{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:28:41Z","timestamp":1766449721108,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662478530"},{"type":"electronic","value":"9783662478547"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-47854-7_7","type":"book-chapter","created":{"date-parts":[[2015,7,15]],"date-time":"2015-07-15T10:06:28Z","timestamp":1436954788000},"page":"107-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["Fingerprinting Web Users Through Font Metrics"],"prefix":"10.1007","author":[{"given":"David","family":"Fifield","sequence":"first","affiliation":[]},{"given":"Serge","family":"Egelman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,16]]},"reference":[{"key":"7_CR1","unstructured":"DejaVu fonts full changelog (version 2.34). http:\/\/dejavu-fonts.org\/wiki\/Full_changelog"},{"key":"7_CR2","unstructured":"FireGloves. http:\/\/fingerprint.pet-portal.eu\/?menu=6"},{"key":"7_CR3","unstructured":"Tails. https:\/\/tails.boum.org\/"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A., Diaz, C.: The Web never forgets: persistent tracking mechanisms in the wild. In: Proceedings of the 21st ACM conference on Computer and Communications Security (CCS 2014), November 2014. https:\/\/securehomes.esat.kuleuven.be\/gacar\/persistent\/the_web_never_forgets.pdf","DOI":"10.1145\/2660267.2660347"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Acar, G., Juarez, M., Nikiforakis, N., Diaz, C., G\u00fcrses, S., Piessens, F., Preneel, B.: FPDetective: dusting the web for fingerprinters. In: Proceedings of the 20th ACM conference on Computer and Communications Security (CCS 2013), November 2013. https:\/\/www.cosic.esat.kuleuven.be\/publications\/article-2334.pdf","DOI":"10.1145\/2508859.2516674"},{"key":"7_CR6","unstructured":"Czyborra, R.: GNU Unifont. http:\/\/unifoundry.com\/unifont.html"},{"key":"7_CR7","unstructured":"Daggett, J.: CSS fonts module level 3. Candidate recommendation, W3C, October 2013. http:\/\/www.w3.org\/TR\/2013\/CR-css-fonts-3-20131003\/"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Eckersley, P.: How unique is your web browser? In: Proceedings of the 10th Privacy Enhancing Technologies Symposium, pp. 1\u201318, July 2010. https:\/\/panopticlick.eff.org\/browser-uniqueness.pdf","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"7_CR9","unstructured":"Fifield, D.: #13313: Enable bundled fonts in Tor Browser, October 2014. https:\/\/trac.torproject.org\/projects\/tor\/ticket\/13313"},{"key":"7_CR10","unstructured":"FontShop International: OpenType user guide, April 2012. https:\/\/www.fontfont.com\/staticcontent\/downloads\/FF_OT_User_Guide.pdf"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Heiderich, M., Niemietz, M., Schuster, F., Holz, T., Schwenk, J.: Scriptless attacks: Stealing the pie without touching the sill. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 760\u2013771. ACM, New York, NY, USA (2012). http:\/\/www.nds.rub.de\/media\/emma\/veroeffentlichungen\/2012\/08\/16\/scriptlessAttacks-ccs2012.pdf","DOI":"10.1145\/2382196.2382276"},{"key":"7_CR12","unstructured":"Kim, D.: Detection and prevention of web-based device fingerprinting. In: 2014 IEEE Symposium on Security and Privacy, May 2014. http:\/\/www.cs.utexas.edu\/dkim\/papers\/webfingerprint-poster_sp14.pdf"},{"key":"7_CR13","unstructured":"Libertine Open Fonts Project: Linux Libertine. http:\/\/www.linuxlibertine.org\/"},{"key":"7_CR14","unstructured":"Lie, H.W., \u00c7elik, T., Bos, B., Hickson, I.: Cascading style sheets level 2 revision 1 (CSS 2.1) specification. W3C recommendation, W3C, June 2011. http:\/\/www.w3.org\/TR\/2011\/REC-CSS2-20110607"},{"key":"7_CR15","unstructured":"Mowery, K., Bogenreif, D., Yilek, S., Shacham, H.: Fingerprinting information in JavaScript implementations. In: Wang, H. (ed.) Proceedings of W2SP 2011. IEEE Computer Society, May 2011. https:\/\/cseweb.ucsd.edu\/hovav\/dist\/jspriv.pdf"},{"key":"7_CR16","unstructured":"Mowery, K., Shacham, H.: Pixel perfect: Fingerprinting canvas in HTML5. In: Fredrikson, M. (ed.) Proceedings of W2SP 2012. IEEE Computer Society, May 2012. https:\/\/cseweb.ucsd.edu\/hovav\/dist\/canvas.pdf"},{"key":"7_CR17","unstructured":"Mulazzani, M., Reschl, P., Huber, M., Leithner, M., Schrittwieser, S., Weippl, E.: Fast and reliable browser identification with javascript engine fingerprinting. In: Web 2.0 Workshop on Security and Privacy (W2SP), May 2013. http:\/\/www.sba-research.org\/wp-content\/uploads\/publications\/jsfingerprinting.pdf"},{"key":"7_CR18","unstructured":"Navara, E.D., Berjon, R., Leithead, T., O\u2019Connor, E., Pfeiffer, S., Faulkner, S.: HTML5. Candidate recommendation, W3C, February 2014. http:\/\/www.w3.org\/TR\/2014\/CR-html5-20140731\/"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: exploring the ecosystem of web-based device fingerprinting. In: Proceedings of the 2013 IEEE Symposium on Security and Privacy, pp. 541\u2013555. SP 2013, IEEE Computer Society, Washington, DC, USA (2013). https:\/\/seclab.cs.ucsb.edu\/media\/uploads\/papers\/sp2013_cookieless.pdf","DOI":"10.1109\/SP.2013.43"},{"key":"7_CR20","unstructured":"Patel, L.: JavaScript\/CSS font detector, March 2007. http:\/\/www.lalit.org\/lab\/javascript-css-font-detect\/"},{"key":"7_CR21","unstructured":"Perry, M.: #2872: Limit the fonts available in TorBrowser, April 2011. https:\/\/trac.torproject.org\/projects\/tor\/ticket\/2872"},{"key":"7_CR22","unstructured":"Perry, M.: Bug 732096 - Add a preference to prevent local font enumeration, comment 18, March 2012. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=732096#c18"},{"key":"7_CR23","unstructured":"Perry, M., Clark, E., Murdoch, S.: The design and implementation of the Tor Browser. Technocal report, Mar 2013. https:\/\/www.torproject.org\/projects\/torbrowser\/design\/"},{"key":"7_CR24","unstructured":"Russell, K.: Issue 66078: Background tabs with webgl slow down browser due to missing flow control, December 2010. https:\/\/code.google.com\/p\/chromium\/issues\/detail?id=66078"},{"key":"7_CR25","unstructured":"Unicode Inc: Blocks (Unicode character database), April 2014. http:\/\/www.unicode.org\/Public\/7.0.0\/ucd\/Blocks.txt"},{"key":"7_CR26","unstructured":"Unicode Inc: DerivedAge (Unicode character database), May 2014. http:\/\/www.unicode.org\/Public\/7.0.0\/ucd\/DerivedAge.txt"},{"key":"7_CR27","unstructured":"Zbarsky, B.: Bug 633421 - Clamp setTimeout\/setInterval to something higher than 10ms in inactive tabs, February 2011. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=633421"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-47854-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T09:41:59Z","timestamp":1676972519000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-47854-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662478530","9783662478547"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-47854-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"16 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}