
Detection of Trackers via One-class Learning . In Privacy Enhancing
Technologies Symposium (PETS) (2017).
[61] IQ BAL , U., S HAFIQ, Z., A ND QIAN, Z. The Ad Wars: Retrospective
Measurement and Analysis of Anti-Adblock Filter Lists. In IMC (2017).
[62] IQ BAL , U., S NYDER, P., ZHU , S., LIVSHITS, B. , QIAN, Z., AN D
SHA FIQ, Z. AdGraph: A Graph-Based Approach to Ad and Tracker
Blocking. In To appear in the Proceedings of the IEEE Symposium on
Security & Privacy (2020).
[63] JOHN RO SS QUINLAN.Induction of decision trees. Kluwer Academic
Publisher, 1986.
[64] LAPERDRIX, P. Browser Fingerprinting: An Introduction and the
Challenges Ahead. https://blog.torproject.org/browser-fingerprinting-
introduction-and- challenges-ahead, 2019.
[65] LAPERDRIX, P., AVOIN E, G., BAU DRY, B., A ND NIKIFORAKIS, N.
Morellian Analysis for Browsers: Making Web Authentication Stronger
with Canvas Fingerprinting. In International Conference on Detection of
Intrusions and Malware, and Vulnerability Assessment (DIMVA) (2019).
[66] LAPERDRIX, P., BI EL OVA, N., BAUDRY, B. , AND AVOI NE , G. Browser
fingerprinting: A survey. arXiv preprint arXiv:1905.01051 (2019).
[67] LAPERDRIX, P., RU DAM ETK IN, W., AND BAU DRY, B. Beauty and
the Beast: Diverting modern web browsers to build unique browser
fingerprints. In IEEE Symposium on Security and Privacy (2016).
[68] LAU ING ER , T., CHAABANE, A. , ARSHAD, S., ROB ERT SON , W., WI L-
SO N, C. , AN D KIRDA , E. Thou Shalt Not Depend on Me: Analysing
the Use of Outdated JavaScript Libraries on the Web. In Network and
Distributed System Security Symposium (NDSS) (2017).
[69] LI, B., VADR EVU , P., LEE , K. H ., AN D PERDISCI, R. JSgraph:
Enabling Reconstruction of Web Attacks via Efficient Tracking of
Live In-Browser JavaScript Executions. In 25th Annual Network and
Distributed System Security Symposium (2018).
[70] LUNDEN, I. Relx acquires ThreatMetrix for 817M to ramp up
in risk-based authentication. https://techcrunch.com/2018/01/29/relx-
threatmetrix-risk- authentication-lexisnexis/, 2018.
[71] MAYE R, J. R. “any person... a pamphleteer”: Internet anonymity in the
age of web 2.0.
[72] MOW ERY, K., AND SHACHAM, H. Pixel perfect: Fingerprinting canvas
in html5. Proceedings of W2SP (2012).
[73] NE TIQ. Device Fingerprinting for Low Friction Authentication.
https://www.microfocus.com/media/white-paper/device fingerprinting
for low friction authentication wp.pdf.
[74] NIKIFORAKIS, N., INVERNIZZI, L ., KAPR AVELO S, A ., AC KER , S. V.,
JOOSEN, W., KRU EG EL, C ., PIESSENS, F., AND VIGN A, G. You
Are What You Include: Large-scale Evaluation of Remote JavaScript
Inclusions. In ACM Conference on Computer and Communications
Security (CCS) (2012).
[75] NIKIFORAKIS, N., KA PR AVELO S, A. , JO OSE N, W., K RUE GEL , C.,
PIESSENS, F., AN D VIGN A, G. Cookieless monster: Exploring the
ecosystem of web-based device fingerprinting. In Security and Privacy
(S&P) (2013), IEEE.
[76] NOTTINGHAM, M. Unsanctioned Web Tracking. https://www.w3.org/
2001/tag/doc/unsanctioned-tracking/, 2015.
[77] OLEJNIK, L., ACA R, G., CASTELLUCCIA, C ., A ND DIAZ, C. The
leaking battery: A privacy analysis of the HTML5 Battery Status API.
In Cryptology ePrint Archive: Report 2015/616 (2015).
[78] OLEJNIK, L., ENGLEHARDT, S., AND NA RAYANA N, A. Battery Status
Not Included:Assessing Privacy in Web Standards. In International
Workshop on Privacy Engineering (2017).
[79] PAPADOPOULOS, P., KOU RTE LLI S, N ., AN D MAR KATOS , E. P. Cookie
Synchronization: Everything You Always Wanted to Know But Were
Afraid to Ask. In The Web Conference (2019).
[80] PAPADOPOULOS, P., SNYDER, P., ATHANASAKIS, D., A ND LIVSHITS,
B. Keeping out the Masses: Understanding the Popularity and Implica-
tions of Internet Paywalls. In The Web Conference (2020).
