{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:25:36Z","timestamp":1771457136521,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CominLabs-PROFILE project"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338468.3356828","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"67-78","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["A Collaborative Strategy for Mitigating Tracking through Browser Fingerprinting"],"prefix":"10.1145","author":[{"given":"Alejandro","family":"G\u00f3mez-Boix","sequence":"first","affiliation":[{"name":"Univ Rennes, Inria, CNRS, IRISA, Rennes, France"}]},{"given":"Davide","family":"Frey","sequence":"additional","affiliation":[{"name":"Univ Rennes, Inria, CNRS, IRISA, Rennnes, France"}]},{"given":"Y\u00e9rom-David","family":"Bromberg","sequence":"additional","affiliation":[{"name":"Univ Rennes, Inria, CNRS, IRISA, Rennes, France"}]},{"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2015. Pale Moon browser - Version 25.6.0 adds a canvas poisoning feature. https:\/\/www.palemoon.org\/releasenotes.shtml.  2015. Pale Moon browser - Version 25.6.0 adds a canvas poisoning feature. https:\/\/www.palemoon.org\/releasenotes.shtml."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. Fingerprinting protection in Firefox as part of the Tor Uplift Project \"Mozilla Wiki. https:\/\/wiki.mozilla.org\/Security\/Fingerprinting.  2017. Fingerprinting protection in Firefox as part of the Tor Uplift Project \"Mozilla Wiki. https:\/\/wiki.mozilla.org\/Security\/Fingerprinting."},{"key":"e_1_3_2_1_3_1","unstructured":"2017. Fingerprinting Protection Mode \" Brave browser. https:\/\/github.com\/brave\/browser-laptop\/wiki\/Fingerprinting-Protection-Mode  2017. Fingerprinting Protection Mode \" Brave browser. https:\/\/github.com\/brave\/browser-laptop\/wiki\/Fingerprinting-Protection-Mode"},{"key":"e_1_3_2_1_4_1","unstructured":"2017. The Design and Implementation of the Tor Browser [DRAFT] \"Cross-Origin Fingerprinting Unlinkability\" \" Tor Project Official website.https:\/\/www.torproject.org\/projects\/torbrowser\/design\/#fingerprinting-linkability  2017. The Design and Implementation of the Tor Browser [DRAFT] \"Cross-Origin Fingerprinting Unlinkability\" \" Tor Project Official website.https:\/\/www.torproject.org\/projects\/torbrowser\/design\/#fingerprinting-linkability"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Apple. 2019. Safari. The best way to see the sites. https:\/\/www.apple.com\/safari\/  Apple. 2019. Safari. The best way to see the sites. https:\/\/www.apple.com\/safari\/","DOI":"10.1149\/MA2019-01\/4\/476"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994621"},{"key":"e_1_3_2_1_9_1","volume-title":"G\u00e1bor Gy\u00f6rgy Guly\u00e1s, and S\u00e1ndor Imre","author":"Boda K\u00e1roly","year":"2012","unstructured":"K\u00e1roly Boda , \u00c1d\u00e1m M\u00e1t\u00e9 F\u00f6ldes , G\u00e1bor Gy\u00f6rgy Guly\u00e1s, and S\u00e1ndor Imre . 2012 . User Tracking on the Web via Cross-Browser Fingerprinting. Lecture Notes in Computer Science, Vol. 7161 . Springer Berlin Heidelberg , Berlin, Heidelberg, 31--46. https:\/\/doi.org\/10.1007\/978-3-642-29615-4_4 10.1007\/978-3-642-29615-4_4 K\u00e1roly Boda, \u00c1d\u00e1m M\u00e1t\u00e9 F\u00f6ldes, G\u00e1bor Gy\u00f6rgy Guly\u00e1s, and S\u00e1ndor Imre. 2012. User Tracking on the Web via Cross-Browser Fingerprinting. Lecture Notes in Computer Science, Vol. 7161. Springer Berlin Heidelberg, Berlin, Heidelberg, 31--46. https:\/\/doi.org\/10.1007\/978-3-642-29615-4_4"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23152"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881152"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_13_1","series-title":"Lecture Notes in Computer Science","volume-title":"Data and Applications Security and Privacy XXIX","author":"FaizKhademi Amin","year":"2081","unstructured":"Amin FaizKhademi , Mohammad Zulkernine , and Komminist Weldemariam . 2015. FPGuard: Detection and Prevention of Browser Fingerprinting . In Data and Applications Security and Privacy XXIX . Lecture Notes in Computer Science , Vol. 9149 . Springer International Publishing , 293--308. https:\/\/doi.org\/10.1007\/978-3-319- 2081 0-7_21 10.1007\/978-3-319-20810-7_21 Amin FaizKhademi, Mohammad Zulkernine, and Komminist Weldemariam. 2015. FPGuard: Detection and Prevention of Browser Fingerprinting. In Data and Applications Security and Privacy XXIX. Lecture Notes in Computer Science, Vol. 9149. Springer International Publishing, 293--308. https:\/\/doi.org\/10.1007\/978-3-319-20810-7_21"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186097"},{"key":"e_1_3_2_1_15_1","unstructured":"Pierre Laperdrix. 2017. Browser Fingerprinting: Exploring Device Diversity to Augment Authentification and Build Client-Side Countermeasures. Ph.D. Dissertation. Rennes INSA.  Pierre Laperdrix. 