{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T17:56:24Z","timestamp":1774115784106,"version":"3.50.1"},"publisher-location":"Republic and Canton of Geneva, Switzerland","reference-count":27,"publisher":"International World Wide Web Conferences Steering Committee","license":[{"start":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T00:00:00Z","timestamp":1431907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,18]]},"DOI":"10.1145\/2736277.2741090","type":"proceedings-article","created":{"date-parts":[[2016,2,5]],"date-time":"2016-02-05T20:37:12Z","timestamp":1454704632000},"page":"820-830","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":78,"title":["PriVaricator"],"prefix":"10.1145","author":[{"given":"Nick","family":"Nikiforakis","sequence":"first","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Benjamin","family":"Livshits","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS)","author":"Acar G.","year":"2014","unstructured":"G. Acar , C. Eubank , S. Englehardt , M. Juarez , A. Narayanan , and C. Diaz . In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS) , 2014 . G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz. In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), 2014."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_3_1","unstructured":"Adblock plus - for annoyance-free web surfing. http:\/\/adblockplus.org.  Adblock plus - for annoyance-free web surfing. http:\/\/adblockplus.org."},{"key":"e_1_3_2_1_4_1","volume-title":"Meet the Online Tracking Device That is Virtually Impossible to Block. http:\/\/www.propublica.org\/article\/meet-the-online-tracking-device-that-is-virtually-impossible-to-block.","author":"Angwin J.","unstructured":"J. Angwin . Meet the Online Tracking Device That is Virtually Impossible to Block. http:\/\/www.propublica.org\/article\/meet-the-online-tracking-device-that-is-virtually-impossible-to-block. J. Angwin. Meet the Online Tracking Device That is Virtually Impossible to Block. http:\/\/www.propublica.org\/article\/meet-the-online-tracking-device-that-is-virtually-impossible-to-block."},{"key":"e_1_3_2_1_5_1","unstructured":"D. Baron. Preventing attacks on a user's history through CSS:visited selectors. http:\/\/dbaron.org\/mozilla\/visited-privacy 2010.  D. Baron. Preventing attacks on a user's history through CSS:visited selectors. http:\/\/dbaron.org\/mozilla\/visited-privacy 2010."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11599-3_11"},{"key":"e_1_3_2_1_7_1","volume-title":"Measuring Mobile Advertising ROI Using BlueCava Device Identification","year":"2011","unstructured":"BlueCava. Measuring Mobile Advertising ROI Using BlueCava Device Identification . 2011 . BlueCava. Measuring Mobile Advertising ROI Using BlueCava Device Identification. 2011."},{"key":"e_1_3_2_1_8_1","unstructured":"K. Boda. Firegloves. http:\/\/fingerprint.pet-portal.eu\/?menu=6.  K. Boda. Firegloves. http:\/\/fingerprint.pet-portal.eu\/?menu=6."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29615-4_4"},{"key":"e_1_3_2_1_10_1","unstructured":"Bitcoin Payment Buttons - Bitcoin Merchant Tools. https:\/\/coinbase.com\/docs\/merchant_tools\/payment_buttons.  Bitcoin Payment Buttons - Bitcoin Merchant Tools. https:\/\/coinbase.com\/docs\/merchant_tools\/payment_buttons."},{"key":"e_1_3_2_1_11_1","unstructured":"P. Eckersley. The Panopticlick project. https:\/\/panopticlick.eff.org\/.  P. Eckersley. The Panopticlick project. https:\/\/panopticlick.eff.org\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881152"},{"key":"e_1_3_2_1_13_1","volume-title":"Browser fingerprinting","author":"Flood E.","year":"2012","unstructured":"E. Flood and J. Karlsson . Browser fingerprinting , 2012 . E. Flood and J. Karlsson. Browser fingerprinting, 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429114"},{"key":"e_1_3_2_1_15_1","volume-title":"Solving online credit fraud using device identification and reputation","year":"2007","unstructured":"iovation. Solving online credit fraud using device identification and reputation . 2007 . iovation. Solving online credit fraud using device identification and reputation. 2007."},{"key":"e_1_3_2_1_16_1","volume-title":"Any person... a pamphleteer. Senior Thesis","author":"Mayer J. R.","year":"2009","unstructured":"J. R. Mayer . Any person... a pamphleteer. Senior Thesis , Stanford University , 2009 . J. R. Mayer. Any person... a pamphleteer. Senior Thesis, Stanford University, 2009."