
ML-CB 469
Conference on Reverse Engineering, 2010.
[14] S. Clark, M. Blaze, and J. M. Smith, “Smearing fingerprints:
Changing the game of web tracking with composite
privacy,” in Cambridge International Workshop on Security
Protocols, 2015.
[15] M. Ikram, H. J. Asghar, M. A. Kaafar, A. Mahanti, and
B. Krishnamurthy, “Towards seamless tracking-free web:
Improved detection of trackers via one-class learning,”
Proceedings on Privacy Enhancing Technologies, vol. 2017,
no. 1, pp. 79–99, 2017.
[16] T. Bujlow, V. Carela-Español, J. Solé-Pareta, and P. Barlet-
Ros, “A survey on web tracking: Mechanisms, implications,
and defenses,” Proceedings of the IEEE, vol. 105, no. 8, pp.
1476–1510, August 2017.
[17] Electronic Frontier Foundation, “Panopticlcick,” https:
//panopticlick.eff.org/.
[18] R. Upathilake, Y. Li, and A. Matrawy, “A classification
of web browser fingerprinting techniques,” in 2015 7th
International Conference on New Technologies, Mobility
and Security (NTMS), 2015.
[19] L. I. Millett, B. Friedman, and E. Felten, “Cookies and web
browser design: Toward realizing informed consent online,”
in Proceedings of the SIGCHI conference on Human factors
in computing systems, 2001.
[20] O. Kulyk, A. Hilt, N. Gerber, and M. Volkamer, “‘this
website uses cookies’: Users’ perceptions and reactions to
the cookie disclaimer,” in European Workshop on Usable
Security (EuroUSEC) 2018, April 2018.
[21] F. Marotta-Wurgler, “Does “notice and choice” disclosure
regulation work? an empirical study of privacy policies,”
in Michigan Law: Law and Economics Workshop, 2015.
[Online]. Available: https://perma.cc/GYN4-3YFA
[22] J. R. Reidenberg, N. C. Russell, A. Callen, S. Qasir, and
T. Norton, “Privacy harms and the effectiveness of the
notice and choice framework,” I/S: A Journal of Law and
Policy for the Information Society, pp. 485–524, 2014.
[23] N. Richards and W. Hartzog, “The pathologies of digital
consent,” Washington University Law Review, vol. 96, pp.
1461–1503, 2019.
[24] S. Englehardt, D. Reisman, C. Eubank, P. Zimmerman,
J. Mayer, A. Narayanan, and E. W. Felten, “Cookies
that give you away: The surveillance implications of
web tracking,” in Proceedings of the 24th International
Conference on World Wide Web, 2015.
[25] M. Perry, E. Clark, S. Murdoch, and G. Koppen, “The
design and implementation of the Tor Browser [draft],”
June 2018, https://2019.www.torproject.org/projects/
torbrowser/design/.
[26] Inform Action, “noscript,” https://noscript.net.
[27] A. Macrina and E. Phetteplace, “The Tor Browser and
intellectual freedom in the digital age,” Reference and User
Services Quarterly, vol. 54, no. 4, pp. 17–20, 2015.
[28] M. Piekarska, Y. Zhou, D. Strohmeier, and A. Raake,
“Because we care: Privacy dashboard on FirefoxOS,” arXiv,
2015. [Online]. Available: https://arxiv.org/abs/1506.04105
[29] C. E. Shannon, “A mathematical theory of communication,”
Bell Syst. Tech., vol. 27, pp. 379–423, 1948. [Online].
Available: https://arxiv.org/abs/1506.04105
[30] Y. Cao, S. Li, E. Wijmans et al., “(Cross-) browser finger-
printing via OS and hardware level features.” in Proceedings
of the 2017 Network and Distributed System Security Sym-
posium, 2017.
[31] Mozilla, “HTMLCanvasElement.toDataURL(),”
https://developer.mozilla.org/en-US/docs/Web/API/
HTMLCanvasElement/toDataURL.
[32] N. Reitinger, “Faces and fingers: Authentication,” Journal
of High Technology Law, vol. 20, no. 1, pp. 61–81, 2020.
[33] E. Bursztein, A. Malyshev, T. Pietraszek, and K. Thomas,
“Picasso: Lightweight device class fingerprinting for web
clients,” in Proceedings of the 6th Workshop on Security
and Privacy in Smartphones and Mobile Devices, 2016.
[34] fingerprintJS, “FPJS - Valve,” https://github.com/Valve/
fingerprintjs2.
[35] antoinevastel, “Picasso based canvas fingerprinting,”
https://github.com/antoinevastel/picasso-like-canvas-
fingerprinting.
[36] S. Englehardt and A. Narayanan, “Online tracking: A
1-million-site measurement and analysis,” in Proceedings
of the 2016 ACM SIGSAC Conference on Computer and
Communications Security, 2016.
[37] Mozilla, “OpenWPM,” https://github.com/mozilla/
OpenWPM.
[38] P. Laperdrix, “Browser fingerprinting: Exploring device
diversity to augment authentification and build
client-side countermeasures,” Cryptography and Security
[cs.CR]. INSA de Rennes, 2017. [Online]. Available:
https://tel.archives-ouvertes.fr/tel-01729126/document
[39] N. Bielova, F. Besson, and T. Jensen, “Using JavaScript
monitoring to prevent device fingerprinting,” ERCIM News,
vol. 106, July 2016. [Online]. Available: https://ercim-
news.ercim.eu/images/stories/EN106/EN106-web.pdf
[40] G. Merzdovnik, M. Huber, D. Buhov, N. Nikiforakis,
S. Neuner, M. Schmiedecker, and E. Weippl, “Block me if
you can: A large-scale study of tracker-blocking tools,” in
2017 IEEE Symposium on Security and Privacy, 2017.
[41] Appodrome, “CanvasFingerprintBlock,” https://chrome.
google.com/webstore/detail/canvasfingerprintblock/
ipmjngkmngdcdpmgmiebdmfbkcecdndc.
[42] C. F. Torres, H. Jonker, and S. Mauw, “FP-Block: Usable
web privacy by controlling browser fingerprinting,” in
European Symposium on Research in Computer Security,
2015.
[43] N. Nikiforakis, W. Joosen, and B. Livshits, “Privaricator,”
in Proceedings of the 24th International Conference on the
World Wide Web, 2015.
[44] A. ElBanna and N. Abdelbaki, “NONYM! ZER: Mitigation
framework for browser fingerprinting,” in 2019 IEEE 19th
International Conference on Software Quality, Reliability
and Security Companion, 2019.
[45] P. Baumann, S. Katzenbeisser, M. Stopczynski, and
E. Tews, “Disguised Chromium browser: Robust browser,
flash and canvas fingerprinting protection,” in Proceedings of
the 2016 ACM on Workshop on Privacy in the Electronic
Society, 2016.
[46] P. Laperdrix, B. Baudry, and V. Mishra, “FPRandom:
Randomizing core browser objects to break advanced device
fingerprinting techniques,” in 9th International Symposium
on Engineering Secure Software and Systems, 2017.
[47] P. Laperdrix, W. Rudametkin, and B. Baudry, “Mitigating
browser fingerprint tracking: Multi-level reconfiguration