Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser Fingerprinting
暂无分享,去创建一个
[1] Song Li,et al. Deterministic Browser , 2017, CCS.
[2] Mathias Payer,et al. Milkomeda: Safeguarding the Mobile GPU Interface Using WebGL Security Checks , 2018, CCS.
[3] Frank Piessens,et al. FPDetective: dusting the web for fingerprinters , 2013, CCS.
[4] David Wetherall,et al. Detecting and Defending Against Third-Party Tracking on the Web , 2012, NSDI.
[5] Peng Li,et al. StopWatch: A Cloud Architecture for Timing Channel Mitigation , 2014, TSEC.
[6] Balachander Krishnamurthy,et al. Characterizing privacy in online social networks , 2008, WOSN '08.
[7] Michael K. Reiter,et al. Cross-VM side channels and their use to extract private keys , 2012, CCS.
[8] Ashay Rane,et al. Secure, Precise, and Fast Floating-Point Operations on x86 Processors , 2016, USENIX Security Symposium.
[9] Helen J. Wang,et al. BrowserShield: vulnerability-driven filtering of dynamic HTML , 2006, OSDI '06.
[10] Deian Stefan,et al. Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling , 2013, ESORICS.
[11] Walter Rudametkin,et al. Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[12] Benjamin Livshits,et al. AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications , 2007, TWEB.
[13] Edward W. Felten,et al. Timing attacks on Web privacy , 2000, CCS.
[14] Deian Stefan,et al. A Library for Removing Cache-Based Attacks in Concurrent Information Flow Systems , 2013, TGC.
[15] Balachander Krishnamurthy,et al. Privacy leakage vs . Protection measures : the growing disconnect , 2011 .
[16] Carsten Willems,et al. Practical Timing Side Channel Attacks against Kernel Space ASLR , 2013, 2013 IEEE Symposium on Security and Privacy.
[17] Balachander Krishnamurthy,et al. Generating a privacy footprint on the internet , 2006, IMC '06.
[18] Deian Stefan,et al. Towards Verified, Constant-time Floating Point Operations , 2018, CCS.
[19] Tadayoshi Kohno,et al. Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 , 2016, USENIX Security Symposium.
[20] Balachander Krishnamurthy,et al. WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Privacy Diffusion on the Web: A Longitudinal Perspective , 2022 .
[21] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[22] Song Li,et al. (Cross-)Browser Fingerprinting via OS and Hardware Level Features , 2017, NDSS.
[23] Herbert Bos,et al. ASLR on the Line: Practical Cache Attacks on the MMU , 2017, NDSS.
[24] Chris Kanich,et al. Browser Feature Usage on the Modern Web , 2016, Internet Measurement Conference.
[25] Úlfar Erlingsson,et al. IRM enforcement of Java stack inspection , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[26] Peng Li,et al. Mitigating access-driven timing channels in clouds using StopWatch , 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[27] Bin Liu,et al. WebShield: Enabling Various Web Defense Techniques without Client Side Modifications , 2011, NDSS.
[28] Wouter Joosen,et al. The Clock is Still Ticking: Timing Attacks in the Modern Web , 2015, CCS.
[29] Arvind Narayanan,et al. Online Tracking: A 1-million-site Measurement and Analysis , 2016, CCS.
[30] Weiyi Wu,et al. Deterministically Deterring Timing Attacks in Deterland , 2015, 1504.07070.
[31] Romain Rouvoy,et al. Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies , 2018, USENIX Security Symposium.
[32] Hovav Shacham,et al. On the effectiveness of mitigations against floating-point timing channels , 2017, USENIX Security Symposium.
[33] Michael K. Reiter,et al. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis , 2011, 2011 IEEE Symposium on Security and Privacy.
[34] Arvind Narayanan,et al. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild , 2014, CCS.
[35] Hovav Shacham,et al. Pixel Perfect : Fingerprinting Canvas in HTML 5 , 2012 .
[36] Wouter Joosen,et al. Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting , 2013, 2013 IEEE Symposium on Security and Privacy.
[37] E. Weippl,et al. Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting , 2013 .
[38] Hovav Shacham,et al. Fingerprinting Information in JavaScript Implementations , 2011 .
[39] Angelos D. Keromytis,et al. The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications , 2015, CCS.
[40] Wouter Joosen,et al. Request and Conquer: Exposing Cross-Origin Resource Size , 2016, USENIX Security Symposium.
[41] Daniel Gruss,et al. JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks , 2018, NDSS.
[42] Stefan Katzenbeisser,et al. Hide and Seek in Time - Robust Covert Timing Channels , 2009, ESORICS.
[43] Xiang Pan. I Do Not Know What You Visited Last Summer : Protecting Users from Third-party Web Tracking with TrackingFree Browser , 2015 .
[44] Nael B. Abu-Ghazaleh,et al. Rendered Insecure: GPU Side Channel Attacks are Practical , 2018, CCS.
[45] Martín Abadi,et al. Host Fingerprinting and Tracking on the Web: Privacy and Security Implications , 2012, NDSS.
[46] Ramakrishna Gummadi,et al. Determinating timing channels in compute clouds , 2010, CCSW '10.
[47] Dan Boneh,et al. Exposing private information by timing web applications , 2007, WWW '07.
[48] Serge Egelman,et al. Fingerprinting Web Users Through Font Metrics , 2015, Financial Cryptography.
[49] Wouter Joosen,et al. PriVaricator: Deceiving Fingerprinters with Little White Lies , 2015, WWW.