{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T16:49:30Z","timestamp":1777567770920,"version":"3.51.4"},"reference-count":130,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T00:00:00Z","timestamp":1586390400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2020,5,31]]},"abstract":"<jats:p>With this article, we survey the research performed in the domain of browser fingerprinting, while providing an accessible entry point to newcomers in the field. We explain how this technique works and where it stems from. We analyze the related work in detail to understand the composition of modern fingerprints and see how this technique is currently used online. We systematize existing defense solutions into different categories and detail the current challenges yet to overcome.<\/jats:p>","DOI":"10.1145\/3386040","type":"journal-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T17:36:26Z","timestamp":1586453786000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":128,"title":["Browser Fingerprinting"],"prefix":"10.1145","volume":"14","author":[{"given":"Pierre","family":"Laperdrix","sequence":"first","affiliation":[{"name":"CNRS, Univ Lille, Inria Lille, France"}]},{"given":"Nataliia","family":"Bielova","sequence":"additional","affiliation":[{"name":"Inria Sophia Antipolis, France"}]},{"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Sweden"}]},{"given":"Gildas","family":"Avoine","sequence":"additional","affiliation":[{"name":"Univ Rennes, INSA Rennes, CNRS, IRISA, France"}]}],"member":"320","published-online":{"date-parts":[[2020,4,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"IETF. 1995. RFC 1866-Hypertext Markup Language 2.0. Retrieved from https:\/\/tools.ietf.org\/html\/rfc1866.  IETF. 1995. RFC 1866-Hypertext Markup Language 2.0. Retrieved from https:\/\/tools.ietf.org\/html\/rfc1866."},{"key":"e_1_2_1_2_1","volume-title":"RFC 1945-Hypertext Transfer Protocol-HTTP\/1.0.","author":"IETF.","year":"1996","unstructured":"IETF. 1996 . RFC 1945-Hypertext Transfer Protocol-HTTP\/1.0. Retrieved from https:\/\/tools.ietf.org\/html\/rfc1945. IETF. 1996. RFC 1945-Hypertext Transfer Protocol-HTTP\/1.0. Retrieved from https:\/\/tools.ietf.org\/html\/rfc1945."},{"key":"e_1_2_1_3_1","volume-title":"ECMA-262","author":"ECMA.","year":"1997","unstructured":"ECMA. 1997. ECMA-262 , 1 st Edition, June 1997 . Retrieved from https:\/\/www.ecma-international.org\/publications\/files\/ECMA-ST-ARCH\/ECMA-262,%201st%20edition,%20June%201997.pdf. ECMA. 1997. ECMA-262, 1st Edition, June 1997. Retrieved from https:\/\/www.ecma-international.org\/publications\/files\/ECMA-ST-ARCH\/ECMA-262,%201st%20edition,%20June%201997.pdf.","edition":"1"},{"key":"e_1_2_1_4_1","unstructured":"WebAIM. 2008. History of the Browser User-agent String. Retrieved from http:\/\/webaim.org\/blog\/user-agent-string-history\/.  WebAIM. 2008. History of the Browser User-agent String. Retrieved from http:\/\/webaim.org\/blog\/user-agent-string-history\/."},{"key":"e_1_2_1_5_1","unstructured":"Human who Codes. 2010. History of the User-agent String. Retrieved from https:\/\/humanwhocodes.com\/blog\/2010\/01\/12\/history-of-the-user-agent-string\/.  Human who Codes. 2010. History of the User-agent String. Retrieved from https:\/\/humanwhocodes.com\/blog\/2010\/01\/12\/history-of-the-user-agent-string\/."},{"key":"e_1_2_1_6_1","volume-title":"Battery Status Event Specification-W3C Working Draft","author":"C.","year":"2011","unstructured":"W3 C. 2011. Battery Status Event Specification-W3C Working Draft 26 April 2011 . Retrieved from https:\/\/www.w3.org\/TR\/2011\/WD-battery-status-20110426\/. W3C. 2011. Battery Status Event Specification-W3C Working Draft 26 April 2011. Retrieved from https:\/\/www.w3.org\/TR\/2011\/WD-battery-status-20110426\/."},{"key":"e_1_2_1_7_1","unstructured":"W3C. 2011. Informative Historical Notes-List of Known CSS Prefixes by W3C. Retrieved from https:\/\/www.w3.org\/TR\/CSS21\/syndata.html#vendor-keyword-history.  W3C. 2011. Informative Historical Notes-List of Known CSS Prefixes by W3C. Retrieved from https:\/\/www.w3.org\/TR\/CSS21\/syndata.html#vendor-keyword-history."},{"key":"e_1_2_1_8_1","volume-title":"Battery Status API-W3C Candidate Recommendation","author":"C.","year":"2012","unstructured":"W3 C. 2012. Battery Status API-W3C Candidate Recommendation 08 May 2012 . Retrieved from https:\/\/www.w3.org\/TR\/2012\/CR-battery-status-20120508\/. W3C. 2012. Battery Status API-W3C Candidate Recommendation 08 May 2012. Retrieved from https:\/\/www.w3.org\/TR\/2012\/CR-battery-status-20120508\/."},{"key":"e_1_2_1_9_1","unstructured":"European Commission. 2012. WP29 Opinion 04\/2012 on the Cookie Consent Exemption-ARTICLE 29 DATA PROTECTION WORKING PARTY. Retrieved from https:\/\/ec.europa.eu\/justice\/article-29\/documentation\/opinion-recommendation\/files\/2012\/wp194_en.pdf.  European Commission. 2012. WP29 Opinion 04\/2012 on the Cookie Consent Exemption-ARTICLE 29 DATA PROTECTION WORKING PARTY. Retrieved from https:\/\/ec.europa.eu\/justice\/article-29\/documentation\/opinion-recommendation\/files\/2012\/wp194_en.pdf."},{"key":"e_1_2_1_10_1","unstructured":"European Commission. 2014. Opinion 9\/2014 on the Application of Directive 2002\/58\/EC to Device Fingerprinting-ARTICLE 29 DATA PROTECTION WORKING PARTY. Retrieved from http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2014\/wp224_en.pdf.  European Commission. 2014. Opinion 9\/2014 on the Application of Directive 2002\/58\/EC to Device Fingerprinting-ARTICLE 29 DATA PROTECTION WORKING PARTY. Retrieved from http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2014\/wp224_en.pdf."},{"key":"e_1_2_1_11_1","unstructured":"Duo Security. 2015. Detecting Out of Date and Vulnerable Flash Versions on Your Network-Duo Security. Retrieved from https:\/\/duo.com\/blog\/detecting-out-of-date-and-vulnerable-flash-versions-on-your-network.  Duo Security. 