XHOUND: Quantifying the Fingerprintability of Browser Extensions
暂无分享,去创建一个
[1] Niels Provos,et al. Trends and Lessons from Three Years Fighting Malicious Extensions , 2015, USENIX Security Symposium.
[2] Sándor Imre,et al. User Tracking on the Web via Cross-Browser Fingerprinting , 2011, NordSec.
[3] Sjouke Mauw,et al. FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting , 2015, ESORICS.
[4] Hovav Shacham,et al. Fingerprinting Information in JavaScript Implementations , 2011 .
[5] Thorsten Holz,et al. On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms? , 2015, ACSAC 2015.
[6] Christopher Krügel,et al. Hulk: Eliciting Malicious Behavior in Browser Extensions , 2014, USENIX Security Symposium.
[7] Wouter Joosen,et al. Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting , 2013, 2013 IEEE Symposium on Security and Privacy.
[8] Andrei Sabelfeld,et al. Discovering Browser Extensions via Web Accessible Resources , 2017, CODASPY.
[9] Walter Rudametkin,et al. Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[10] Tadayoshi Kohno,et al. Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 , 2016, USENIX Security Symposium.
[11] Vern Paxson,et al. Ad Injection at Scale: Assessing Deceptive Advertisement Modifications , 2015, 2015 IEEE Symposium on Security and Privacy.
[12] Song Li,et al. (Cross-)Browser Fingerprinting via OS and Hardware Level Features , 2017, NDSS.
[13] Edward W. Felten,et al. Timing attacks on Web privacy , 2000, CCS.
[14] Wouter Joosen,et al. PriVaricator: Deceiving Fingerprinters with Little White Lies , 2015, WWW.
[15] Arvind Narayanan,et al. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild , 2014, CCS.
[16] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[17] Frank Piessens,et al. FPDetective: dusting the web for fingerprinters , 2013, CCS.
[18] Wenyuan Xu,et al. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable , 2014, NDSS.
[19] Wei Meng,et al. Understanding Malvertising Through Ad-Injecting Browser Extensions , 2015, WWW.
[20] Dan Boneh,et al. Exposing private information by timing web applications , 2007, WWW '07.
[21] Serge Egelman,et al. Fingerprinting Web Users Through Font Metrics , 2015, Financial Cryptography.
[22] Edgar R. Weippl,et al. Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[23] Nikita Borisov,et al. Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components , 2014, CCS.
[24] Xiangyu Liu,et al. Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound , 2014, CCS.