
[2] “Robin linus - your social media footprint,” https://robinlinus.github.io/
socialmedia-leak/.
[3] “Chrome developers: Transition types,” https://developers.chrome.com/
extensions/history#transition types, 2019.
[4] “Chromium blog - helping people spot the spoofs: a url experiment,”
https://blog.chromium.org/2020/08/helping-people-spot-spoofs-url.
html, 2020.
[5] “Git repositories on chromium,” https://
chromium.googlesource.com/chromium/chromium/+/
4e693dd4033eb7b76787d3d389ceed3531c584b5/chrome/browser/
historyhistory backend.cc, 2020.
[6] “Mdn web docs - network information api,” https://developer.mozilla.
org/en-US/docs/Web/API/Network Information API, 2020.
[7] “Nginx plus,” https://nginx.org/en/, 2020.
[8] Wikipedia, “Favicon,” https://en.wikipedia.org/wiki/Favicon, 2009.
[9] G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and
C. Diaz, “The web never forgets: Persistent tracking mechanisms in
the wild,” in Proceedings of the 2014 ACM SIGSAC Conference on
Computer and Communications Security, 2014, pp. 674–689.
[10] G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. G¨
urses, F. Piessens,
and B. Preneel, “Fpdetective: Dusting the web for fingerprinters,”
in Proceedings of the 2013 ACM SIGSAC Conference on Computer
& Communications Security, ser. CCS ’13. New York, NY,
USA: ACM, 2013, pp. 1129–1140. [Online]. Available: http:
//doi.acm.org/10.1145/2508859.2516674
[11] Amazon, “Amazon lightsail virtual servers, storage, databases, and net-
working for a low, predictable price.” https://aws.amazon.com/lightsail/,
2020.
[12] Amazon, “The top 500 sites on the web,” https://www.alexa.com/
topsites, 2020.
[13] appodrome.net, “Canvasfingerprintblock,” https://
chrome.google.com/webstore/detail/canvasfingerprintblock/
ipmjngkmngdcdpmgmiebdmfbkcecdndc, 2020.
[14] C. Bansal, S. Preibusch, and N. Milic-Frayling, “Cache Timing Attacks
Revisited: Efficient and Repeatable Browser History, OS and Network
Sniffing,” in IFIP International Information Security and Privacy Con-
ference. Springer, May 2015, pp. 97–111.
[15] Brave, “Fingerprinting protections,” https://brave.com/
whats-brave-done- for-my- privacy-lately-episode- 4-fingerprinting/
/-defenses- 2-0/, 2020.
[16] T. Bujlow, V. Carela-Espa˜
nol, J. Sole-Pareta, and P. Barlet-Ros, “A
survey on web tracking: Mechanisms, implications, and defenses,”
Proceedings of the IEEE, vol. 105, no. 8, pp. 1476–1510, 2017.
[17] Y. Cao, S. Li, and E. Wijmans, “(cross-)browser fingerprinting via os
and hardware level features,” in Proceedings of Network & Distributed
System Security Symposium (NDSS). Internet Society, 2017.
[18] Y. Cao, S. Li, E. Wijmans et al., “(cross-) browser fingerprinting via
os and hardware level features.” in NDSS, 2017.
[19] K. L. Chiew, J. S.-F. Choo, S. N. Sze, and K. S. Yong, “Leverage web-
site favicon to detect phishing websites,” Security and Communication
Networks, vol. 2018, 2018.
[20] F. T. Commission, “Consumer information - online tracking,” https:
//www.consumer.ftc.gov/articles/0042-online-tracking.
[21] A. Das, G. Acar, N. Borisov, and A. Pradeep, “The web’s sixth sense:
A study of scripts accessing smartphone sensors,” in Proceedings of
ACM CCS, October 2018, 2018.
[22] A. Datta, J. Lu, and M. C. Tschantz, “Evaluating anti-fingerprinting
privacy enhancing technologies,” in The World Wide Web Conference,
2019, pp. 351–362.
[23] P. Eckersley, “How unique is your web browser?” in Proceedings of
the 10th International Conference on Privacy Enhancing Technologies,
ser. PETS’10, 2010, pp. 1–18.
[24] S. Englehardt et al., “Automated discovery of privacy violations on the
web,” 2018.
[25] S. Englehardt and A. Narayanan, “Online tracking: A 1-million-site
measurement and analysis,” in Proceedings of the 2016 ACM SIGSAC
Conference on Computer and Communications Security, ser. CCS ’16,
2016, pp. 1388–1401.
[26] R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and
T. Berners-Lee, “Rfc2616: Hypertext transfer protocol–http/1.1,” 1999.
[27] Firefox, “Resources for developers, by developers,” https:
//developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Reference/
Interface/mozIAsyncFavicons, 2020.