2015. Detecting Out of Date and Vulnerable Flash Versions on Your Network-Duo Security. Retrieved from https:\/\/duo.com\/blog\/detecting-out-of-date-and-vulnerable-flash-versions-on-your-network."},{"key":"e_1_2_1_12_1","volume-title":"HTML Canvas 2D Context-W3C Recommendation","author":"C.","year":"2015","unstructured":"W3 C. 2015. HTML Canvas 2D Context-W3C Recommendation 19 November 2015 . Retrieved from https:\/\/www.w3.org\/TR\/2dcontext\/. W3C. 2015. HTML Canvas 2D Context-W3C Recommendation 19 November 2015. Retrieved from https:\/\/www.w3.org\/TR\/2dcontext\/."},{"key":"e_1_2_1_13_1","unstructured":"Mozilla. 2015. NPAPI Plugins in Firefox. Retrieved from https:\/\/blog.mozilla.org\/futurereleases\/2015\/10\/08\/npapi-plugins-in-firefox\/.  Mozilla. 2015. NPAPI Plugins in Firefox. Retrieved from https:\/\/blog.mozilla.org\/futurereleases\/2015\/10\/08\/npapi-plugins-in-firefox\/."},{"key":"e_1_2_1_14_1","volume-title":"Battery Status API - W3C Candidate Recommendation","author":"C.","year":"2016","unstructured":"W3 C. 2016. Battery Status API - W3C Candidate Recommendation 07 July 2016 . Retrieved from https:\/\/www.w3.org\/TR\/battery-status\/. W3C. 2016. Battery Status API - W3C Candidate Recommendation 07 July 2016. Retrieved from https:\/\/www.w3.org\/TR\/battery-status\/."},{"key":"e_1_2_1_15_1","unstructured":"Yandex Browser. 2016. Beware Evil APIs. Retrieved from https:\/\/web.archive.org\/web\/20180626203349\/ https:\/\/browser.yandex.com\/blog\/beware-evil-apis.  Yandex Browser. 2016. Beware Evil APIs. Retrieved from https:\/\/web.archive.org\/web\/20180626203349\/ https:\/\/browser.yandex.com\/blog\/beware-evil-apis."},{"key":"e_1_2_1_16_1","unstructured":"Firefox Bugzilla. 2016. Bug 1313580-Remove Web Content Access to Battery API. Retrieved from https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1313580.  Firefox Bugzilla. 2016. Bug 1313580-Remove Web Content Access to Battery API. Retrieved from https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1313580."},{"key":"e_1_2_1_17_1","unstructured":"WebKit Bugzilla. 2016. Bug 164213-Remove Battery Status API from the Tree. Retrieved from https:\/\/bugs.webkit.org\/show_bug.cgi?id=164213.  WebKit Bugzilla. 2016. Bug 164213-Remove Battery Status API from the Tree. Retrieved from https:\/\/bugs.webkit.org\/show_bug.cgi?id=164213."},{"key":"e_1_2_1_18_1","unstructured":"W3C. 2016. Geolocation API. Retrieved from https:\/\/www.w3.org\/TR\/geolocation-API\/.  W3C. 2016. Geolocation API. Retrieved from https:\/\/www.w3.org\/TR\/geolocation-API\/."},{"key":"e_1_2_1_19_1","unstructured":"Malwarebytes. 2016. Operation Fingerprint-A Look into Several Angler Exploit Kit Malvertising Campaigns. Retrieved from https:\/\/malwarebytes.app.box.com\/v\/operation-fingerprint.  Malwarebytes. 2016. Operation Fingerprint-A Look into Several Angler Exploit Kit Malvertising Campaigns. Retrieved from https:\/\/malwarebytes.app.box.com\/v\/operation-fingerprint."},{"key":"e_1_2_1_20_1","unstructured":"Add-ons for Firefox. 2016. Random Agent Spoofer-Firefox Extension. Retrieved from https:\/\/web.archive.org\/web\/20170314014230\/ https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/random-agent-spoofer\/.  Add-ons for Firefox. 2016. Random Agent Spoofer-Firefox Extension. Retrieved from https:\/\/web.archive.org\/web\/20170314014230\/ https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/random-agent-spoofer\/."},{"key":"e_1_2_1_21_1","unstructured":"EUR-Lex. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data. and Repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA Relevance). Retrieved from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex:32016R0679.  EUR-Lex. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data. and Repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA Relevance). Retrieved from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex:32016R0679."},{"key":"e_1_2_1_22_1","unstructured":"Add-ons for Firefox. 2017. Canvas Defender - Firefox Add-on that Adds Unique and Persistent Noise to a Canvas Element. Retrieved from https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/no-canvas-fingerprinting\/.  Add-ons for Firefox. 2017. Canvas Defender - Firefox Add-on that Adds Unique and Persistent Noise to a Canvas Element. Retrieved from https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/no-canvas-fingerprinting\/."},{"key":"e_1_2_1_23_1","unstructured":"European Commission. 2017. Opinion 01\/2017 on the Proposed Regulation for the ePrivacy Regulation (2002\/58\/EC). Retrieved from http:\/\/ec.europa.eu\/newsroom\/document.cfm?doc_id=44103.  European Commission. 2017. Opinion 01\/2017 on the Proposed Regulation for the ePrivacy Regulation (2002\/58\/EC). Retrieved from http:\/\/ec.europa.eu\/newsroom\/document.cfm?doc_id=44103."},{"key":"e_1_2_1_24_1","unstructured":"European Commission. 2017. Proposal for a Regulation of the European Parliament and of the Council. Concerning the Respect for Private Life and the Protection of Personal Data in Electronic Communications and Repealing Directive 2002\/58\/EC(Regulation on Privacy and Electronic Communications). COM(2017) 10 Final.Retrieved from http:\/\/ec.europa.eu\/newsroom\/dae\/document.cfm?doc_id=41241.  European Commission. 2017. Proposal for a Regulation of the European Parliament and of the Council. Concerning the Respect for Private Life and the Protection of Personal Data in Electronic Communications and Repealing Directive 2002\/58\/EC(Regulation on Privacy and Electronic Communications). COM(2017) 10 Final.Retrieved from http:\/\/ec.europa.eu\/newsroom\/dae\/document.cfm?doc_id=41241."},{"key":"e_1_2_1_25_1","unstructured":"European Parliament. 2017. Report on the Proposal for a Regulation of the European Parliament and of the Council concerning the Respect for Private Life and the Protection of Personal Data in Electronic Communications and Repealing Directive 2002\/58\/EC (Regulation on Privacy and Electronic Communications) (COM(2017)0010 ? C8-0009\/2017 ? 