Device fingerprinting for augmenting web authentication: classification and analysis of methods
F Alaca, PC Van Oorschot - Proceedings of the 32nd annual conference …, 2016 - dl.acm.org
Device fingerprinting is commonly used for tracking users. We explore device fingerprinting
but in the specific context of use for augmenting authentication, providing a state-of-the-art …
but in the specific context of use for augmenting authentication, providing a state-of-the-art …
Mobile device fingerprinting considered harmful for risk-based authentication
J Spooren, D Preuveneers, W Joosen - Proceedings of the eighth …, 2015 - dl.acm.org
In this paper, we present a critical assessment of the use of device fingerprinting for risk-
based authentication in a state-of-practice identity and access management system. Risk …
based authentication in a state-of-practice identity and access management system. Risk …
Accelerometer-based device fingerprinting for multi-factor mobile authentication
T Van Goethem, W Scheepers, D Preuveneers… - … Secure Software and …, 2016 - Springer
Due to the numerous data breaches, often resulting in the disclosure of a substantial amount
of user passwords, the classic authentication scheme where just a password is required to …
of user passwords, the classic authentication scheme where just a password is required to …
Phish in sheep's clothing: Exploring the authentication pitfalls of browser fingerprinting
As users navigate the web they face a multitude of threats; among them, attacks that result in
account compromise can be particularly devastating. In a world fraught with data breaches …
account compromise can be particularly devastating. In a world fraught with data breaches …
Fingerprint attack against touch-enabled devices
Oily residues left by tapping fingers on a touch screen may breach user privacy. In this
paper, we introduce the fingerprint attack against touch-enabled devices. We dust the touch …
paper, we introduce the fingerprint attack against touch-enabled devices. We dust the touch …
Fingerprinting mobile devices using personalized configurations
Recently, Apple removed access to various device hardware identifiers that were frequently
misused by iOS third-party apps to track users. We are, therefore, now studying the extent to …
misused by iOS third-party apps to track users. We are, therefore, now studying the extent to …
On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms?
Client fingerprinting techniques enhance classical cookie-based user tracking to increase
the robustness of tracking techniques. A unique identifier is created based on characteristic …
the robustness of tracking techniques. A unique identifier is created based on characteristic …
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
N Nikiforakis, A Kapravelos, W Joosen… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
The web has become an essential part of our society and is currently the main medium of
information delivery. Billions of users browse the web on a daily basis, and there are single …
information delivery. Billions of users browse the web on a daily basis, and there are single …
FPDetective: dusting the web for fingerprinters
In the modern web, the browser has emerged as the vehicle of choice, which users are to
trust, customize, and use, to access a wealth of information and online services. However …
trust, customize, and use, to access a wealth of information and online services. However …
Long-term observation on browser fingerprinting: Users' trackability and perspective
G Pugliese, C Riess, F Gassmann… - Proceedings on Privacy …, 2020 - petsymposium.org
Browser fingerprinting as a tracking technique to recognize users based on their browsers'
unique features or behavior has been known for more than a decade. We present the results …
unique features or behavior has been known for more than a decade. We present the results …