2016 IEEE Trustcom/BigDataSE/Ispa 2016
DOI: 10.1109/trustcom.2016.0057
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprinting for Web Applications: From Devices to Related Groups

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…The attacker can retrieve the attributes of the fingerprinting probe (assumption 3) by reverse-engineering the probe (e.g., static or dynamic analysis of the probe [6], analysis of the network packets). The attacker knows the domain of the fingerprints, and can infer a fingerprint distribution (assumption 4) from documentation [47], datasets 8 , or statistics 9 available online. He can also leverage phishing attacks [57], a pool of controlled browsers [41], or stolen fingerprints [34].…”
Section: Attack Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…The attacker can retrieve the attributes of the fingerprinting probe (assumption 3) by reverse-engineering the probe (e.g., static or dynamic analysis of the probe [6], analysis of the network packets). The attacker knows the domain of the fingerprints, and can infer a fingerprint distribution (assumption 4) from documentation [47], datasets 8 , or statistics 9 available online. He can also leverage phishing attacks [57], a pool of controlled browsers [41], or stolen fingerprints [34].…”
Section: Attack Modelmentioning
confidence: 99%
“…The Attribute Selection Problem consists in finding the attribute set that provides the lowest usability cost and keeps the sensitivity below a threshold α set by the verifier 15 . Let A denote the set of 8 https://www.henning-tillmann.de/en/2014/05/browser-fingerprinting-93-of-alluser-configurations-are-unique 9 http://carat.cs.helsinki.fi/statistics 10 We do not consider the attackers that exactly know the fingerprint of the users they target (or their local configuration) because they are able to bypass trivially any fingerprinting authentication mechanism. 11 These tools are able to control both the fixed and the dynamic attributes.…”
Section: Attribute Selection Problemmentioning
confidence: 99%
See 2 more Smart Citations
“…HyperText Markup Language (HTML) and JavaScript jQuery are adopted to develop the front-end interface and associated functions. Several web applications and platforms [13]- [15] were implemented for fingerprinting information and recognition. In order to interact with the images, it is necessary to have a listener (handler) to catch and process mouse event including mouse move, click down and up.…”
Section: A Front-end Functionsmentioning
confidence: 99%