{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:21:59Z","timestamp":1755926519058,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427297","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"627-642","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms"],"prefix":"10.1145","author":[{"given":"Nampoina","family":"Andriamilanto","sequence":"first","affiliation":[{"name":"Univ Rennes, CNRS, IRISA Rennes, France"}]},{"given":"Tristan","family":"Allard","sequence":"additional","affiliation":[{"name":"Univ Rennes, CNRS, IRISA Rennes, France"}]},{"given":"Ga\u00ebtan","family":"Le Guelvouit","sequence":"additional","affiliation":[{"name":"IRT b&lt;&gt;com Cesson-S\u00e9vign\u00e9, France"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mustafa Gunes\u00a0Can Acar. 2017. Online Tracking Technologies and Web Privacy. https:\/\/lirias.kuleuven.be\/retrieve\/454271  Mustafa Gunes\u00a0Can Acar. 2017. Online Tracking Technologies and Web Privacy. https:\/\/lirias.kuleuven.be\/retrieve\/454271"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2017.8167801"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991091"},{"key":"e_1_3_2_1_4_1","volume-title":"Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)","author":"Andriamilanto Nampoina","year":"2021","unstructured":"Nampoina Andriamilanto , Tristan Allard , and Ga\u00ebtan Le\u00a0Guelvouit . 2021. \u201c Guess Who? \u201d Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) ( 2021 ), Leonard Barolli, Aneta Poniszewska-Maranda, and Hyunhee Park (Eds .). 161\u2013172. https:\/\/doi.org\/10.1007\/978-3-030-50399-4_16 10.1007\/978-3-030-50399-4_16 Nampoina Andriamilanto, Tristan Allard, and Ga\u00ebtan Le\u00a0Guelvouit. 2021. \u201cGuess Who?\u201d Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) (2021), Leonard Barolli, Aneta Poniszewska-Maranda, and Hyunhee Park (Eds.). 161\u2013172. https:\/\/doi.org\/10.1007\/978-3-030-50399-4_16"},{"key":"e_1_3_2_1_5_1","unstructured":"Nampoina Andriamilanto Tristan Allard Ga\u00ebtan Le\u00a0Guelvouit and Alexandre Garel. 2020. A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication. (2020). https:\/\/arxiv.org\/abs\/2006.09511 under reviews.  Nampoina Andriamilanto Tristan Allard Ga\u00ebtan Le\u00a0Guelvouit and Alexandre Garel. 2020. A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication. (2020). https:\/\/arxiv.org\/abs\/2006.09511 under reviews."},{"key":"e_1_3_2_1_6_1","unstructured":"Mohammadreza Ashouri Hooman Asadian and Christian Hammer. 2018. Large-Scale Analysis of Sophisticated Web Browser Fingerprinting Scripts. (2018). https:\/\/hal.archives-ouvertes.fr\/hal-01811691  Mohammadreza Ashouri Hooman Asadian and Christian Hammer. 2018. Large-Scale Analysis of Sophisticated Web Browser Fingerprinting Scripts. (2018). https:\/\/hal.archives-ouvertes.fr\/hal-01811691"},{"key":"e_1_3_2_1_7_1","volume-title":"Flash and Canvas Fingerprinting Protection. In ACM Workshop on Privacy in the Electronic Society (WPES)","author":"Baumann Peter","year":"2016","unstructured":"Peter Baumann , Stefan Katzenbeisser , Martin Stopczynski , and Erik Tews . 2016 . Disguised Chromium Browser: Robust Browser , Flash and Canvas Fingerprinting Protection. In ACM Workshop on Privacy in the Electronic Society (WPES) (2016). 37\u201346. https:\/\/doi.org\/10.1145\/2994620.2994621 10.1145\/2994620.2994621 Peter Baumann, Stefan Katzenbeisser, Martin Stopczynski, and Erik Tews. 2016. Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection. In ACM Workshop on Privacy in the Electronic Society (WPES) (2016). 37\u201346. https:\/\/doi.org\/10.1145\/2994620.2994621"},{"key":"#cr-split#-e_1_3_2_1_8_1.1","doi-asserted-by":"crossref","unstructured":"C. Blakemore J. Redol and M. Correia. 