
[14] ——. (2019) Support of mp3 audio format. [Online]. Available:
https://caniuse.com/#feat=mp3
[15] ——. (2019) Support of mutation observers. [Online]. Available:
https://caniuse.com/#search=MutationObserver
[16] ——. (2019) Support of ogg vorbis audio format. [Online]. Available:
https://caniuse.com/#search=ogg
[17] ——. (2019) Support of typed arrays. [Online]. Available: https:
//caniuse.com/#search=Int8Array
[18] ——. (2019) Support of waveform audio file format. [Online].
Available: https://caniuse.com/#search=wav
[19] M. W. Docs. (2018) Permissions api. [Online]. Available: https:
//developer.mozilla.org/en- US/docs/Web/API/Permissions API
[20] P. Eckersley, “How unique is your web browser?” in International
Symposium on Privacy Enhancing Technologies Symposium. Springer,
2010, pp. 1–18.
[21] E.-C. Eelmaa. (2016) Can a website detect when
you are using selenium with chromedriver? [Online].
Available: https://stackoverflow.com/questions/33225947/
can-a- website-detect-when-you-are- using-selenium- with-chromedriver/
41220267#41220267
[22] S. Englehardt and A. Narayanan, “Online tracking: A 1-million-site
measurement and analysis,” in Proceedings of the 2016 ACM SIGSAC
Conference on Computer and Communications Security. ACM, 2016,
pp. 1388–1401.
[23] D. Fifield and S. Egelman, “Fingerprinting web users through font
metrics,” in International Conference on Financial Cryptography and
Data Security. Springer, 2015, pp. 107–124.
[24] S. Frolov and E. Wustrow, “The use of TLS in censorship
circumvention,” in Network and Distributed System Security. The
Internet Society, 2019. [Online]. Available: https://tlsfingerprint.io/
static/frolov2019.pdf
[25] A. G´
omez-Boix, P. Laperdrix, and B. Baudry, “Hiding in the crowd: an
analysis of the effectiveness of browser fingerprinting at large scale,”
in WWW 2018: The 2018 Web Conference, 2018.
[26] Google. (2017) Issue 775911 in chromium: missing accept languages
in request for headless mode. [Online]. Available: https://groups.
google.com/a/chromium.org/forum/#!topic/headless-dev/8YujuBps0oc
[27] ——. (2019) Puppeteer. [Online]. Available: https://pptr.dev/
[28] A. Hidayat. (2019) Phantomjs - scriptable headless browser. [Online].
Available: http://phantomjs.org/
[29] G. Ho, D. Boneh, L. Ballard, and N. Provos, “Tick tock: Building
browser red pills from timing side channels.” in WOOT, 2014.
[30] A. Inc. (2014) ios sdk release notes for ios 8.0
gm. [Online]. Available: https://developer.apple.com/library/archive/
releasenotes/General/RN-iOSSDK- 8.0/
[31] I. Incapsula, “Bot traffic report 2016,” http://time.com/12933/
what-you- think-you-know-about-the- web-is-wrong/, March 2014.
[32] ——, “Bot traffic report 2016,” https://www.incapsula.com/blog/
bot-traffic-report-2016.html, January 2017.
[33] G. Jacob and C. Kruegel, “PUB CRAWL : Protecting Users and
Businesses from CRAWLers,” Protecting Users and Businesses from
CRAWLers Gregoire, 2009.
[34] H. Jonker, B. Krumnow, and G. Vlot, “Fingerprint surface-based
detection of web bot detectors,” in European Symposium on Research
in Computer Security. Springer, 2019, pp. 586–605.
[35] J. Jueckstock and A. Kapravelos, “Visiblev8: In-browser monitoring
of javascript in the wild,” in Proceedings of the Internet Measurement
Conference. ACM, 2019, pp. 393–405.
[36] P. Laperdrix, W. Rudametkin, and B. Baudry, “Beauty and the beast:
Diverting modern web browsers to build unique browser fingerprints,”
in Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016,
pp. 878–894.
[37] X. Mi, Y. Liu, X. Feng, X. Liao, B. Liu, X. Wang, F. Qian, Z. Li,
S. Alrwais, and L. Sun, “Resident evil: Understanding residential ip
proxy as a dark service,” in Resident Evil: Understanding Residential
IP Proxy as a Dark Service. IEEE, 2019, p. 0.
[38] M. Monperrus. (2019) Crawler-user-agents. [Online]. Available:
https://github.com/monperrus/crawler-user-agents
[39] K. Mowery and H. Shacham, “Pixel perfect: Fingerprinting canvas in
html5,” Proceedings of W2SP, pp. 1–12, 2012.
