availability, Reliability and Security.
255–261. https://doi.org/10.1109/ARES.2013.33
arXiv, Vol. 1, No. 1, Article . Publication date: November 2019.