[28] J. Foundation, “Automation for apps,” http://appium.io/, 2020.
[29] G. Franken, T. Van Goethem, and W. Joosen, “Who left open the cookie
jar? a comprehensive evaluation of third-party cookie policies,” in 27th
USENIX Security Symposium (USENIX Security 18), 2018, pp. 151–
168.
[30] B. Fulgham, “Webkit - protecting against hsts abuse,” https://webkit.
org/blog/8146/protecting-against-hsts-abuse/, 2018.
[31] G.-G. Geng, X.-D. Lee, W. Wang, and S.-S. Tseng, “Favicon - a Clue
to Phishing Sites Detection,” in Proceedings of the 2013 APWG eCrime
Researchers Summit. IEEE, September 2013, pp. 1–10.
[32] A. G´
omez-Boix, P. Laperdrix, and B. Baudry, “Hiding in the crowd: an
analysis of the effectiveness of browser fingerprinting at large scale,”
in Proceedings of the 2018 world wide web conference, 2018, pp. 309–
318.
[33] Google, “Reset chrome settings to default,” https://support.google.com/
chrome/answer/3296214?hl=en, 2020.
[34] D. Gruss, E. Kraft, T. Tiwari, M. Schwarz, A. Trachtenberg, J. Hen-
nessey, A. Ionescu, and A. Fogh, “Page cache attacks,” in Proceedings of
the 2019 ACM SIGSAC Conference on Computer and Communications
Security, 2019, pp. 167–180.
[35] D. Gugelmann, M. Happe, B. Ager, and V. Lenders, “An automated
approach for complementing ad blockers blacklists,” Proceedings on
Privacy Enhancing Technologies, vol. 2015, no. 2, pp. 282–298, 2015.
[36] M. Hanson, P. Lawler, and S. Macbeth, “The tracker tax: the impact of
third-party trackers on website speed in the united states,” Technical
report, 2018. Available at: https://www. ghostery. com/wp-content ,
Tech. Rep., 2018.
[37] J. Hoffman, “How we got the favicon,” https://thehistoryoftheweb.com/
how-we-got-the-favicon/.
[38] M. Ikram, H. J. Asghar, M. A. Kaafar, A. Mahanti, and B. Krish-
namurthy, “Towards seamless tracking-free web: Improved detection
of trackers via one-class learning,” Proceedings on Privacy Enhancing
Technologies, vol. 2017, no. 1, pp. 79–99, 2017.
[39] U. Iqbal, P. Snyder, S. Zhu, B. Livshits, Z. Qian, and Z. Shafiq,
“Adgraph: A graph-based approach to ad and tracker blocking,” in In
Proceedings of the 37th IEEE Symposium on Security and Privacy, ser.
S&P ’20, 2020.
[40] Y. Jia, X. Dong, Z. Liang, and P. Saxena, “I know where you’ve been:
Geo-inference attacks via the browser cache,” IEEE Internet Computing,
vol. 19, no. 1, pp. 44–53, 2014.
[41] Johannes Buchner, “An image hashing library written in python,” https:
//pypi.org/project/ImageHash/, 2020.
[42] joue.quroi, “Canvas blocker (fingerprint protect),” https:
//chrome.google.com/webstore/detail/canvas-blocker-fingerprin/
nomnklagbgmgghhjidfhnoelnjfndfpd, 2020.
[43] S. Karami, P. Ilia, and J. Polakis, “Awakening the Web’s Sleeper
Agents: Misusing Service Workers for Privacy Leakage,” in Network
and Distributed System Security Symposium (NDSS), 2021.
[44] S. Karami, P. Ilia, K. Solomos, and J. Polakis, “Carnus: Exploring the
privacy threats of browser extension fingerprinting,” in 27th Annual
Network and Distributed System Security Symposium (NDSS). The
Internet Society, 2020.
[45] Keller, “Webgl fingerprint defender,” https://chrome.
google.com/webstore/detail/webgl-fingerprint- defende/
olnbjpaejebpnokblkepbphhembdicik, 2020.
[46] A. Klein and B. Pinkas, “Dns cache-based user tracking.” in NDSS,
2019.
[47] M. Koop, E. Tews, and S. Katzenbeisser, “In-depth evaluation of
redirect tracking and link usage,” Proceedings on Privacy Enhancing
Technologies, vol. 4, pp. 394–413, 2020.
[48] P. Laperdrix, B. Baudry, and V. Mishra, “Fprandom: Randomizing core
browser objects to break advanced device fingerprinting techniques,” in
International Symposium on Engineering Secure Software and Systems.
Springer, 2017, pp. 97–114.
17