2017\/0003(COD)). 23 October 2017. Retrieved from https:\/\/www.europarl.europa.eu\/doceo\/document\/A-8-2017-0324_EN.html.  European Parliament. 2017. Report on the Proposal for a Regulation of the European Parliament and of the Council concerning the Respect for Private Life and the Protection of Personal Data in Electronic Communications and Repealing Directive 2002\/58\/EC (Regulation on Privacy and Electronic Communications) (COM(2017)0010 ? C8-0009\/2017 ? 2017\/0003(COD)). 23 October 2017. Retrieved from https:\/\/www.europarl.europa.eu\/doceo\/document\/A-8-2017-0324_EN.html."},{"key":"e_1_2_1_26_1","unstructured":"PageFair. 2017. The State of the Blocked Web-2017 Global Adblock Report by PageFair. Retrieved from https:\/\/web.archive.org\/web\/20170201002220\/ https:\/\/pagefair.com\/downloads\/2017\/01\/PageFair-2017-Adblock-Report.pdf.  PageFair. 2017. The State of the Blocked Web-2017 Global Adblock Report by PageFair. Retrieved from https:\/\/web.archive.org\/web\/20170201002220\/ https:\/\/pagefair.com\/downloads\/2017\/01\/PageFair-2017-Adblock-Report.pdf."},{"key":"e_1_2_1_27_1","unstructured":"Acceptable Ads. 2018. Acceptable Ads Initiative. Retrieved from https:\/\/acceptableads.com\/.  Acceptable Ads. 2018. Acceptable Ads Initiative. Retrieved from https:\/\/acceptableads.com\/."},{"key":"e_1_2_1_28_1","unstructured":"Adblock Plus. 2018. Adblock Plus Official Website. Retrieved from https:\/\/adblockplus.org\/.  Adblock Plus. 2018. Adblock Plus Official Website. Retrieved from https:\/\/adblockplus.org\/."},{"key":"e_1_2_1_29_1","unstructured":"CVE Details. 2018. Adobe Flash Player: List of Security Vulnerabilities. Retrieved from https:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-53\/product_id-6761\/Adobe-Flash-Player.html.  CVE Details. 2018. Adobe Flash Player: List of Security Vulnerabilities. Retrieved from https:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-53\/product_id-6761\/Adobe-Flash-Player.html."},{"key":"e_1_2_1_30_1","unstructured":"GitHub. 2018. Anonymous Browser Fingerprint\u2014Fingerprintjs. Retrieved from https:\/\/github.com\/Valve\/fingerprintjs.  GitHub. 2018. Anonymous Browser Fingerprint\u2014Fingerprintjs. Retrieved from https:\/\/github.com\/Valve\/fingerprintjs."},{"key":"e_1_2_1_31_1","volume-title":"\u201cBrowser Fingerprinting","author":"Apple Declares","year":"1826","unstructured":"Gizmodo. 2018. Apple Declares War on \u201cBrowser Fingerprinting .\u201d the Sneaky Tactic That Tracks You in Incognito Mode. Retrieved from https:\/\/gizmodo.com\/apple-declares-war-on-browser-fingerprinting-the-sneak- 1826 549108. Gizmodo. 2018. Apple Declares War on \u201cBrowser Fingerprinting.\u201d the Sneaky Tactic That Tracks You in Incognito Mode. Retrieved from https:\/\/gizmodo.com\/apple-declares-war-on-browser-fingerprinting-the-sneak-1826549108."},{"key":"e_1_2_1_32_1","unstructured":"PerimeterX. 2018. Bot Detection and Botnet Protection. Retrieved from https:\/\/www.perimeterx.com\/products\/bot-defender\/.  PerimeterX. 2018. Bot Detection and Botnet Protection. Retrieved from https:\/\/www.perimeterx.com\/products\/bot-defender\/."},{"key":"e_1_2_1_33_1","unstructured":"ShieldSquare. 2018. Bot Prevention Technology. Retrieved from https:\/\/www.shieldsquare.com\/bot-prevention-technology\/.  ShieldSquare. 2018. Bot Prevention Technology. Retrieved from https:\/\/www.shieldsquare.com\/bot-prevention-technology\/."},{"key":"e_1_2_1_34_1","unstructured":"Brave. 2018. Brave Official Website\u2014Browse Faster and Safer with Brave. Retrieved from https:\/\/brave.com\/.  Brave. 2018. Brave Official Website\u2014Browse Faster and Safer with Brave. Retrieved from https:\/\/brave.com\/."},{"key":"e_1_2_1_35_1","unstructured":"Add-ons for Firefox. 2018. CanvasBlocker\u2014Firefox Extension to Block the Canvas API. Retrieved from https:\/\/addons.mozilla.org\/fr\/firefox\/addon\/canvasblocker\/.  Add-ons for Firefox. 2018. CanvasBlocker\u2014Firefox Extension to Block the Canvas API. Retrieved from https:\/\/addons.mozilla.org\/fr\/firefox\/addon\/canvasblocker\/."},{"key":"e_1_2_1_36_1","unstructured":"Iovation. 2018. ClearKey. Retrieved from https:\/\/www.iovation.com\/clearkey-two-factor-authentication.  Iovation. 2018. ClearKey. Retrieved from https:\/\/www.iovation.com\/clearkey-two-factor-authentication."},{"key":"e_1_2_1_37_1","unstructured":"CLIQZ. 2018. CLIQZ Official Website\u2014Secure Browser with Built-in Quick Search. Retrieved from https:\/\/cliqz.com\/en\/.  CLIQZ. 2018. CLIQZ Official Website\u2014Secure Browser with Built-in Quick Search. Retrieved from https:\/\/cliqz.com\/en\/."},{"key":"e_1_2_1_38_1","unstructured":"Coalition for Better Ads. 2018. Coalition for Better Ads Initiative. Retrieved from https:\/\/www.betterads.org\/.  Coalition for Better Ads. 2018. Coalition for Better Ads Initiative. Retrieved from https:\/\/www.betterads.org\/."},{"key":"e_1_2_1_39_1","unstructured":"CVE. 2018. Common Vulnerabilities and Exposures-The Standard for Information Security Vulnerability Names. Retrieved from https:\/\/cve.mitre.org\/.  CVE. 2018. Common Vulnerabilities and Exposures-The Standard for Information Security Vulnerability Names. Retrieved from https:\/\/cve.mitre.org\/."},{"key":"e_1_2_1_40_1","unstructured":"Iovation. 2018. Customer Authentication Datasheet. Retrieved from https:\/\/www.iovation.com\/authentication\/clearkey.  Iovation. 2018. Customer Authentication Datasheet. Retrieved from https:\/\/www.iovation.com\/authentication\/clearkey."},{"key":"e_1_2_1_41_1","unstructured":"SecurAuth. 2018. Device\/Browser Fingerprinting-Heuristic-based Authentication. Retrieved from https:\/\/docs.secureauth.com\/pages\/viewpage.action?pageId=40045162.  SecurAuth. 2018. Device\/Browser Fingerprinting-Heuristic-based Authentication. Retrieved from https:\/\/docs.secureauth.com\/pages\/viewpage.action?pageId=40045162."