
[22] Panopticlick. https://panopticlick.eff.org.
[23] Potential uses for the Privacy Sandbox. https://blog.chromium.org/
2019/08/potential-uses- for-privacy-sandbox.html.
[24] Proxy. https://developer.mozilla.org/en-US/docs/Web/JavaScript/
Reference/Global Objects/Proxy.
[25] Puppeteer. https://pptr.dev/.
[26] puppeteer-extra-plugin-stealth. https://github.com/berstend/
puppeteer-extra/tree/master/packages/puppeteer-extra- plugin-
stealth.
[27] regenerator-runtime. https://www.npmjs.com/package/regenerator-
runtime.
[28] Safari Privacy Overview. https://www.apple.com/safari/docs/
Safari White Paper Nov 2019.pdf.
[29] Standard ECMA-262 6th Edition / June 2015. https://www.ecma-
international.org/ecma-262/6.0/.
[30] The Privacy Sandbox. https://www.chromium.org/Home/
chromium-privacy/privacy-sandbox.
[31] Tor. https://www.torproject.org/.
[32] Tracking Preference Expression (DNT). https://www.w3.org/TR/
tracking-dnt/.
[33] Unsanctioned Web Tracking. https://w3ctag.github.io/
unsanctioned-tracking/.
[34] What’s Brave Done For My Privacy Lately? Episode #3: Finger-
print Randomization. https://brave.com/whats- brave-done-for-my-
privacy-lately-episode3/.
[35] window-crypto. https://www.npmjs.com/package/window-crypto.
[36] G. Acar, C. Eubank, S. Englehardt, M. Ju´
arez, A. Narayanan, and
C. D´
ıaz. The Web Never Forgets: Persistent Tracking Mechanisms
in the Wild. In CCS, 2014.
[37] G. Acar, M. Ju´
arez, N. Nikiforakis, C. D´
ıaz, S. F. G¨
urses,
F. Piessens, and B. Preneel. FPDetective: dusting the web for
fingerprinters. In CCS, 2013.
[38] M. Balliu, D. Schoepe, and A. Sabelfeld. We Are Family: Relating
Information-Flow Trackers. In ESORICS, 2017.
[39] F. Besson, N. Bielova, and T. P. Jensen. Browser Randomisation
against Fingerprinting: A Quantitative Information Flow Approach.
In NordSec, 2014.
[40] A. Bichhawat, V. Rajani, D. Garg, and C. Hammer. Information
Flow Control in WebKit’s JavaScript Bytecode. In POST, 2014.
[41] S. Bird, V. Mishra, S. Englehardt, R. Willoughby, D. Zeber,
W. Rudametkin, and M. Lopatka. Actions speak louder than
words: Semi-supervised learning for browser fingerprinting detec-
tion. 2020.
[42] Y. Cao, S. Li, and E. Wijmans. (Cross-)Browser Fingerprinting via
OS and Hardware Level Features. In NDSS, 2017.
[43] C. Cimpanu. Ad Network Uses DGA Algorithm to
Bypass Ad Blockers and Deploy In-Browser Miners. https:
//www.bleepingcomputer.com/news/security/ad-network-uses-dga-
algorithm-to- bypass-ad- blockers-and-deploy- in-browser-miners/.
[44] D. E. Denning and P. J. Denning. Certification of Programs for
Secure Information Flow. 1977.
[45] D. Devriese and F. Piessens. Noninterference through Secure
Multi-execution. In S&P, 2010.
[46] S. Englehardt and A. Narayanan. Online Tracking: A 1-million-site
Measurement and Analysis. In CCS, 2016.
[47] A. FaizKhademi, M. Zulkernine, and K. Weldemariam. FPGuard:
Detection and Prevention of Browser Fingerprinting. In DBSec,
2015.
[48] A. G´
omez-Boix, D. Frey, Y. Bromberg, and B. Baudry. A
Collaborative Strategy for Mitigating Tracking through Browser
Fingerprinting. In MTD@CCS, 2019.
[49] A. G ´
omez-Boix, P. Laperdrix, and B. Baudry. Hiding in the Crowd:
an Analysis of the Effectiveness of Browser Fingerprinting at Large
Scale. In WWW, 2018.