[81] QUINLAN, R. C4.5: Programs for Machine Learning. Morgan
Kaufmann Publishers, San Mateo, CA, 1993.
[82] SANCHEZ-ROLA , I., SAN TO S, I. , AND BAL ZARO TTI , D. Clock Around
the Clock: Time-Based Device Fingerprinting. In ACM Conference on
Computer and Communications Security (CCS) (2018).
[83] SC HUH , J. Building a more private web. https://www.blog.google/
products/chrome/building-a-more-private-web, 2019.
[84] SC HWARZ , M., LAC KNE R, F., A ND GRU SS, D . JavaScript Template
Attacks: Automatically Inferring Host Information for Targeted Exploits.
In NDSS (2019).
[85] SC ULLY, R. Identity Resolution vs Device Graphs: Clarifying the Differ-
ences. https://amperity.com/blog/identity-resolution- vs-device-graphs-
clarifying-differences/.
[86] SI VAKORN , S. , POLAKIS, J. , AND KERO MY TIS , A. D . I’m not a human:
Breaking the Google reCAPTCHA. In Black Hat Asia (2016).
[87] SKO LK A, P., STAI CU , C.-A., AND PRADEL, M. Anything to Hide?
Studying Minified and Obfuscated Code in the Web. In World Wide
Web (WWW) Conference (2019).
[88] SNYDER, P., ANSARI, L ., TAYL OR, C ., A ND KANICH, C. Browser
feature usage on the modern web. In Proceedings of the 2016 Internet
Measurement Conference (2016), ACM, pp. 97–110.
[89] SNYDER, P., TAYLO R, C. , AN D KANICH, C. Most websites don’t need
to vibrate: A cost-benefit approach to improving browser security. In
Proceedings of the 2017 ACM SIGSAC Conference on Computer and
Communications Security (2017), ACM, pp. 179–194.
[90] STARO V, O., AND NIKIFORAKIS, N. Xhound: Quantifying the finger-
printability of browser extensions. In 2017 IEEE Symposium on Security
and Privacy (SP) (2017), IEEE, pp. 941–956.
[91] VALENTINO RIZZO . Machine Learning Approaches for Automatic
Detection of Web Fingerprinting. Master’s thesis, Politecnico di Torino,
Corso di laurea magistrale in Ingegneria Informatica (Computer Engi-
neering), 2018.
[92] VASTE L, A., LAPERDRIX, P., RU DAM ETK IN , W., AN D ROUVO Y, R.
Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsis-
tencies. In USENIX Security (2018).
[93] VASTE L, A., LAPERDRIX, P., RU DAM ETK IN , W., AN D ROUVO Y, R.
Fp-stalker: Tracking browser fingerprint evolutions. In 2018 IEEE
Symposium on Security and Privacy (SP) (2018), IEEE, pp. 728–741.
[94] WILANDER, J. Intelligent Tracking Prevention 2.3. https://webkit.org/
blog/9521/intelligent-tracking- prevention-2-3/, 2019.
[95] WOO D, M. Todays Firefox Blocks Third-Party Tracking Cookies and
Cryptomining by Default. https://blog.mozilla.org/blog/2019/09/03/
todays-firefox- blocks-third- party-tracking- cookies-and- cryptomining-
by-default/, 2019.
[96] WU, Q., LI U, Q., ZH AN G, Y., LI U, P., AN D WEN, G . A Machine
Learning Approach for Detecting Third-Party Trackers on the Web. In
ESORICS (2016).
IX. APPENDIX
A. Extensions to OpenWPM JavaScript instrumentation
OpenWPM’s instrumentation does not cover a number of
APIs used for fingerprinting by prominent libraries—
including the Web Graphics Library (WebGL) and
performance.now. These APIs have been discovered
to be fingerprintable [64]. The standard use case of
WebGL is to render 2D and 3D graphics in HTML canvas
element, however, it has potential to be abused for browser
fingerprinting. The WebGL renderer and vendor varies by
the OS and it creates near distinct WebGL images with same
configurations on different machines. The WebgGL properties
and the rendered image are used by current state-of-the-art
browser fingerprinting [16], [25] scripts. Since WebGL is
used by popular fingerprinting scripts, we instrument WebGL
JavaScript API. performance.now is another JavaScript
API method whose standard use case is to return time in
floating point milliseconds since the start of a page load but
it also have fingerprinting potential. Specifically, the timing
information extracted from performance.now can be used
for timing specific fingerprint attacks such as typing cadence
[18], [31]. We extend OpenWPM to also capture execution
of performance.now.
For completeness, we instrument additional un-instrumented
methods of already instrumented JavaScript APIs in Open-
WPM. Specifically, we enhance our execution trace by instru-