},{"key":"e_1_2_1_42_1","unstructured":"Sift Science. 2018. Device Fingerprinting and Fraud Detection Software. Retrieved from https:\/\/web.archive.org\/web\/20170409213006\/ https:\/\/siftscience.com\/device-fingerprinting.  Sift Science. 2018. Device Fingerprinting and Fraud Detection Software. Retrieved from https:\/\/web.archive.org\/web\/20170409213006\/ https:\/\/siftscience.com\/device-fingerprinting."},{"key":"e_1_2_1_43_1","unstructured":"IPQualityScore. 2018. Device fingerprinting. Device signature fraud Detection. Fraud Prevention. Retrieved from https:\/\/www.ipqualityscore.com\/device-fingerprinting.  IPQualityScore. 2018. Device fingerprinting. Device signature fraud Detection. Fraud Prevention. Retrieved from https:\/\/www.ipqualityscore.com\/device-fingerprinting."},{"key":"e_1_2_1_44_1","unstructured":"MaxMind. 2018. Device Tracking Add-on for Minfraud Services. Retrieved from https:\/\/dev.maxmind.com\/minfraud\/device\/.  MaxMind. 2018. Device Tracking Add-on for Minfraud Services. Retrieved from https:\/\/dev.maxmind.com\/minfraud\/device\/."},{"key":"e_1_2_1_45_1","unstructured":"Disconnect. 2018. Disconnect Official Website. Retrieved from https:\/\/disconnect.me\/.  Disconnect. 2018. Disconnect Official Website. Retrieved from https:\/\/disconnect.me\/."},{"key":"e_1_2_1_46_1","unstructured":"GitHub. 2018. Fingerprinting Protection Mode\u2014Brave Browser. Retrieved from https:\/\/github.com\/brave\/brave-browser\/wiki\/Fingerprinting-Protections.  GitHub. 2018. Fingerprinting Protection Mode\u2014Brave Browser. Retrieved from https:\/\/github.com\/brave\/brave-browser\/wiki\/Fingerprinting-Protections."},{"key":"e_1_2_1_47_1","unstructured":"Ghostery 2018. Ghostery Official Website. Retrieved from https:\/\/www.ghostery.com\/.  Ghostery 2018. Ghostery Official Website. Retrieved from https:\/\/www.ghostery.com\/."},{"key":"e_1_2_1_48_1","unstructured":"Dan's Tools. 2018. JavaScript Obfuscator. Retrieved from https:\/\/www.cleancss.com\/javascript-obfuscate\/.  Dan's Tools. 2018. JavaScript Obfuscator. Retrieved from https:\/\/www.cleancss.com\/javascript-obfuscate\/."},{"key":"e_1_2_1_49_1","unstructured":"jQuery. 2018. jQuery Official Website. Retrieved from https:\/\/jquery.com\/.  jQuery. 2018. jQuery Official Website. Retrieved from https:\/\/jquery.com\/."},{"key":"e_1_2_1_50_1","unstructured":"Mozilla Developer Network. 2018. Mozilla CSS Extensions. Retrieved from https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/CSS\/Mozilla_Extensions.  Mozilla Developer Network. 2018. Mozilla CSS Extensions. Retrieved from https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/CSS\/Mozilla_Extensions."},{"key":"e_1_2_1_51_1","volume-title":"Nmap: The Network Mapper-OS Detection.","year":"2018","unstructured":"Nmap. 2018 . Nmap: The Network Mapper-OS Detection. Retrieved from https:\/\/nmap.org\/book\/man-os-detection.html. Nmap. 2018. Nmap: The Network Mapper-OS Detection. Retrieved from https:\/\/nmap.org\/book\/man-os-detection.html."},{"key":"e_1_2_1_52_1","unstructured":"NoScript. 2018. NoScript Official Website. Retrieved from https:\/\/noscript.net\/.  NoScript. 2018. NoScript Official Website. Retrieved from https:\/\/noscript.net\/."},{"key":"e_1_2_1_53_1","unstructured":"GitHub. 2018. OpenWPM - A Web Privacy Measurement Framework. Retrieved from https:\/\/github.com\/mozilla\/OpenWPM.  GitHub. 2018. OpenWPM - A Web Privacy Measurement Framework. Retrieved from https:\/\/github.com\/mozilla\/OpenWPM."},{"key":"e_1_2_1_54_1","unstructured":"Add-ons for Firefox. 2018. Popular Extensions-Add-ons for Firefox. Retrieved from https:\/\/addons.mozilla.org\/firefox\/search\/?sort=users8type=extension.  Add-ons for Firefox. 2018. Popular Extensions-Add-ons for Firefox. Retrieved from https:\/\/addons.mozilla.org\/firefox\/search\/?sort=users8type=extension."},{"key":"e_1_2_1_55_1","unstructured":"EFF. 2018. Privacy Badger Official Website-Electronic Frontier Foundation. Retrieved from https:\/\/www.eff.org\/privacybadger.  EFF. 2018. Privacy Badger Official Website-Electronic Frontier Foundation. Retrieved from https:\/\/www.eff.org\/privacybadger."},{"key":"e_1_2_1_56_1","unstructured":"Mozilla. 2018. Security\/Fingerprinting\u2014Mozilla Wiki. Retrieved from https:\/\/wiki.mozilla.org\/Security\/Fingerprinting.  Mozilla. 2018. Security\/Fingerprinting\u2014Mozilla Wiki. Retrieved from https:\/\/wiki.mozilla.org\/Security\/Fingerprinting."},{"key":"e_1_2_1_57_1","unstructured":"Mozilla. 2018. Security\/Fusion\u2014Mozilla Wiki. Retrieved from https:\/\/wiki.mozilla.org\/Security\/Fusion.  Mozilla. 2018. Security\/Fusion\u2014Mozilla Wiki. Retrieved from https:\/\/wiki.mozilla.org\/Security\/Fusion."},{"key":"e_1_2_1_58_1","unstructured":"Mozilla. 2018. Security\/Tor Uplift\u2014Mozilla Wiki. Retrieved from https:\/\/wiki.mozilla.org\/Security\/Tor_Uplift.  Mozilla. 2018. Security\/Tor Uplift\u2014Mozilla Wiki. Retrieved from https:\/\/wiki.mozilla.org\/Security\/Tor_Uplift."},{"key":"e_1_2_1_59_1","unstructured":"The Tor Project. 2018. The Design and Implementation of the Tor Browser [DRAFT]- Tor Project Official Website. Retrieved from https:\/\/www.torproject.org\/projects\/torbrowser\/design\/.  The Tor Project. 2018. The Design and Implementation of the Tor Browser [DRAFT]- Tor Project Official Website. Retrieved from https:\/\/www.torproject.org\/projects\/torbrowser\/design\/."},{"key":"e_1_2_1_60_1","unstructured":"Distil Networks. 2018. The Evolution of Hi-Def Fingerprinting in Bot Mitigation. Retrieved from https:\/\/resources.distilnetworks.com\/all-blog-posts\/device-fingerprinting-solution-bot-mitigation.  Distil Networks. 2018. The Evolution of Hi-Def Fingerprinting in Bot Mitigation. Retrieved from https:\/\/resources.distilnetworks.com\/all-blog-posts\/device-fingerprinting-solution-bot-mitigation."},{"key":"e_1_2_1_61_1","unstructured":"ThreatMetrix. 