[50] D. Hedin, L. Bello, and A. Sabelfeld. Information-flow security
for JavaScript and its APIs. 2016.
[51] D. Hedin and A. Sabelfeld. A Perspective on Information-Flow
Control. In Software Safety and Security. 2012.
[52] D. Hedin and A. Sabelfeld. Information-Flow Security for a Core
of JavaScript. In CSF, 2012.
[53] U. Iqbal, S. Englehardt, and Z. Shafiq. Fingerprinting the Finger-
printers: Learning to Detect Browser Fingerprinting Behaviors. In
S&P, 2021.
[54] D. Jang, R. Jhala, S. Lerner, and H. Shacham. An empirical
study of privacy-violating information flows in JavaScript web
applications. In CCS, 2010.
[55] H. Jonker, B. Krumnow, and G. Vlot. Fingerprint Surface-Based
Detection of Web Bot Detectors. In ESORICS, 2019.
[56] S. Khattak, D. Fifield, S. Afroz, M. Javed, S. Sundaresan, D. Mc-
Coy, V. Paxson, and S. J. Murdoch. Do You See What I See?
Differential Treatment of Anonymous Users. In NDSS, 2016.
[57] P. Laperdrix. Browser Fingerprinting: An Introduction and
the Challenges Ahead. https://blog.torproject.org/browser-
fingerprinting-introduction- and-challenges- ahead.
[58] P. Laperdrix, B. Baudry, and V. Mishra. FPRandom: Randomizing
Core Browser Objects to Break Advanced Device Fingerprinting
Techniques. In ESSoS, 2017.
[59] P. Laperdrix, N. Bielova, B. Baudry, and G. Avoine. Browser
Fingerprinting: A Survey. 2020.
[60] P. Laperdrix, W. Rudametkin, and B. Baudry. Mitigating Browser
Fingerprint Tracking: Multi-level Reconfiguration and Diversifica-
tion. In SEAMS, 2015.
[61] M. S. Miller. Robust Composition: Towards a Unified Approach
to Access Control and Concurrency Control. PhD thesis, Johns
Hopkins University, 2006.
[62] K. Mowery and H. Shacham. Pixel Perfect: Fingerprinting Canvas
in HTML5. In W2SP, 2012.
[63] N. Nikiforakis, W. Joosen, and B. Livshits. PriVaricator: Deceiving
Fingerprinters with Little White Lies. In WWW, 2015.
[64] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens,
and G. Vigna. Cookieless Monster: Exploring the Ecosystem of
Web-Based Device Fingerprinting. In S&P, 2013.
[65] V. Rizzo, S. Traverso, and M. Mellia. Unveiling Web Fingerprint-
ing in the Wild Via Code Mining and Machine Learning. In PETS,
2020.
[66] A. Sabelfeld and A. C. Myers. Language-based information-flow
security. 2003.
[67] A. Sj ¨
osten, D. Hedin, and A. Sabelfeld. Information Flow Tracking
for Side-Effectful Libraries. In FORTE, 2018.
[68] C. Staicu, D. Schoepe, M. Balliu, M. Pradel, and A. Sabelfeld. An
Empirical Study of Information Flows in Real-World JavaScript.
In PLAS, 2019.
[69] C. F. Torres, H. L. Jonker, and S. Mauw. FP-Block: Usable Web
Privacy by Controlling Browser Fingerprinting. In ESORICS, 2015.
[70] E. Trickel, O. Starov, A. Kapravelos, N. Nikiforakis, and A. Doup´
e.
Everyone is Different: Client-side Diversification for Defending
Against Extension Fingerprinting. In USENIX Security, 2019.
[71] A. Vastel, P. Laperdrix, W. Rudametkin, and R. Rouvoy. FP-
Scanner: The Privacy Implications of Browser Fingerprint Incon-
sistencies. In USENIX Security, 2018.
[72] A. Vastel, P. Laperdrix, W. Rudametkin, and R. Rouvoy. FP-
STALKER: Tracking Browser Fingerprint Evolutions. In S&P,
2018.
[73] T. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi. Host Fingerprinting
and Tracking on the Web: Privacy and Security Implications. In
NDSS, 2012.