Subject: [INFO.INFO-WB]Computer Science [cs]/Web | [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] | ACM: H.: Information Systems/H.3: INFORMATION STORAGE AND RETRIEVAL/H.3.5: Online Information Services/H.3.5.2: Web-based services | [ INFO.INFO-LG ] Computer Science [cs]/Machine Learning [cs.LG] | random forests | user tracking | [ INFO.INFO-WB ] Computer Science [cs]/Web | [ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR] | ACM : H.: Information Systems/H.3: INFORMATION STORAGE AND RETRIEVAL/H.3.5: Online Information Services/H.3.5.2: Web-based services | ACM : K.: Computing Milieux/K.4: COMPUTERS AND SOCIETY/K.4.1: Public Policy Issues/K.4.1.5: Privacy | browser fingerprinting | [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] | [ INFO.INFO-SE ] Computer Science [cs]/Software Engineering [cs.SE] | [INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG] | ACM: K.: Computing Milieux/K.4: COMPUTERS AND SOCIETY/K.4.1: Public Policy Issues/K.4.1.5: Privacy
International audience; Browser fingerprinting has emerged as a technique to track users without their consent. Unlike cookies, fingerprinting is a stateless technique that does not store any information on devices, but instead exploits unique combinations of attributes... View more
0 50 100 150 200 250 Tracking duration (collect frequency = 7 days) 1 2 4 8 16 Fig. 14: Speedup of average execution time against number of processes for FP-STALKER's hybrid variant G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz, “The Web Never Forgets: Persistent Tracking Mechanisms in the Wild,” Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14, pp. 674-689, 2014.
G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gu¨ rses, F. Piessens, and B. Preneel, “FPDetective,” Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, pp.
1129-1140, 2013. [Online]. Available: http://dl.acm.org/citation.cfm? doid=2508859.2516674 F. Alaca and P. C. V. Oorschot, “Device Fingerprinting for Augmenting Web Authentication: Classification and Analysis of Methods,” Annual Computer Security Applications Conference (ASAC '32), 2016. [Online]. Available: http://people.scs.carleton.ca/ paulv/ papers/acsac2016-device-fingerprinting.pdf S. Bernard, L. Heutte, and S. Adam, “Influence of hyperparameters on random forest accuracy,” Proc. Int. Workshop Multiple Classifier Syst., vol. 5519 LNCS, pp. 171-180, 2009.
K. Boda, A´. M. F o¨ldes, G. G. Gulya´s, and S. Imre, “User tracking on the web via cross-browser fingerprinting,” in Nordic Conference on Secure IT Systems. Springer, 2011, pp. 31-46.
L. Breiman, “Random Forests,” Machine Learning, vol. 45, no. 1, pp. 5-32, 2001. [Online]. Available: http://dx.doi.org/10.1023/A: 1010933404324 Y. Cao, “(Cross-) Browser Fingerprinting via OS and Hardware Level Features,” 24nd Annual Network and Distributed System Security Symposium, NDSS'17, no. March, 2017.
P. Eckersley, “How unique is your web browser?” Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS), 2010.
S. Englehardt and A. Narayanan, “Online Tracking: A 1-million-site Measurement and Analysis,” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, no. 1, pp. 1388-1401, 2016.
D. Fifield and S. Egelman, “Fingerprinting web users through font metrics,” Financial Cryptography and Data Security, vol. 8975, pp.
T. Hupperich, D. Maiorca, M. Ku¨ hrer, T. Holz, and G. Giacinto, “On the Robustness of Mobile Device Fingerprinting,” Proceedings of the 31st Annual Computer Security Applications Conference, pp. 191-200, 2015. [Online]. Available: http://dl.acm.org/citation.cfm? doid=2818000.2818032 P. Laperdrix, B. Baudry, and V. Mishra, “FPRandom: Randomizing core browser objects to break advanced device fingerprinting techniques,” Proceedings - 9th Int. Symposium on Engineering Secure Software and Systems, ESSoS 2017, Jul. 2017. [Online]. Available: https://hal.inria.fr/hal-01527580 P. Laperdrix, W. Rudametkin, and B. Baudry, “Mitigating Browser Fingerprint Tracking: Multi-level Reconfiguration and Diversification,” Proceedings - 10th Int. Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2015, pp. 98-108, 2015.
[Online]. Available: https://hal.inria.fr/hal-01121108 --, “Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints,” Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016, pp. 878-894, 2016.