2018. ThreatMetrix Announces Cookieless Device Identification to Prevent Online Fraud While Protecting Customer Privacy. Retrieved from https:\/\/www.threatmetrix.com\/press-releases\/threatmetrix-announces-cookieless-device-identification-to-prevent-online-fraud-while-protecting-customer-privacy\/.  ThreatMetrix. 2018. ThreatMetrix Announces Cookieless Device Identification to Prevent Online Fraud While Protecting Customer Privacy. Retrieved from https:\/\/www.threatmetrix.com\/press-releases\/threatmetrix-announces-cookieless-device-identification-to-prevent-online-fraud-while-protecting-customer-privacy\/."},{"key":"e_1_2_1_62_1","unstructured":"The Tor Project. 2018. Tor Browser\u2014Tor Project Official Website. Retrieved from https:\/\/www.torproject.org\/projects\/torbrowser.html.  The Tor Project. 2018. Tor Browser\u2014Tor Project Official Website. Retrieved from https:\/\/www.torproject.org\/projects\/torbrowser.html."},{"key":"e_1_2_1_63_1","unstructured":"GitHub. 2018. uBlock Origin\u2014An Efficient Blocker for Chromium and Firefox. Fast and Lean. Retrieved from https:\/\/github.com\/gorhill\/uBlock.  GitHub. 2018. uBlock Origin\u2014An Efficient Blocker for Chromium and Firefox. Fast and Lean. Retrieved from https:\/\/github.com\/gorhill\/uBlock."},{"key":"e_1_2_1_64_1","unstructured":"W3C. 2018. Web Audio API. Retrieved from https:\/\/www.w3.org\/TR\/webaudio\/.  W3C. 2018. Web Audio API. Retrieved from https:\/\/www.w3.org\/TR\/webaudio\/."},{"key":"e_1_2_1_65_1","unstructured":"W3C. 2018. Web Payments API. Retrieved from https:\/\/www.w3.org\/TR\/payment-request\/.  W3C. 2018. Web Payments API. Retrieved from https:\/\/www.w3.org\/TR\/payment-request\/."},{"key":"e_1_2_1_66_1","unstructured":"WebAssembly. 2018. WebAssembly API. Retrieved from http:\/\/webassembly.org\/.  WebAssembly. 2018. WebAssembly API. Retrieved from http:\/\/webassembly.org\/."},{"key":"e_1_2_1_67_1","unstructured":"Khronos Group. 2018. WebGL\u2014OpenGL ES for the Web. Retrieved from https:\/\/www.khronos.org\/webgl\/.  Khronos Group. 2018. WebGL\u2014OpenGL ES for the Web. Retrieved from https:\/\/www.khronos.org\/webgl\/."},{"key":"e_1_2_1_68_1","unstructured":"W3C. 2018. WebRTC API. Retrieved from https:\/\/www.w3.org\/TR\/webrtc\/.  W3C. 2018. WebRTC API. Retrieved from https:\/\/www.w3.org\/TR\/webrtc\/."},{"key":"e_1_2_1_69_1","unstructured":"W3C. 2018. WebXR Device API. Retrieved from https:\/\/www.w3.org\/TR\/webxr\/.  W3C. 2018. WebXR Device API. Retrieved from https:\/\/www.w3.org\/TR\/webxr\/."},{"key":"e_1_2_1_70_1","unstructured":"StatCounter. 2019. Browser Market Share Worldwide. Retrieved from https:\/\/gs.statcounter.com\/browser-market-share.  StatCounter. 2019. Browser Market Share Worldwide. Retrieved from https:\/\/gs.statcounter.com\/browser-market-share."},{"key":"e_1_2_1_71_1","unstructured":"Google. 2019. Building a More Private Web. Retrieved from https:\/\/www.blog.google\/products\/chrome\/building-a-more-private-web\/.  Google. 2019. Building a More Private Web. Retrieved from https:\/\/www.blog.google\/products\/chrome\/building-a-more-private-web\/."},{"key":"e_1_2_1_72_1","unstructured":"Mozilla. 2019. Firefox Now Available with Enhanced Tracking Protection by Default Plus Updates to Facebook Container. Firefox Monitor and Lockwise. Retrieved from https:\/\/blog.mozilla.org\/blog\/2019\/06\/04\/firefox-now-available-with-enhanced-tracking-protection-by-default\/.  Mozilla. 2019. Firefox Now Available with Enhanced Tracking Protection by Default Plus Updates to Facebook Container. Firefox Monitor and Lockwise. Retrieved from https:\/\/blog.mozilla.org\/blog\/2019\/06\/04\/firefox-now-available-with-enhanced-tracking-protection-by-default\/."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_2_1_75_1","unstructured":"Jagdish Prasad Achara Gergely \u00c1cs and Claude Castelluccia. 2015. On the unicity of smartphone applications. Retrieved from http:\/\/arxiv.org\/abs\/1507.07851.  Jagdish Prasad Achara Gergely \u00c1cs and Claude Castelluccia. 2015. On the unicity of smartphone applications. Retrieved from http:\/\/arxiv.org\/abs\/1507.07851."},{"key":"e_1_2_1_76_1","volume-title":"Proceedings of the 21st International Conference on Information Security (ISC\u201918)","author":"Al-Fannah Nasser Mohammed","unstructured":"Nasser Mohammed Al-Fannah , Wanpeng Li , and Chris J. Mitchell . 2018. Beyond cookie monster amnesia: Real world persistent online tracking . In Proceedings of the 21st International Conference on Information Security (ISC\u201918) . 481--501. DOI:https:\/\/doi.org\/10.1007\/978-3-319-99136-8_26 Nasser Mohammed Al-Fannah, Wanpeng Li, and Chris J. Mitchell. 2018. Beyond cookie monster amnesia: Real world persistent online tracking. In Proceedings of the 21st International Conference on Information Security (ISC\u201918). 481--501. DOI:https:\/\/doi.org\/10.1007\/978-3-319-99136-8_26"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991091"},{"key":"e_1_2_1_78_1","volume-title":"Ashkan Soltani, Nathan Good, and Chris Jay Hoofnagle.","author":"Ayenson Mika D.","year":"2011","unstructured":"Mika D. Ayenson , Dietrich James Wambach , Ashkan Soltani, Nathan Good, and Chris Jay Hoofnagle. 2011 . Flash cookies and privacy II : Now with HTML5 and ETag respawning. Retrieved from https:\/\/dx.doi.org\/10.2139\/ssrn.1898390. Mika D. Ayenson, Dietrich James Wambach, Ashkan Soltani, Nathan Good, and Chris Jay Hoofnagle. 2011. Flash cookies and privacy II: Now with HTML5 and ETag respawning. Retrieved from https:\/\/dx.doi.org\/10.2139\/ssrn.1898390."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994621"},{"key":"e_1_2_1_80_1","volume-title":"G\u00e1bor Gy\u00f6rgy Guly\u00e1s, and S\u00e1ndor Imre","author":"Boda K\u00e1roly","year":"2012","unstructured":"K\u00e1roly Boda , \u00c1d\u00e1m M\u00e1t\u00e9 F\u00f6ldes , G\u00e1bor Gy\u00f6rgy Guly\u00e1s, and S\u00e1ndor Imre . 