
[30]
Pierre Laperdrix, Walter Rudametkin, and Benoit Baudry.
Beauty and the Beast: Diverting modern web browsers to build
unique browser fingerprints. In 37th IEEE Symposium on Se-
curity and Privacy (S&P 2016), San Jose, United States, 2016.
[31]
Zhuowei Li, XiaoFeng Wang, and Jong Choi. SpyShield: Pre-
serving privacy from spy add-ons. In Recent Advances in
Intrusion Detection, pages 296–316. Springer, 2007.
[32]
Keaton Mowery, Dillon Bogenreif, Scott Yilek, and Hovav
Shacham. Fingerprinting information in JavaScript implemen-
tations. In Helen Wang, editor, Proceedings of W2SP 2011.
IEEE Computer Society, May 2011.
[33]
Keaton Mowery and Hovav Shacham. Pixel perfect: Finger-
printing canvas in HTML5. In Proceedings of the Web 2.0
Security & Privacy Workshop, 2012.
[34]
Mystique Analyzer.
https://mystique.csc.ncsu.edu/
about.
[35]
Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos,
Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank
Piessens, and Giovanni Vigna. You are what you include:
Large-scale evaluation of remote javascript inclusions. In
Proceedings of the 2012 ACM Conference on Computer and
Communications Security, CCS ’12, pages 736–747, 2012.
[36]
Nick Nikiforakis, Wouter Joosen, and Benjamin Livshits. Pri-
Varicator: Deceiving Fingerprinters with Little White Lies.
Research.Microsoft.Com, 2014.
[37]
Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen,
Christopher Kruegel, Frank Piessens, and Giovanni Vigna.
Cookieless monster: Exploring the ecosystem of web-based
device fingerprinting. In Proceedings of the IEEE Symposium
on Security and Privacy, SP ’13, pages 541–555, 2013.
[38]
Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen,
Christopher Kruegel, Frank Piessens, and Giovanni Vigna.
Cookieless monster: Exploring the ecosystem of web-based
device fingerprinting. In Proceedings of the 34th IEEE Sym-
posium on Security and Privacy (IEEE S&P), pages 541–555,
2013.
[39]
Victor Le Pochat, Tom van Goethem, Samaneh Tajal-
izadehkhoob, Maciej Korczynski, and Wouter Joosen. Tranco:
A research-oriented top sites ranking hardened against ma-
nipulation. In 26th Annual Network and Distributed System
Security Symposium, NDSS 2019, San Diego, California, USA,
February 24-27, 2019. The Internet Society, 2019.
[40] John Resig. Pro JavaScript Techniques, 2006.
[41]
Franziska Roesner, Tadayoshi Kohno, and David Wetherall.
Detecting and defending against third-party tracking on the
web. In Proceedings of the 9th USENIX Conference on Net-
worked Systems Design and Implementation, NSDI’12, pages
12–12, Berkeley, CA, USA, 2012. USENIX Association.
[42]
Iskander Sanchez-Rola, Igor Santos, and Davide Balzarotti.
Extension breakdown: Security analysis of browsers extension
resources control policies. In 26th USENIX Security Sympo-
sium, pages 679–694, 2017.
[43]
Alexander Sjösten, Steven Van Acker, Pablo Picazo-Sanchez,
and Andrei Sabelfeld. Latex Gloves: Protecting Browser Ex-
tensions from Probing and Revelation Attacks. In 26th Annual
Network and Distributed System Security Symposium, NDSS
2019, San Diego, California, USA, February 24-27, 2019, 2019.
[44]
Alexander Sjösten, Steven Van Acker, and Andrei Sabelfeld.
Discovering browser extensions via web accessible resources.
In Proceedings of the Seventh ACM on Conference on Data
and Application Security and Privacy, CODASPY, 2017.
[45] Oleksii Starov, Pierre Laperdrix, Alexandros Kapravelos, and
Nick Nikiforakis. Unnecessarily Identifiable: Quantifying the
Fingerprintability of Browser Extensions Due to Bloat. In The
World Wide Web Conference, WWW, 2019.
[46]
Oleksii Starov and Nick Nikiforakis. Extended tracking pow-
ers: Measuring the privacy diffusion enabled by browser exten-
sions. In Proceedings of the 26th International Conference on
World Wide Web, pages 1481–1490. International World Wide
Web Conferences Steering Committee, 2017.
[47]
Oleksii Starov and Nick Nikiforakis. XHOUND: quantifying
the fingerprintability of browser extensions. In 2017 IEEE
Symposium on Security and Privacy, SP 2017, pages 941–956,
2017.
[48]
Erik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Niki-
forakis, and Adam Doupé. Everyone is Different: Client-side
Diversification for Defending Against Extension Fingerprint-
ing. In 28th USENIX Security Symposium (USENIX Security
19), 2019.
[49]
Tom Van Goethem and Wouter Joosen. One side-channel to
bring them all and in the darkness bind them: Associating
isolated browsing sessions. In WOOT, 8 2017.
[50]
Michael Weissbacher, Enrico Mariconti, Guillermo Suarez-
Tangil, Gianluca Stringhini, William Robertson, and Engin
Kirda. Ex-Ray: Detection of history-leaking browser exten-
sions. In Annual Computer Security Applications Conference
(ACSAC), 2017.
A Countering style fingerprinting at the
browser level
While browser extensions are lightweight and can easily be
installed, their scope of actions is limited to the available
WebExtension APIs. A built-in protection can go beyond
in terms of flexibility and performance by having its logic
directly integrated with native code. We also argue that this
problem should be fixed directly by browser vendors to protect
all their users from style leakage. To that end, we provide here
a blueprint of the modifications that could be made to prevent
style leakage through extensions.
Overview
Figure 11 provides information on how the
browser can be modified to provide protection. The approach
is similar in essence to the one applied to fix the visited history
leakage [1,2,17] but extended in many ways to fulfill our goal.
Throughout the entire page rendering pipeline, the only stage
that needs to be changed is the Style one. It is responsible for
collecting all style sheets and computing the style for each
individual element. In a nutshell, to prevent style leakage,
2522 30th USENIX Security Symposium USENIX Association