A survey of browser fingerprint research and application

D Zhang, J Zhang, Y Bu, B Chen… - … and Mobile Computing, 2022 - Wiley Online Library
With the development of modern browsing, the convenience brought by rich browser
features has also produced a large number of features, which are called browser …

Browser fingerprinting: A survey

P Laperdrix, N Bielova, B Baudry… - ACM Transactions on the …, 2020 - dl.acm.org
With this article, we survey the research performed in the domain of browser fingerprinting,
while providing an accessible entry point to newcomers in the field. We explain how this …

Mininode: Reducing the attack surface of node. js applications

I Koishybayev, A Kapravelos - … on Research in Attacks, Intrusions and …, 2020 - usenix.org
JavaScript has gained traction as a programming language that qualifies for both the client-
side and the server-side logic of applications. A new ecosystem of server-side code written …

Defending novice user privacy: An evaluation of default web browser configurations

K Radivojevic, N Clark, A Klempay, P Brenner - Computers & Security, 2024 - Elsevier
Cyber novices often enter sensitive data into web browsers for routine activities such as
online shop** and bill payments, making them targets for malicious entities, including …

Fingerprinting in style: Detecting browser extensions via injected style sheets

P Laperdrix, O Starov, Q Chen, A Kapravelos… - 30th USENIX Security …, 2021 - usenix.org
Browser extensions enhance the web experience and have seen great adoption from users
in the past decade. At the same time, past research has shown that online trackers can use …

[PDF][PDF] Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting.

S Karami, P Ilia, K Solomos, J Polakis - In Proceedings of the 27th …, 2020 - par.nsf.gov
With users becoming increasingly privacy-aware and browser vendors incorporating anti-
tracking mechanisms, browser fingerprinting has garnered significant attention. Accordingly …

I'm spartacus, no, i'm spartacus: Proactively protecting users from phishing by intentionally triggering cloaking behavior

P Zhang, Z Sun, S Kyung, HW Behrens… - Proceedings of the …, 2022 - dl.acm.org
Phishing is a ubiquitous and increasingly sophisticated online threat. To evade mitigations,
phishers try to" cloak" malicious content from defenders to delay their appearance on …

The dangers of human touch: fingerprinting browser extensions through user actions

K Solomos, P Ilia, S Karami, N Nikiforakis… - 31st USENIX Security …, 2022 - usenix.org
Browser extension fingerprinting has garnered considerable attention recently due to the
twofold privacy loss that it incurs. Apart from facilitating tracking by augmenting browser …

{PhishPrint}: evading phishing detection crawlers by prior profiling

B Acharya, P Vadrevu - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
Security companies often use web crawlers to detect phishing and other social engineering
attack websites. We built a novel, scalable, low-cost framework named PhishPrint to enable …

[PDF][PDF] Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites.

S Wu, P Sun, Y Zhao, Y Cao - NDSS, 2023 - yinzhicao.org
Browser fingerprints, while traditionally being used for web tracking, have recently been
adopted more and more often for defense or detection of various attacks targeting realworld …