2012 . User Tracking on the Web via Cross-Browser Fingerprinting. Lecture Notes in Computer Science, Vol. 7161 . Springer , Berlin, 31--46. DOI:https:\/\/doi.org\/10.1007\/978-3-642-29615-4_4 K\u00e1roly Boda, \u00c1d\u00e1m M\u00e1t\u00e9 F\u00f6ldes, G\u00e1bor Gy\u00f6rgy Guly\u00e1s, and S\u00e1ndor Imre. 2012. User Tracking on the Web via Cross-Browser Fingerprinting. Lecture Notes in Computer Science, Vol. 7161. Springer, Berlin, 31--46. DOI:https:\/\/doi.org\/10.1007\/978-3-642-29615-4_4"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994459.2994467"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23152"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313703"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881152"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_2_1_86_1","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of the 29th Data and Applications Security and Privacy Conference","author":"FaizKhademi Amin","unstructured":"Amin FaizKhademi , Mohammad Zulkernine , and Komminist Weldemariam . 2015. FPGuard: Detection and prevention of browser fingerprinting . In Proceedings of the 29th Data and Applications Security and Privacy Conference . Lecture Notes in Computer Science , Vol. 9149 . Springer International Publishing , 293--308. DOI:https:\/\/doi.org\/10.1007\/978-3-319-20810-7_21 Amin FaizKhademi, Mohammad Zulkernine, and Komminist Weldemariam. 2015. FPGuard: Detection and prevention of browser fingerprinting. In Proceedings of the 29th Data and Applications Security and Privacy Conference. Lecture Notes in Computer Science, Vol. 9149. Springer International Publishing, 293--308. DOI:https:\/\/doi.org\/10.1007\/978-3-319-20810-7_21"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_7"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2014.102"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186097"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268959"},{"key":"e_1_2_1_91_1","volume-title":"Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS\u201916)","author":"Khattak Sheharbano","year":"2017","unstructured":"Sheharbano Khattak , David Fifield , Sadia Afroz , Mobin Javed , Srikanth Sundaresan , Damon McCoy , Vern Paxson , and Steven J. Murdoch . 2016. Do you see what I see? Differential treatment of anonymous users . In Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS\u201916) . Retrieved from http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/ 2017 \/09\/do-you-see-what-i-see-differential-treatment-anonymous-users.pdf. Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, and Steven J. Murdoch. 2016. Do you see what I see? Differential treatment of anonymous users. In Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS\u201916). Retrieved from http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2017\/09\/do-you-see-what-i-see-differential-treatment-anonymous-users.pdf."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0027"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_3"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_7"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2015.18"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_2_1_97_1","volume-title":"Any person a pamphleteer: Internet Anonymity in the Age of Web 2.0. Undergraduate Senior Thesis","author":"Mayer Jonathan R.","unstructured":"Jonathan R. Mayer . 2009. Any person a pamphleteer: Internet Anonymity in the Age of Web 2.0. Undergraduate Senior Thesis , Princeton University . Jonathan R. Mayer. 2009. Any person a pamphleteer: Internet Anonymity in the Age of Web 2.0. Undergraduate Senior Thesis, Princeton University."},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.26"},{"key":"e_1_2_1_99_1","volume-title":"Proceedings of the Workshop on Web 2.0 Security and Privacy (W2SP\u201911)","author":"Mowery Keaton","year":"2011","unstructured":"Keaton Mowery , Dillon Bogenreif , Scott Yilek , and Hovav Shacham . 2011 . Fingerprinting information in JavaScript implementations . In Proceedings of the Workshop on Web 2.0 Security and Privacy (W2SP\u201911) , Helen Wang (Ed.). IEEE Computer Society. Keaton Mowery, Dillon Bogenreif, Scott Yilek, and Hovav Shacham. 2011. Fingerprinting information in JavaScript implementations. In Proceedings of the Workshop on Web 2.0 Security and Privacy (W2SP\u201911), Helen Wang (Ed.). IEEE Computer Society."},{"key":"e_1_2_1_100_1","volume-title":"Proceedings of the Workshop on Web 2.0 Security and Privacy (W2SP\u201912)","author":"Mowery Keaton","year":"2012","unstructured":"Keaton Mowery and Hovav Shacham . 2012 . Pixel perfect: Fingerprinting canvas in HTML5 . In Proceedings of the Workshop on Web 2.0 Security and Privacy (W2SP\u201912) , Matt Fredrikson (Ed.). IEEE Computer Society. Keaton Mowery and Hovav Shacham. 2012. Pixel perfect: Fingerprinting canvas in HTML5. In Proceedings of the Workshop on Web 2.0 Security and Privacy (W2SP\u201912), Matt Fredrikson (Ed.). IEEE Computer Society."},{"key":"e_1_2_1_101_1","volume-title":"Proceedings of the Web 2.0 Workshop on Security and Privacy (W2SP)","volume":"5","author":"Mulazzani Martin","year":"2013","unstructured":"Martin Mulazzani , Philipp Reschl , Markus Huber , Manuel Leithner , Sebastian Schrittwieser , Edgar Weippl , and FH Campus Wien . 2013 . Fast and reliable browser identification with javascript engine fingerprinting . In Proceedings of the Web 2.0 Workshop on Security and Privacy (W2SP) , Vol. 5 . Martin Mulazzani, Philipp Reschl, Markus Huber, Manuel Leithner, Sebastian Schrittwieser, Edgar Weippl, and FH Campus Wien. 2013. Fast and reliable browser identification with javascript engine fingerprinting. In Proceedings of the Web 2.0 Workshop on Security and Privacy (W2SP), Vol. 5."},{"key":"e_1_2_1_102_1","unstructured":"Gabi Nakibly Gilad Shelef and Shiran Yudilevich. 2015. Hardware fingerprinting using HTML5. Retrieved from http:\/\/arxiv.org\/abs\/1503.01408.  