2014
DOI: 10.1007/978-3-319-11599-3_11
|View full text |Cite
|
Sign up to set email alerts
|

Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach

Abstract: Abstract. Web tracking companies use device fingerprinting to distinguish the users of the websites by checking the numerous properties of their machines and web browsers. One way to protect the users' privacy is to make them switch between different machine and browser configurations. We propose a formalisation of this privacy enforcement mechanism. We use information-theoretic channels to model the knowledge of the tracker and the fingerprinting program, and show how to synthesise a randomisation mechanism t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…For the latter three analysis methods, we varied the number of samples taken n. For analysis CE, n is interpreted as the number of samples to try per polyhedron before giving up trying to find a "valid sample." 5 For analysis S, n is the number of samples, distributed proportionally across all the polyhedra in the powerset. For analysis CE+S, n is the combination of the two.…”
Section: Analysis Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…For the latter three analysis methods, we varied the number of samples taken n. For analysis CE, n is interpreted as the number of samples to try per polyhedron before giving up trying to find a "valid sample." 5 For analysis S, n is the number of samples, distributed proportionally across all the polyhedra in the powerset. For analysis CE+S, n is the combination of the two.…”
Section: Analysis Methodsmentioning
confidence: 99%
“…Range Private? ShipID Integer 1-10 No NationID Integer [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] No Capacity Integer 0-1000 Yes Latitude Integer -900,000-900,000…”
Section: Typementioning
confidence: 99%
See 2 more Smart Citations
“…In recent work, Besson et al [6] modeled the problem of privacy protection against fingerprinting and provided upper bounds for the identifiability of each user under different randomization algorithms and usability constraints. Side channels: Researchers have proposed a variety of side channels for browser fingerprinting which have not yet been discovered to be used in practice.…”
Section: History Of Fingerprintingmentioning
confidence: 99%