{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:12:45Z","timestamp":1725909165096},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319655208"},{"type":"electronic","value":"9783319655215"}],"license":[{"start":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T00:00:00Z","timestamp":1503532800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-65521-5_44","type":"book-chapter","created":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T02:33:50Z","timestamp":1503455630000},"page":"504-517","source":"Crossref","is-referenced-by-count":1,"title":["Tor Fingerprinting: Tor Browser Can Mitigate Browser Fingerprinting?"],"prefix":"10.1007","author":[{"given":"Takamichi","family":"Saito","sequence":"first","affiliation":[]},{"given":"Kazushi","family":"Takahashi","sequence":"additional","affiliation":[]},{"given":"Koki","family":"Yasuda","sequence":"additional","affiliation":[]},{"given":"Kazuhisa","family":"Tanabe","sequence":"additional","affiliation":[]},{"given":"Masayuki","family":"Taneoka","sequence":"additional","affiliation":[]},{"given":"Ryohei","family":"Hosoya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,24]]},"reference":[{"key":"44_CR1","unstructured":"Ball, J., Schneier, B., Greenwald, G.: NSA and GCHQ target Tor network that protects anonymity of web users. http:\/\/www.theguardian.com\/world\/2013\/oct\/04\/nsa-gchq-attack-tor-network-encryption . Last accessed 15 Feb 2016"},{"key":"44_CR2","doi-asserted-by":"crossref","unstructured":"de Montjoye, Y.A., Radaelli, L., Singh, V.K., Pentland, A.: Science 347, 536\u2013539 (2015)","DOI":"10.1126\/science.1256297"},{"key":"44_CR3","unstructured":"Tor project: FAQ. https:\/\/www.torproject.org\/docs\/faq.html.en . Last accessed 15 Feb 2016"},{"key":"44_CR4","unstructured":"W3techs. http:\/\/w3techs.com . Last accessed 15 Feb 2016"},{"key":"44_CR5","unstructured":"OpenAM. http:\/\/openam.forgerock.org\/ . Last accessed 15 Feb 2016"},{"key":"44_CR6","unstructured":"Tor project. https:\/\/www.torproject.org\/ . Last accessed 15 Feb 2016"},{"key":"44_CR7","unstructured":"Perry, M., Perry, E., Murdoch, S.: The Design and Implementation of the Tor Browser DRAFT. https:\/\/www.torproject.org\/projects\/torbrowser\/design\/ . Last accessed 15 Feb 2015"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Panchenko, A., Niessen L., Zinnen, A., Engel, T.: Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th ACM Workshop on Privacy in the Electronic Society (2011)","DOI":"10.1145\/2046556.2046570"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Eckersley, P.: How Unique is Your Web Browser? In: Proceedings of the Privacy Enhancing Technologies Symposium. LNCS, vol. 6205 (2010)","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"44_CR10","unstructured":"The WebKit Open Source Project. https:\/\/trac.webkit.org\/wiki\/Fingerprinting . Last accessed 15 Feb 2016"},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Takei, N., Saito, T., Takasu, K., Yamada, T.: Web browser fingerprinting using only cascading style sheets. In: Proceedings of the 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) (2015)","DOI":"10.1109\/BWCCA.2015.105"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Takasu, K., Saito, T., Yamada, T., Ishikawa, T.: A survey of hardware features in modern browsers: 2015 edition. In: Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2015) (2015)","DOI":"10.1109\/IMIS.2015.72"},{"key":"44_CR13","unstructured":"Mozilla wiki. https:\/\/wiki.mozilla.org\/fingerprinting . Last accessed 15 Feb 2016"},{"key":"44_CR14","unstructured":"Kwon, A., AlSabah, M., Lazar, D., Dacier, M., Devadas, S.: Circuit fingerprinting attacks: passive deanonymization of tor hidden services. In: Proceedings of the USENIX 2015 (2015)"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Boda, K., F\u00f6ldes, A., Guly\u00e1s, G., Imre, S.: User Tracking on the web via cross-browser fingerprinting. In: Proceedings of the 16th Nordic Conference on Information Security Technology for Applications (2011)","DOI":"10.1007\/978-3-642-29615-4_4"},{"key":"44_CR16","unstructured":"Kiryu, N., Iso, Y., Kaneko, Y., Saito, T.: Estimation of Number of CPU Cores Using with Web Workers. In: Proceedings of the Computer Security Symposium (CSS 2014) (2014). (in Japanese)"},{"key":"44_CR17","unstructured":"Panopticlick, How unique and trackable is your browser? https:\/\/panopticlick.eff.org . Last accessed 15 Feb 2016"},{"key":"44_CR18","unstructured":"NoScript. https:\/\/noscript.net\/ . Last accessed 1 Feb 2015"},{"key":"44_CR19","doi-asserted-by":"crossref","unstructured":"Fifield, D., Egelman, S.: Fingerprinting web users through font metrics. In: Proceedings of the Financial Cryptography and Data Security 2015. Lecture Notes in Computer Science, vol. 8975 (2015)","DOI":"10.1007\/978-3-662-47854-7_7"},{"key":"44_CR20","unstructured":"Iovation Inc. https:\/\/www.iovation.com . Last accessed 15 Feb 2016"},{"key":"44_CR21","unstructured":"BlueCava Inc. http:\/\/www.bluecava.com . Last accessed 15 Feb 2016"},{"key":"44_CR22","unstructured":"41st Parameter Inc. http:\/\/www.the41.com\/ . Last accessed 1 May 2015"},{"key":"44_CR23","unstructured":"AddThis Inc. http:\/\/www.addthis.com\/ . Last accessed 15 Feb 2016"},{"key":"44_CR24","unstructured":"ThreatMetrix, https:\/\/www.threatmetrix.com\/ . Last accessed 15 Feb 2016"},{"key":"44_CR25","unstructured":"Mowery, K., Shacham, H.: Pixel Perfect: Fingerprinting Canvas in HTML5. In: Proceedings of the Web 2.0 Security and Privacy (W2SP) (2012)"},{"key":"44_CR26","unstructured":"Kiryu, N., Goto, H., Saito T.: A proposal of estimating of CPU architectures by JavaScript engine. In: Proceedings of the 75th National Convention of Information Processing Society of Japan (IPSJ) (2013). (in Japanese)"},{"key":"44_CR27","first-page":"46","volume":"32","author":"A Faizkhademi","year":"2015","unstructured":"Faizkhademi, A., Zulkernine, M., Weldemariam, K.: Empirical evaluation of web-based fingerprinting. IEEE Softw. 32, 46\u201352 (2015)","journal-title":"IEEE Softw."},{"issue":"1","key":"44_CR28","first-page":"313","volume":"9","author":"T Lu","year":"2015","unstructured":"Lu, T., Yao, P., Zhao, L., Li, Y., Xie, F., Xia, Y.: Towards attacks and defenses of anonymous communication systems. Int. J. Secur. Appl. 9(1), 313\u2013328 (2015)","journal-title":"Int. J. Secur. Appl."},{"key":"44_CR29","doi-asserted-by":"crossref","unstructured":"Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: exploring the ecosystem of Web-based device fingerprinting. In: Proceedings of the 34th IEEE Symposium of Security and Privacy (IEEE S&P 2013) (2013)","DOI":"10.1109\/SP.2013.43"},{"key":"44_CR30","unstructured":"Boda, K., F\u00f6ldes, \u00c1.M., Guly\u00e1s, G.G., Imre, S.: Tracking and Fingerprinting in E-Business: New Storageless Technologies and Countermeasures (2013)"},{"key":"44_CR31","doi-asserted-by":"crossref","unstructured":"Upathilake, R., Yingkun, L., Matrawy, A.: A classification of web browser fingerprinting techniques. In: Proceedings of the IFIP New Technologies, Mobility, and Security (NTMS), pp. 1\u20135 (2015)","DOI":"10.1109\/NTMS.2015.7266460"},{"key":"44_CR32","unstructured":"Goodin, D.: How the NSA might use Hotmail, Yahoo or other cookies to identify Tor users. http:\/\/arstechnica.com\/security\/2013\/10\/how-the-nsa-might-use-hotmail-or-yahoo-cookies-to-identify-tor-users\/ . Last accessed 15 Feb 2016"},{"key":"44_CR33","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of 13th USENIX Security Symposium (2004)","DOI":"10.21236\/ADA465464"},{"key":"44_CR34","unstructured":"Alexa Internet, Inc. http:\/\/www.alexa.com . Last accessed 15 Feb 2016"},{"key":"44_CR35","unstructured":"Doty, N.: Fingerprinting guidance for Web specification authors. http:\/\/w3c.github.io\/fingerprinting-guidance\/ . Last accessed 16 Feb 2016"},{"key":"44_CR36","unstructured":"Mulazzani, M., Reschl, P., Huber, M., Leithner, M., Schrittwieser, S., Weippl, E.: Fast and reliable browser identification with JavaScript engine fingerprinting. In: Proceedings of Web 2.0 Workshop on Security and Privacy (W2SP) (2013)"},{"key":"44_CR37","unstructured":"Norte, J.: Advanced Tor Browser Fingerprinting. http:\/\/jcarlosnorte.com\/security\/2016\/03\/06\/advanced-tor-browser-fingerprinting.html . Last accessed 15 May 2016"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Network-Based Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65521-5_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T17:49:22Z","timestamp":1570038562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65521-5_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,24]]},"ISBN":["9783319655208","9783319655215"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65521-5_44","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,8,24]]}}}