2017. Browser Fingerprinting: Exploring Device Diversity to Augment Authentification and Build Client-Side Countermeasures. Ph.D. Dissertation. Rennes INSA."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_7"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2015.18"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_19_1","volume-title":"Any person... a pamphleteer\": Internet Anonymity in the Age of Web 2.0 [Bachelor's degree thesis]","author":"Mayer JR","year":"2009","unstructured":"JR Mayer . 2009. Any person... a pamphleteer\": Internet Anonymity in the Age of Web 2.0 [Bachelor's degree thesis] . Faculty of the Woodrow Wilson School of Public and International Affairs ( 2009 ). JR Mayer. 2009. Any person... a pamphleteer\": Internet Anonymity in the Age of Web 2.0 [Bachelor's degree thesis]. Faculty of the Woodrow Wilson School of Public and International Affairs (2009)."},{"key":"e_1_3_2_1_20_1","volume-title":"2017 IEEE European Symposium on. IEEE, 319--333","author":"Merzdovnik Georg","year":"2017","unstructured":"Georg Merzdovnik , Markus Huber , Damjan Buhov , Nick Nikiforakis , Sebastian Neuner , Martin Schmiedecker , and Edgar Weippl . 2017 . Block me if you can: A large-scale study of tracker-blocking tools. In Security and Privacy (EuroS&P) , 2017 IEEE European Symposium on. IEEE, 319--333 . Georg Merzdovnik, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, and Edgar Weippl. 2017. Block me if you can: A large-scale study of tracker-blocking tools. In Security and Privacy (EuroS&P), 2017 IEEE European Symposium on. IEEE, 319--333."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of W2SP","author":"Mowery Keaton","year":"2012","unstructured":"Keaton Mowery and Hovav Shacham . 2012 . Pixel Perfect: Fingerprinting Canvas in HTML5 . In Proceedings of W2SP 2012,, Matt Fredrikson (Ed.). IEEE Computer Society. Keaton Mowery and Hovav Shacham. 2012. Pixel Perfect: Fingerprinting Canvas in HTML5. In Proceedings of W2SP 2012,, Matt Fredrikson (Ed.). IEEE Computer Society."},{"key":"e_1_3_2_1_22_1","unstructured":"Mozilla Developer Network and individual contributors. 2017. Firefox 52 for developers. https:\/\/developer.mozilla.org\/en-US\/Firefox\/Releases\/52  Mozilla Developer Network and individual contributors. 2017. Firefox 52 for developers. https:\/\/developer.mozilla.org\/en-US\/Firefox\/Releases\/52"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741090"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2016.55"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_1"},{"key":"e_1_3_2_1_27_1","volume-title":"28th USENIX Security Symposium ($$USENIX$$ Security 19)","author":"Trickel Erik","year":"2019","unstructured":"Erik Trickel , Oleksii Starov , Alexandros Kapravelos , Nick Nikiforakis , and Adam Doup\u00e9 . 2019 . Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting . In 28th USENIX Security Symposium ($$USENIX$$ Security 19) . 1679--1696. Erik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, and Adam Doup\u00e9. 2019. Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting. In 28th USENIX Security Symposium ($$USENIX$$ Security 19). 1679--1696."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 27th USENIX Security Symposium.","author":"Vastel Antoine","year":"2018","unstructured":"Antoine Vastel , Pierre Laperdrix , Walter Rudametkin , and Romain Rouvoy . 2018 . FP-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies . In Proceedings of the 27th USENIX Security Symposium. Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. 2018. FP-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies. In Proceedings of the 27th USENIX Security Symposium."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_2_1_30_1","unstructured":"Mozilla Wiki. 2019. Firefox\/Roadmap\/Updates. https:\/\/wiki.mozilla.org\/Firefox\/Roadmap\/Updates#2019-07-08  Mozilla Wiki. 2019. Firefox\/Roadmap\/Updates. https:\/\/wiki.mozilla.org\/Firefox\/Roadmap\/Updates#2019-07-08"},{"key":"e_1_3_2_1_31_1","volume":"201","author":"Witten Ian H","unstructured":"Ian H Witten , Eibe Frank , Mark A Hall , and Christopher J Pal. 201 6. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann. Ian H Witten, Eibe Frank, Mark A Hall, and Christopher J Pal. 2016. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann.","journal-title":"Christopher J Pal."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 6th ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338468.3356828","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338468.3356828","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:48Z","timestamp":1750201968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338468.3356828"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":31,"alternative-id":["10.1145\/3338468.3356828","10.1145\/3338468"],"URL":"https:\/\/doi.org\/10.1145\/3338468.3356828","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}