{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:17:42Z","timestamp":1767183462795,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,7]],"date-time":"2015-12-07T00:00:00Z","timestamp":1449446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,7]]},"DOI":"10.1145\/2818000.2818032","type":"proceedings-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T17:06:08Z","timestamp":1449853568000},"page":"191-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["On the Robustness of Mobile Device Fingerprinting"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Hupperich","sequence":"first","affiliation":[{"name":"Ruhr-University Bochum"}]},{"given":"Davide","family":"Maiorca","sequence":"additional","affiliation":[{"name":"University of Cagliari"}]},{"given":"Marc","family":"K\u00fchrer","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum"}]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum"}]},{"given":"Giorgio","family":"Giacinto","sequence":"additional","affiliation":[{"name":"University of Cagliari"}]}],"member":"320","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_3_1","unstructured":"Alexa Internet Inc. Top 1M Websites. http:\/\/www.alexa.com\/topsites\/ 2014.  Alexa Internet Inc. Top 1M Websites. http:\/\/www.alexa.com\/topsites\/ 2014."},{"key":"e_1_3_2_1_4_1","unstructured":"Applications N. Mobile\/Tablet Browser Market Share. http:\/\/www.netmarketshare.com\/browser-market-share.aspx 2014.  Applications N. Mobile\/Tablet Browser Market Share. http:\/\/www.netmarketshare.com\/browser-market-share.aspx 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614350"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"e_1_3_2_1_7_1","unstructured":"Boda K. Firegloves. http:\/\/fingerprint.pet-portal.eu\/?menu=6.  Boda K. Firegloves. http:\/\/fingerprint.pet-portal.eu\/?menu=6."},{"key":"e_1_3_2_1_8_1","volume-title":"Mobile device identification via sensor fingerprinting. CoRR abs\/1408.1416","author":"Bojinov H.","year":"2014","unstructured":"Bojinov , H. , Michalevsky , Y. , Nakibly , G. , and Boneh , D . Mobile device identification via sensor fingerprinting. CoRR abs\/1408.1416 ( 2014 ). Bojinov, H., Michalevsky, Y., Nakibly, G., and Boneh, D. Mobile device identification via sensor fingerprinting. CoRR abs\/1408.1416 (2014)."},{"key":"e_1_3_2_1_9_1","unstructured":"Brade K. The tor browser. https:\/\/gitweb.torproject.org\/tor-browser.git.  Brade K. The tor browser. https:\/\/gitweb.torproject.org\/tor-browser.git."},{"key":"e_1_3_2_1_10_1","volume-title":"AccelPrint: Imperfections of Accel-erometers Make Smartphones Trackable. NDSS","author":"Dey S.","year":"2014","unstructured":"Dey , S. , Roy , N. , Xu , W. , Choudhury , R. R. , and Nelakuditi , S . AccelPrint: Imperfections of Accel-erometers Make Smartphones Trackable. NDSS 2014 . Dey, S., Roy, N., Xu, W., Choudhury, R. R., and Nelakuditi, S. AccelPrint: Imperfections of Accel-erometers Make Smartphones Trackable. NDSS 2014."},{"key":"e_1_3_2_1_11_1","volume-title":"PETS","author":"Eckersley P.","year":"2010","unstructured":"Eckersley , P. How Unique is Your Web Browser? PETS 2010 . Eckersley, P. How Unique is Your Web Browser? PETS 2010."},{"key":"e_1_3_2_1_12_1","volume-title":"Shining the floodlights on mobile web tracking -- A privacy survey. W2SP","author":"Eubank C.","year":"2013","unstructured":"Eubank , C. , Melara , M. , Perez -botero, D., and Narayanan , A . Shining the floodlights on mobile web tracking -- A privacy survey. W2SP 2013 . Eubank, C., Melara, M., Perez-botero, D., and Narayanan, A. Shining the floodlights on mobile web tracking -- A privacy survey. W2SP 2013."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_15_1","volume-title":"Evercookie -- never forget. Retrieved at April 29th","author":"Kamkar S.","year":"2014","unstructured":"Kamkar , S. Evercookie -- never forget. Retrieved at April 29th , 2014 from http:\/\/samy.pl\/evercookie\/. Kamkar, S. Evercookie -- never forget. Retrieved at April 29th, 2014 from http:\/\/samy.pl\/evercookie\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_2_1_17_1","unstructured":"MaxMind Inc. MaxMind GeoIP2. https:\/\/www.maxmind.com\/en\/geoip2-services-and-databases.  MaxMind Inc. MaxMind GeoIP2. https:\/\/www.maxmind.com\/en\/geoip2-services-and-databases."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749287"},{"key":"e_1_3_2_1_19_1","volume-title":"Pixel Perfect: Fingerprinting Canvas in HTML5. W2SP","author":"Mowery K.","year":"2012","unstructured":"Mowery , K. , and Shacham , H . Pixel Perfect: Fingerprinting Canvas in HTML5. W2SP 2012 . Mowery, K., and Shacham, H. Pixel Perfect: Fingerprinting Canvas in HTML5. W2SP 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_22_1","volume-title":"Pixel perfect timing attacks with HTML5. Context Information Security (White Paper)","author":"Stone P.","year":"2013","unstructured":"Stone , P. Pixel perfect timing attacks with HTML5. Context Information Security (White Paper) ( 2013 ). Stone, P. Pixel perfect timing attacks with HTML5. Context Information Security (White Paper) (2013)."}],"event":{"name":"ACSAC 2015: 2015 Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Los Angeles CA USA","acronym":"ACSAC 2015"},"container-title":["Proceedings of the 31st Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818032","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818000.2818032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:26Z","timestamp":1750225406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818032"}},"subtitle":["Can Mobile Users Escape Modern Web-Tracking Mechanisms?"],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":20,"alternative-id":["10.1145\/2818000.2818032","10.1145\/2818000"],"URL":"https:\/\/doi.org\/10.1145\/2818000.2818032","relation":{},"subject":[],"published":{"date-parts":[[2015,12,7]]},"assertion":[{"value":"2015-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}