Gabi Nakibly Gilad Shelef and Shiran Yudilevich. 2015. Hardware fingerprinting using HTML5. Retrieved from http:\/\/arxiv.org\/abs\/1503.01408."},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741090"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_2_1_105_1","volume-title":"The Leaking Battery","author":"Olejnik \u0141ukasz","unstructured":"\u0141ukasz Olejnik , Gunes Acar , Claude Castelluccia , and Claudia Diaz . 2016. The Leaking Battery . Springer International Publishing , Cham , 254--263. DOI:https:\/\/doi.org\/10.1007\/978-3-319-29883-2_18 \u0141ukasz Olejnik, Gunes Acar, Claude Castelluccia, and Claudia Diaz. 2016. The Leaking Battery. Springer International Publishing, Cham, 254--263. DOI:https:\/\/doi.org\/10.1007\/978-3-319-29883-2_18"},{"key":"e_1_2_1_106_1","volume-title":"Proceedings of the 3rd International Workshop on Privacy Engineering (IWPE\u201917)","author":"Olejnik Lukasz","year":"2017","unstructured":"Lukasz Olejnik , Steven Englehardt , and Arvind Narayanan . 2017 . Battery status not included: Assessing privacy in web standards . In Proceedings of the 3rd International Workshop on Privacy Engineering (IWPE\u201917) . Lukasz Olejnik, Steven Englehardt, and Arvind Narayanan. 2017. Battery status not included: Assessing privacy in web standards. In Proceedings of the 3rd International Workshop on Privacy Engineering (IWPE\u201917)."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313637"},{"key":"e_1_2_1_108_1","volume-title":"Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS\u201916)","author":"Saito T.","year":"2016","unstructured":"T. Saito , K. Yasuda , T. Ishikawa , R. Hosoi , K. Takahashi , Y. Chen , and M. Zalasi\u0144ski . 2016. Estimating CPU features by browser fingerprinting . In Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS\u201916) . 587--592. DOI:https:\/\/doi.org\/10.1109\/IMIS. 2016 .108 T. Saito, K. Yasuda, T. Ishikawa, R. Hosoi, K. Takahashi, Y. Chen, and M. Zalasi\u0144ski. 2016. Estimating CPU features by browser fingerprinting. In Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS\u201916). 587--592. DOI:https:\/\/doi.org\/10.1109\/IMIS.2016.108"},{"key":"e_1_2_1_109_1","volume-title":"Proceedings of the 12th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA\u201917)","author":"Saito Takamichi","year":"2017","unstructured":"Takamichi Saito , Koki Yasuda , Kazuhisa Tanabe , and Kazushi Takahashi . 2017 . Web browser tampering: Inspecting CPU features from side-channel information . In Proceedings of the 12th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA\u201917) . 392--403. DOI:https:\/\/doi.org\/10.1007\/978-3-319-69811-3_36 Takamichi Saito, Koki Yasuda, Kazuhisa Tanabe, and Kazushi Takahashi. 2017. Web browser tampering: Inspecting CPU features from side-channel information. In Proceedings of the 12th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA\u201917). 392--403. DOI:https:\/\/doi.org\/10.1007\/978-3-319-69811-3_36"},{"key":"e_1_2_1_110_1","volume-title":"Proceedings of the 26th USENIX Security Symposium. 679--694","author":"S\u00e1nchez-Rola Iskander","year":"2017","unstructured":"Iskander S\u00e1nchez-Rola , Igor Santos , and Davide Balzarotti . 2017 . Extension breakdown: Security analysis of browsers extension resources control policies . In Proceedings of the 26th USENIX Security Symposium. 679--694 . Iskander S\u00e1nchez-Rola, Igor Santos, and Davide Balzarotti. 2017. Extension breakdown: Security analysis of browsers extension resources control policies. In Proceedings of the 26th USENIX Security Symposium. 679--694."},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243796"},{"key":"e_1_2_1_112_1","unstructured":"J. Schuh. 2013. Saying Goodbye to Our Old Friend NPAPI. Retrieved from https:\/\/blog.chromium.org\/2013\/09\/saying-goodbye-to-our-old-friend-npapi.html.  J. Schuh. 2013. Saying Goodbye to Our Old Friend NPAPI. Retrieved from https:\/\/blog.chromium.org\/2013\/09\/saying-goodbye-to-our-old-friend-npapi.html."},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23155"},{"key":"e_1_2_1_114_1","volume-title":"Keromytis","author":"Sivakorn Suphannee","year":"2016","unstructured":"Suphannee Sivakorn , Jason Polakis , and Angelos D . Keromytis . 2016 . I\u2019m not a human: Breaking the Google reCAPTCHA. Retrieved from https:\/\/www.blackhat.com\/docs\/asia-16\/materials\/asia-16-Sivakorn-Im-Not-a-Human-Breaking-the-Google-reCAPTCHA-wp.pdf. Suphannee Sivakorn, Jason Polakis, and Angelos D. Keromytis. 2016. I\u2019m not a human: Breaking the Google reCAPTCHA. Retrieved from https:\/\/www.blackhat.com\/docs\/asia-16\/materials\/asia-16-Sivakorn-Im-Not-a-Human-Breaking-the-Google-reCAPTCHA-wp.pdf."},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23309"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029820"},{"key":"e_1_2_1_117_1","volume-title":"Proceedings of the AAAI Spring Symposium: Intelligent Information Privacy Management","volume":"2010","author":"Soltani Ashkan","year":"2010","unstructured":"Ashkan Soltani , Shannon Canty , Quentin Mayo , Lauren Thomas , and Chris Jay Hoofnagle . 2010 . Flash cookies and privacy . In Proceedings of the AAAI Spring Symposium: Intelligent Information Privacy Management , Vol. 2010 . 158--163. Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas, and Chris Jay Hoofnagle. 2010. Flash cookies and privacy. In Proceedings of the AAAI Spring Symposium: Intelligent Information Privacy Management, Vol. 2010. 158--163."},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751323.2751329"},{"key":"e_1_2_1_119_1","volume-title":"Leveraging battery usage from mobile devices for active authentication. Mobile Info. Syst. 2017","author":"Spooren Jan","year":"2017","unstructured":"Jan Spooren , Davy Preuveneers , and Wouter Joosen . 2017. Leveraging battery usage from mobile devices for active authentication. Mobile Info. Syst. 2017 ( 2017 ), 1367064:1--1367064:14. DOI:https:\/\/doi.org\/10.1155\/2017\/1367064 Jan Spooren, Davy Preuveneers, and Wouter Joosen. 