2016. Fingerprinting for Web Applications: From Devices to Related Groups. In IEEE Trustcom\/BigDataSE\/ISPA (2016-08). 144-151. https:\/\/doi.org\/10.1109\/TrustCom.2016.0057 10.1109\/TrustCom.2016.0057","DOI":"10.1109\/TrustCom.2016.0057"},{"key":"#cr-split#-e_1_3_2_1_8_1.2","doi-asserted-by":"crossref","unstructured":"C. Blakemore J. Redol and M. Correia. 2016. Fingerprinting for Web Applications: From Devices to Related Groups. In IEEE Trustcom\/BigDataSE\/ISPA (2016-08). 144-151. https:\/\/doi.org\/10.1109\/TrustCom.2016.0057","DOI":"10.1109\/TrustCom.2016.0057"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29615-4_4"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994459.2994467"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"#cr-split#-e_1_3_2_1_14_1.1","doi-asserted-by":"crossref","unstructured":"David Fifield and Serge Egelman. 2015. Fingerprinting Web Users Through Font Metrics. In Financial Cryptography and Data Security (FC)(2015) Rainer B\u00f6hme and Tatsuaki Okamoto (Eds.). 107-124. https:\/\/doi.org\/10.1007\/978-3-662-47854-7_7 10.1007\/978-3-662-47854-7_7","DOI":"10.1007\/978-3-662-47854-7_7"},{"key":"#cr-split#-e_1_3_2_1_14_1.2","doi-asserted-by":"crossref","unstructured":"David Fifield and Serge Egelman. 2015. Fingerprinting Web Users Through Font Metrics. In Financial Cryptography and Data Security (FC)(2015) Rainer B\u00f6hme and Tatsuaki Okamoto (Eds.). 107-124. https:\/\/doi.org\/10.1007\/978-3-662-47854-7_7","DOI":"10.1007\/978-3-662-47854-7_7"},{"key":"e_1_3_2_1_15_1","unstructured":"David Fifield and Mia\u00a0Gil Epner. 2016. Fingerprintability of WebRTC. (2016). https:\/\/arxiv.org\/abs\/1605.08805  David Fifield and Mia\u00a0Gil Epner. 2016. Fingerprintability of WebRTC. (2016). https:\/\/arxiv.org\/abs\/1605.08805"},{"key":"e_1_3_2_1_16_1","unstructured":"Erik Flood and Joel Karlsson. 2012. Browser Fingerprinting. https:\/\/hdl.handle.net\/20.500.12380\/163728  Erik Flood and Joel Karlsson. 2012. Browser Fingerprinting. https:\/\/hdl.handle.net\/20.500.12380\/163728"},{"key":"e_1_3_2_1_17_1","volume-title":"Exploring Rate-Limiting on the Web. In USENIX Symposium on Usable Privacy and Security (SOUPS) (2018-08-12)","author":"Golla Maximilian","year":"2018","unstructured":"Maximilian Golla , Theodor Schnitzler , and Markus D\u00fcrmuth . 2018 . \u201c Will Any Password Do? \u201d Exploring Rate-Limiting on the Web. In USENIX Symposium on Usable Privacy and Security (SOUPS) (2018-08-12) . Maximilian Golla, Theodor Schnitzler, and Markus D\u00fcrmuth. 2018. \u201cWill Any Password Do?\u201d Exploring Rate-Limiting on the Web. In USENIX Symposium on Usable Privacy and Security (SOUPS) (2018-08-12)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0051"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186097"},{"key":"e_1_3_2_1_20_1","first-page":"309","article-title":"Shadow Attacks Based on Password Reuses","volume":"15","author":"Han Weili","year":"2018","unstructured":"Weili Han , Zhigong Li , Minyue Ni , Guofei Gu , and Wenyuan Xu . 2018 . Shadow Attacks Based on Password Reuses : A Quantitative Empirical Analysis. 15 , 2 (2018), 309 \u2013 320 . https:\/\/doi.org\/10.1109\/TDSC.2016.2568187 10.1109\/TDSC.2016.2568187 Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, and Wenyuan Xu. 2018. Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis. 15, 2 (2018), 309\u2013320. https:\/\/doi.org\/10.1109\/TDSC.2016.2568187","journal-title":"A Quantitative Empirical Analysis."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408670"},{"key":"e_1_3_2_1_22_1","volume-title":"Support Vector Machines. 