
10 B. Amin Azad et al.
15. Cao, Y., Li, S., Wijmans, E.: (Cross-)Browser Fingerprinting via OS and Hardware Level
Features. In: NDSS (2017)
16. Eckersley, P.: How unique is your web browser? In: Privacy Enhancing Technologies.
Springer (2010)
17. Fallmann, H., Wondracek, G., Platzer, C.: Covertly probing underground economy market-
places. In: DIMVA (2010)
18. Fifield, D., Egelman, S.: Fingerprinting web users through font metrics. In: Proceedings of
the 19th international conference on Financial Cryptography and Data Security (2015)
19. Hao, S., Borgolte, K., Nikiforakis, N., Stringhini, G., Egele, M., Eubanks, M., Krebs, B.,
Vigna, G.: Drops for Stuff: An Analysis of Reshipping Mule Scams. In: Proceedings of the
22nd ACM Conference on Computer and Communications Security (2015)
20. Jueckstock, J., Kapravelos, A.: VisibleV8: In-browser monitoring of JavaScript in the wild.
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC (2019)
21. Kirk, J.: This tool may make it easier for thieves to empty bank accounts. https:
/ / www . csoonline . com / article / 2871248 / fraud - prevention / this -
tool- may- make-it-easier-for -thieves-to-empty- bank- accounts.
html
22. Krebs, B.: ‘AntiDetect’ Helps Thieves Hide Digital Fingerprints. https : / /
krebsonsecurity . com / 2015 / 03 / antidetect - helps - thieves - hide -
digital-fingerprints/
23. Laperdrix, P., Rudametkin, W., Baudry, B.: Mitigating browser fingerprint tracking: multi-
level reconfiguration and diversification. In: 10th International Symposium on Software En-
gineering for Adaptive and Self-Managing Systems (SEAMS 2015) (2015)
24. Laperdrix, P., Rudametkin, W., Baudry, B.: Beauty and the Beast: Diverting modern web
browsers to build unique browser fingerprints. In: 37th IEEE Symposium on Security and
Privacy (2016)
25. Mowery, K., Shacham, H.: Pixel Perfect: Fingerprinting Canvas in HTML5. In: Proceedings
of W2SP 2012 (2012)
26. Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless
Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. In: Proceedings of
the 2013 IEEE Symposium on Security and Privacy (2013)
27. PerimeterX: Anti Bot Protection - Protect Against Bot Attacks. https: / / www .
perimeterx.com/
28. Singh, A.: The Underground Ecosystem Of Credit Card Fraud. Black Hat Asia (2015)
29. Starov, O., Nikiforakis, N.: XHOUND: Quantifying the Fingerprintability of Browser Ex-
tensions. In: 38th IEEE Symposium on Security and Privacy (2017)
30. Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., Markov, Y., Comanescu,
O., Eranti, V., Moscicki, A., et al.: Data breaches, phishing, or malware? understanding the
risks of stolen credentials. In: Proceedings of the 2017 ACM SIGSAC Conference on Com-
puter and Communications Security (2017)
31. Thomas, K., McCoy, D., Grier, C., Kolcz, A., Paxson, V.: Trafficking fraudulent accounts:
The role of the underground market in twitter spam and abuse. In: USENIX Security (2013)
32. Vasilyev, V.: FingerprintJS2: Modern & flexible browser fingerprinting library. https://
github.com/Valve/fingerprintjs2
33. Vastel, A., Laperdrix, P., Rudametkin, W., Rouvoy, R.: FP-STALKER: Tracking Browser
Fingerprint Evolutions. In: 39th IEEE Symposium on Security and Privacy (2018)
34. Vastel, A., Rudametkin, W., Rouvoy, R., Blanc, X.: FP-Crawlers: Studying the Resilience
of Browser Fingerprinting to Block Crawlers. In: Starov, O., Kapravelos, A., Nikiforakis, N.
(eds.) NDSS Workshop on Measurements, Attacks, and Defenses for the Web (2020)