2017. Leveraging battery usage from mobile devices for active authentication. Mobile Info. Syst. 2017 (2017), 1367064:1--1367064:14. DOI:https:\/\/doi.org\/10.1155\/2017\/1367064"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313458"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.18"},{"key":"e_1_2_1_122_1","volume-title":"Proceedings of the 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA\u201915)","author":"Takei N.","year":"2015","unstructured":"N. Takei , T. Saito , K. Takasu , and T. Yamada . 2015. Web browser fingerprinting using only cascading style sheets . In Proceedings of the 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA\u201915) . 57--63. DOI:https:\/\/doi.org\/10.1109\/BWCCA. 2015 .105 N. Takei, T. Saito, K. Takasu, and T. Yamada. 2015. Web browser fingerprinting using only cascading style sheets. In Proceedings of the 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA\u201915). 57--63. DOI:https:\/\/doi.org\/10.1109\/BWCCA.2015.105"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_1"},{"key":"e_1_2_1_124_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIXSecurity\u201919)","author":"Trickel Erik","year":"2019","unstructured":"Erik Trickel , Oleksii Starov , Alexandros Kapravelos , Nick Nikiforakis , and Adam Doup\u00e9 . 2019 . Everyone is different: Client-side diversification for defending against extension fingerprinting . In Proceedings of the 28th USENIX Security Symposium (USENIXSecurity\u201919) . USENIX Association, 1679--1696. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/trickel. Erik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, and Adam Doup\u00e9. 2019. Everyone is different: Client-side diversification for defending against extension fingerprinting. In Proceedings of the 28th USENIX Security Symposium (USENIXSecurity\u201919). USENIX Association, 1679--1696. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/trickel."},{"key":"e_1_2_1_125_1","volume-title":"Proceedings of the International Conference on Availability, Reliability and Security. 255--261","author":"Unger T.","year":"2013","unstructured":"T. Unger , M. Mulazzani , D. Fr\u00fchwirt , M. Huber , S. Schrittwieser , and E. Weippl . 2013. SHPF: Enhancing HTTP(S) session security with browser fingerprinting . In Proceedings of the International Conference on Availability, Reliability and Security. 255--261 . DOI:https:\/\/doi.org\/10.1109\/ARES. 2013 .33 T. Unger, M. Mulazzani, D. Fr\u00fchwirt, M. Huber, S. Schrittwieser, and E. Weippl. 2013. SHPF: Enhancing HTTP(S) session security with browser fingerprinting. In Proceedings of the International Conference on Availability, Reliability and Security. 255--261. DOI:https:\/\/doi.org\/10.1109\/ARES.2013.33"},{"key":"e_1_2_1_126_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIXSecurity\u201918)","author":"Vastel Antoine","year":"2018","unstructured":"Antoine Vastel , Pierre Laperdrix , Walter Rudametkin , and Romain Rouvoy . 2018 . FP-Scanner: The privacy implications of browser fingerprint inconsistencies . In Proceedings of the 27th USENIX Security Symposium (USENIXSecurity\u201918) . USENIX Association, 135--150. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/vastel. Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. 2018. FP-Scanner: The privacy implications of browser fingerprint inconsistencies. In Proceedings of the 27th USENIX Security Symposium (USENIXSecurity\u201918). USENIX Association, 135--150. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/vastel."},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00008"},{"key":"e_1_2_1_128_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIXSecurity\u201919)","author":"Wu Shujiang","year":"2019","unstructured":"Shujiang Wu , Song Li , Yinzhi Cao , and Ningfei Wang . 2019 . Rendered private: Making GLSL execution uniform to prevent WebGL-based browser fingerprinting . In Proceedings of the 28th USENIX Security Symposium (USENIXSecurity\u201919) . USENIX Association, 1645--1660. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/wu. Shujiang Wu, Song Li, Yinzhi Cao, and Ningfei Wang. 2019. Rendered private: Making GLSL execution uniform to prevent WebGL-based browser fingerprinting. In Proceedings of the 28th USENIX Security Symposium (USENIXSecurity\u201919). USENIX Association, 1645--1660. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/wu."},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2626395"},{"key":"e_1_2_1_130_1","volume-title":"Proceedings of the 25th International Conference on World Wide Web (WWW\u201916). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 121--132","author":"Yu Zhonghao","unstructured":"Zhonghao Yu , Sam Macbeth , Konark Modi , and Josep M. Pujol . 2016. Tracking the trackers . In Proceedings of the 25th International Conference on World Wide Web (WWW\u201916). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 121--132 . DOI:https:\/\/doi.org\/10.1145\/2872427.2883028 Zhonghao Yu, Sam Macbeth, Konark Modi, and Josep M. Pujol. 2016. Tracking the trackers. In Proceedings of the 25th International Conference on World Wide Web (WWW\u201916). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 121--132. DOI:https:\/\/doi.org\/10.1145\/2872427.2883028"}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386040","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386040"}},"subtitle":["A Survey"],"short-title":[],"issued":{"date-parts":[[2020,4,9]]},"references-count":130,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,5,31]]}},"alternative-id":["10.1145\/3386040"],"URL":"https:\/\/doi.org\/10.1145\/3386040","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"value":"1559-1131","type":"print"},{"value":"1559-114X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,9]]},"assertion":[{"value":"2018-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}