Escaping the confines of time: Continuous browser extension fingerprinting through ephemeral modifications

K Solomos, P Ilia, N Nikiforakis, J Polakis - Proceedings of the 2022 …, 2022 - dl.acm.org
Browser fingerprinting continues to proliferate across the web. Critically, popular
fingerprinting libraries have started incorporating extension-fingerprinting capabilities, thus …

Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's {Privacy-Preserving} Targeted Advertising

G Calderonio, MM Ali, J Polakis - 33rd USENIX Security Symposium …, 2024 - usenix.org
Google recently announced plans to phase out third-party cookies and is currently in the
process of rolling out the Chrome Privacy Sandbox, a collection of APIs and web standards …

Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses

X Lin, F Araujo, T Taylor, J Jang… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Browser fingerprinting remains a topic of particular interest for both the research community
and the browser ecosystem, and various anti-fingerprinting countermeasures have been …

What is in the Chrome Web Store?

S Hsu, M Tran, A Fass - Proceedings of the 19th ACM Asia Conference …, 2024 - dl.acm.org
This paper is the first attempt at providing a holistic view of the Chrome Web Store (CWS).
We leverage historical data provided by ChromeStats to study global trends in the CWS and …

Read between the lines: Detecting tracking javascript with bytecode classification

M Ghasemisharif, J Polakis - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Browsers and extensions that aim to block online ads and tracking scripts predominantly rely
on rules from filter lists for determining which resource requests must be blocked. These filter …

Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem

M Zaeifi, F Kalantari, A Oest, Z Sun, GJ Ahn… - Proceedings of the …, 2024 - dl.acm.org
Online services leverage various authentication methods with differing usability and
reliability trade-offs, such as password-based or multi-factor authentication (MFA). However …

[PDF][PDF] Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors

MM Ali, B Chitale, M Ghasemisharif, C Kanich… - … and Distributed System …, 2023 - par.nsf.gov
ÐModern web browsers constitute complex application platforms with a wide range of APIs
and features. Critically, this includes a multitude of heterogeneous mechanisms that allow …

Peeking through the window: Fingerprinting Browser Extensions through Page-Visible Execution Traces and Interactions

S Agarwal, A Fass, B Stock - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Browser extensions are third-party add-ons that provide myriads of features to their users
while browsing on the Web. Extensions often interact with the websites a user visits and …

Browser Polygraph: Efficient Deployment of Coarse-Grained Browser Fingerprints for Web-Scale Detection of Fraud Browsers

F Kalantari, M Zaeifi, Y Safaei, M Bitaab… - Proceedings of the …, 2024 - dl.acm.org
In this paper, we address the prevalent issue of account takeover (ATO) fraud, which
significantly impacts businesses through stolen user information. Websites have adopted …

Only Pay for What You Leak: Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense

R Torok, A Levy - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
We present Sandcastle, an entropy-based browser fingerprinting defense that aims to
minimize its interference with legitimate web applications. Sandcastle allows developers to …