[40] M. Mulazzani, P. Reschl, M. Huber, M. Leithner, S. Schrittwieser,
E. Weippl, and F. Wien, “Fast and reliable browser identification with
javascript engine fingerprinting,” in Web 2.0 Workshop on Security and
Privacy (W2SP), vol. 5. Citeseer, 2013.
[41] D. networks, “2018 bad bot report,” https://resources.distilnetworks.
com/travel/2018-bad-bot- report, January 2018.
[42] N. Nikiforakis, W. Joosen, and B. Livshits, “Privaricator: Deceiving
fingerprinters with little white lies,” in Proceedings of the 24th Inter-
national Conference on World Wide Web. International World Wide
Web Conferences Steering Committee, 2015, pp. 820–830.
[43] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens,
and G. Vigna, “Cookieless monster: Exploring the ecosystem of web-
based device fingerprinting,” in Security and privacy (SP), 2013 IEEE
symposium on. IEEE, 2013, pp. 541–555.
[44] D. Preuveneers and W. Joosen, “Smartauth: dynamic context finger-
printing for continuous user authentication,” in Proceedings of the 30th
Annual ACM Symposium on Applied Computing. ACM, 2015, pp.
2185–2191.
[45] Quora. Is scraping and crawling to collect
data illegal? [Online]. Available: https://www.quora.com/
Is-scraping- and-crawling-to- collect-data- illegal
[46] T. Saito, K. Takahashi, K. Yasuda, T. Ishikawa, K. Takasu, T. Yamada,
N. Takei, and R. Hosoi, “OS and Application Identification by Installed
Fonts,” 2016 IEEE 30th International Conference on Advanced
Information Networking and Applications (AINA), pp. 684–689, 2016.
[Online]. Available: http://ieeexplore.ieee.org/document/7474155/
[47] M. Schwarz, F. Lackner, and D. Gruss, “Javascript template attacks:
Automatically inferring host information for targeted exploits,” in
NDSS, 2019.
[48] S. Shekyan. (2015) Detecting phantomjs based visi-
tors. [Online]. Available: https://blog.shapesecurity.com/2015/01/22/
detecting-phantomjs- based-visitors/
[49] S. Sivakorn, J. Polakis, and A. D. Keromytis, “I’m not a human:
Breaking the google recaptcha.”
[50] M. Smart, G. R. Malan, and F. Jahanian, “Defeating tcp/ip stack
fingerprinting.” in Usenix Security Symposium, 2000.
[51] A. Stassopoulou and M. D. Dikaiakos, “Web robot detection: A prob-
abilistic reasoning approach,” Computer Networks, vol. 53, no. 3, pp.
265–278, 2009.
[52] D. Stevanovic, A. An, and N. Vlajic, “Feature evaluation for web
crawler detection with data mining techniques,” Expert Systems with
Applications, vol. 39, no. 10, pp. 8707–8717, 2012.
[53] C. B. Tracker. (2016) Support webgl in headless. [Online]. Available:
https://bugs.chromium.org/p/chromium/issues/detail?id=617551
[54] T. Unger, M. Mulazzani, D. Fruhwirt, M. Huber, S. Schrittwieser, and
E. Weippl, “Shpf: Enhancing http (s) session security with browser
fingerprinting,” in Availability, Reliability and Security (ARES), 2013
Eighth International Conference on. IEEE, 2013, pp. 255–261.
[55] V. Vasilyev. (2019) Modern and flexible browser fingerprinting library.
[Online]. Available: https://github.com/Valve/fingerprintjs2
[56] A. Vastel. (2017) Detecting chrome headless. [On-
line]. Available: https://antoinevastel.com/bot%20detection/2017/08/05/
detect-chrome- headless.html
[57] A. Vastel, P. Laperdrix, W. Rudametkin, and R. Rouvoy, “Fp-scanner:
The privacy implications of browser fingerprint inconsistencies,” in
Proceedings of the 27th USENIX Security Symposium, 2018.
[58] ——, “Fp-stalker: Tracking browser fingerprint evolutions,” in IEEE
S&P 2018-39th IEEE Symposium on Security and Privacy. IEEE,
2018, pp. 1–14.
[59] L. Von Ahn, M. Blum, N. J. Hopper, and J. Langford, “Captcha:
Using hard ai problems for security,” in International Conference on
the Theory and Applications of Cryptographic Techniques. Springer,
2003, pp. 294–311.
[60] G. Wang, T. Konolige, C. Wilson, X. Wang, H. Zheng, and B. Y. Zhao,
“You are how you click: Clickstream analysis for sybil detection.” in
USENIX Security Symposium, vol. 9, 2013, pp. 1–008.
12