{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:25:00Z","timestamp":1771457100746,"version":"3.50.1"},"reference-count":81,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179437","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"987-1004","source":"Crossref","is-referenced-by-count":9,"title":["Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses"],"prefix":"10.1109","author":[{"given":"Xu","family":"Lin","sequence":"first","affiliation":[{"name":"University of Illinois,Chicago"}]},{"given":"Frederico","family":"Araujo","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Teryl","family":"Taylor","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Jiyong","family":"Jang","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Jason","family":"Polakis","sequence":"additional","affiliation":[{"name":"University of Illinois,Chicago"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Internet jones and the raiders of the lost trackers: An archaeological study of web tracking from 1996 to 2016","volume-title":"Proc. USENIX Security Sym","author":"Lerner"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/sp40000.2020.00005"},{"key":"ref3","article-title":"WebKit - Full Third-Party Cookie Blocking and More"},{"key":"ref4","article-title":"Firefox 85 Cracks Down on Super-cookies","author":"Englehardt","year":"2021"},{"key":"ref5","article-title":"Partitioning Network-State for Privacy","author":"Snyder","year":"2021"},{"key":"ref6","article-title":"Realclearpolicy - congress is finally listening to consumers on internet privacy","author":"Boucher","year":"2020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref8","article-title":"California consumer privacy act (ccpa) website policy"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0053"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23152"},{"key":"ref15","article-title":"Pixel perfect: Fingerprinting canvas in html5","volume-title":"Proc. IEEE Work. Web 2.0 Security and Privacy","author":"Mowery"},{"key":"ref16","article-title":"Fast and reliable browser identification with javascript engine fingerprinting","volume-title":"Proc. IEEE Work. Web 2.0 Security and Privacy","author":"Mulazzani"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186097"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00008"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00028"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243860"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380161"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3386040"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.18"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24383"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560576"},{"key":"ref26","first-page":"717","article-title":"The dangers of human touch: Fingerprinting browser extensions through user actions","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Solomos"},{"key":"ref27","first-page":"735","article-title":"Unleash the simulacrum: Shifting browser realities for robust Extension-Fingerprinting prevention","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Karami"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00017"},{"key":"ref30","article-title":"Browser Fingerprinting: An Introduction and the Challenges Ahead"},{"key":"ref31","article-title":"Brave Fingerprint Randomization"},{"key":"ref32","article-title":"Firefoxs protection against fingerprinting"},{"key":"ref33","article-title":"Actions speak louder than words: Semi-supervised learning for browser fingerprinting detection","author":"Bird","year":"2020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741090"},{"key":"ref36","first-page":"1651","article-title":"Phish in sheeps clothing: Exploring the authentication pitfalls of browser fingerprinting","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Lin"},{"key":"ref37","article-title":"FingerprintJS"},{"key":"ref38","article-title":"Demonstration of our StylisticFP approach against anti-fingerprinting extensions"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0056"},{"key":"ref40","article-title":"AmIUnique"},{"key":"ref41","article-title":"HTML elements reference"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_7"},{"key":"ref43","article-title":"Media Queries Level 3","year":"2022"},{"key":"ref44","article-title":"Media Queries Level 5","year":"2022"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417271"},{"key":"ref46","article-title":"BrowserStack"},{"key":"ref47","article-title":"CrossBrowserTesting"},{"key":"ref48","article-title":"NoScript"},{"key":"ref49","article-title":"Disable JavaScript"},{"key":"ref50","article-title":"Protecting against browser-language fingerprinting"},{"key":"ref51","article-title":"Demonstration of our StylisticFP approach against Brave"},{"key":"ref52","article-title":"Firefoxs protection against fingerprinting"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24202"},{"key":"ref55","article-title":"WebDev - Measuring the Critical Rendering Path"},{"key":"ref56","article-title":"Css fingerprint"},{"key":"ref57","article-title":"No-JS fingerprinting"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2015.105"},{"key":"ref59","article-title":"Fingerprinting CSS"},{"key":"ref60","article-title":"Auto Iframes Remover"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"ref62","article-title":"Beginners guide to media queries"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427297"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52683-2_7"},{"key":"ref65","article-title":"Digging into the Privacy Sandbox - Combat Fingerprinting"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24093"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91356-4_9"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029820"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268959"},{"key":"ref70","article-title":"Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies","volume-title":"Proc. USENIX Security Sym","author":"Sanchez-Rola"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313458"},{"key":"ref72","article-title":"One side-channel to bring them all and in the darkness bind them: Associating isolated browsing sessions","volume-title":"USENIX Work. Offensive Technologies","author":"Van Goethem"},{"key":"ref73","article-title":"Fingerprinting in style: Detecting browser extensions via injected style sheets","volume-title":"Proc. USENIX Security Sym","author":"Laperdrix"},{"key":"ref74","article-title":"Host fingerprinting and tracking on the web: Privacy and security implications","volume-title":"Proc. Sym. Network and Distributed System Security","author":"Yen"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0005"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0004"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_7"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20810-7_21"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313703"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382276"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179437.pdf?arnumber=10179437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:14:37Z","timestamp":1721452477000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179437\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":81,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179437","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}