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of W2SP 2011","author":"Mowery K.","year":"2011","unstructured":"K. Mowery , D. Bogenreif , S. Yilek , and H. Shacham . Fingerprinting information in JavaScript implementations. In H. Wang, editor , Proceedings of W2SP 2011 . IEEE Computer Society , May 2011 . K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham. Fingerprinting information in JavaScript implementations. In H. Wang, editor, Proceedings of W2SP 2011. IEEE Computer Society, May 2011."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Workshop on Web 2.0 Security and Privacy (W2SP). IEEE Computer Society","author":"Mowery K.","year":"2012","unstructured":"K. Mowery and H. Shacham . Pixel perfect: Fingerprinting canvas in HTML5 . In Proceedings of the Workshop on Web 2.0 Security and Privacy (W2SP). IEEE Computer Society , May 2012 . K. Mowery and H. Shacham. Pixel perfect: Fingerprinting canvas in HTML5. In Proceedings of the Workshop on Web 2.0 Security and Privacy (W2SP). IEEE Computer Society, May 2012."},{"key":"e_1_3_2_1_19_1","volume-title":"Web 2.0 Workshop on Security and Privacy (W2SP)","author":"Mulazzani M.","year":"2013","unstructured":"M. Mulazzani , P. Reschl , M. Huber , M. Leithner , S. Schrittwieser , and E. Weippl . Fast and reliable browser identification with javascript engine fingerprinting . In Web 2.0 Workshop on Security and Privacy (W2SP) , May 2013 . M. Mulazzani, P. Reschl, M. Huber, M. Leithner, S. Schrittwieser, and E. Weippl. Fast and reliable browser identification with javascript engine fingerprinting. In Web 2.0 Workshop on Security and Privacy (W2SP), May 2013."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HOTPETS).","author":"Olejnik L.","unstructured":"L. Olejnik , C. Castelluccia , and A. Janc . Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns . In Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HOTPETS). L. Olejnik, C. Castelluccia, and A. Janc. Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns. In Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HOTPETS)."},{"key":"e_1_3_2_1_22_1","unstructured":"K. Sivaramakrishnan. The Drawbridge Cross Device Matching Technology.  K. Sivaramakrishnan. The Drawbridge Cross Device Matching Technology."},{"key":"e_1_3_2_1_23_1","unstructured":"ThreatMetrix. Device Fingerprinting and Fraud Protection Whitepaper.  ThreatMetrix. Device Fingerprinting and Fraud Protection Whitepaper."},{"key":"e_1_3_2_1_24_1","unstructured":"Tor: Cross-Origin Fingerprinting Unlinkability. https:\/\/www.torproject.org\/projects\/torbrowser\/design\/#fingerprinting-linkability.  Tor: Cross-Origin Fingerprinting Unlinkability. https:\/\/www.torproject.org\/projects\/torbrowser\/design\/#fingerprinting-linkability."},{"key":"e_1_3_2_1_25_1","volume-title":"fingerprintjs library. https:\/\/github.com\/Valve\/fingerprintjs","author":"Vasilyev V.","year":"2013","unstructured":"V. Vasilyev . fingerprintjs library. https:\/\/github.com\/Valve\/fingerprintjs , 2013 . V. Vasilyev. fingerprintjs library. https:\/\/github.com\/Valve\/fingerprintjs, 2013."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.23"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"Yen T.-F.","year":"2012","unstructured":"T.-F. Yen , Y. Xie , F. Yu , R. P. Yu , and M. Abadi . Host fingerprinting and tracking on the Web: Privacy and security implications . In Proceedings of the Network and Distributed System Security Symposium (NDSS) , 2012 . T.-F. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi. Host fingerprinting and tracking on the Web: Privacy and security implications. In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012."}],"event":{"name":"WWW '15: 24th International World Wide Web Conference","location":"Florence Italy","acronym":"WWW '15","sponsor":["IW3C2 International World Wide Web Conference Committee","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 24th International Conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2736277.2741090","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2736277.2741090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:37Z","timestamp":1750227397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2736277.2741090"}},"subtitle":["Deceiving Fingerprinters with Little White Lies"],"short-title":[],"issued":{"date-parts":[[2015,5,18]]},"references-count":27,"alternative-id":["10.1145\/2736277.2741090","10.5555\/2736277"],"URL":"https:\/\/doi.org\/10.1145\/2736277.2741090","relation":{},"subject":[],"published":{"date-parts":[[2015,5,18]]},"assertion":[{"value":"2015-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}