13, 4","author":"Hearst A.","year":"1998","unstructured":"Marti\u00a0 A. Hearst , Susan\u00a0 T Dumais , Edgar Osuna , John Platt , and Bernhard Scholkopf . 1998. Support Vector Machines. 13, 4 ( 1998 ), 18\u201328. https:\/\/doi.org\/10.1109\/5254.708428 10.1109\/5254.708428 Marti\u00a0A. Hearst, Susan\u00a0T Dumais, Edgar Osuna, John Platt, and Bernhard Scholkopf. 1998. Support Vector Machines. 13, 4 (1998), 18\u201328. https:\/\/doi.org\/10.1109\/5254.708428"},{"key":"e_1_3_2_1_23_1","unstructured":"Peter Hra\u0161ka. 2018. Browser Fingerprinting. https:\/\/virpo.sk\/browser-fingerprinting-hraska-diploma-thesis.pdf  Peter Hra\u0161ka. 2018. Browser Fingerprinting. https:\/\/virpo.sk\/browser-fingerprinting-hraska-diploma-thesis.pdf"},{"key":"e_1_3_2_1_24_1","unstructured":"Daniel Jurafsky and James\u00a0H. Martin. 2009. Speech and Language Processing(2 ed.). Pearson. 23\u201327 pages.  Daniel Jurafsky and James\u00a0H. Martin. 2009. Speech and Language Processing(2 ed.). Pearson. 23\u201327 pages."},{"volume-title":"Speech and Language Processing (2Nd Edition)","author":"Jurafsky Daniel","key":"e_1_3_2_1_25_1","unstructured":"Daniel Jurafsky and James\u00a0 H. Martin . 2009. Speech and Language Processing (2Nd Edition) . Prentice-Hall, Inc. , Upper Saddle River, NJ, USA. 325\u2013326 pages. Daniel Jurafsky and James\u00a0H. Martin. 2009. Speech and Language Processing (2Nd Edition). Prentice-Hall, Inc., Upper Saddle River, NJ, USA. 325\u2013326 pages."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.3113\/JSOA.2017.0040"},{"key":"e_1_3_2_1_27_1","volume-title":"Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting. In Network and Distributed System Security Symposium (NDSS) (2020","author":"Karami Soroush","year":"2020","unstructured":"Soroush Karami , Panagiotis Ilia , Konstantinos Solomos , and Jason Polakis . 2020 . Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting. In Network and Distributed System Security Symposium (NDSS) (2020 ). https:\/\/doi.org\/10.14722\/ndss.2020.24383 10.14722\/ndss.2020.24383 Soroush Karami, Panagiotis Ilia, Konstantinos Solomos, and Jason Polakis. 2020. Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting. In Network and Distributed System Security Symposium (NDSS) (2020). https:\/\/doi.org\/10.14722\/ndss.2020.24383"},{"volume-title":"Knapsack Problems","author":"Kellerer Hans","key":"e_1_3_2_1_28_1","unstructured":"Hans Kellerer , Ulrich Pferschy , and David Pisinger . 2004. Knapsack Problems . Springer-Verlag . https:\/\/www.springer.com\/gp\/book\/9783540402862 Hans Kellerer, Ulrich Pferschy, and David Pisinger. 2004. Knapsack Problems. Springer-Verlag. https:\/\/www.springer.com\/gp\/book\/9783540402862"},{"key":"e_1_3_2_1_29_1","volume-title":"An Empirical Evaluation of Web-Based Fingerprinting. 32, 4","author":"Khademi Amin\u00a0Faiz","year":"2015","unstructured":"Amin\u00a0Faiz Khademi , Mohammad Zulkernine , and Komminist Weldemariam . 2015. An Empirical Evaluation of Web-Based Fingerprinting. 32, 4 ( 2015 ), 46\u201352. https:\/\/doi.org\/10.1109\/MS.2015.77 10.1109\/MS.2015.77 Amin\u00a0Faiz Khademi, Mohammad Zulkernine, and Komminist Weldemariam. 2015. An Empirical Evaluation of Web-Based Fingerprinting. 32, 4 (2015), 46\u201352. https:\/\/doi.org\/10.1109\/MS.2015.77"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0027"},{"key":"#cr-split#-e_1_3_2_1_31_1.1","doi-asserted-by":"crossref","unstructured":"Pierre Laperdrix Gildas Avoine Benoit Baudry and Nick Nikiforakis. 2019. Morellian Analysis for Browsers: Making Web Authentication Stronger With Canvas Fingerprinting. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA) (2019-06). 43-66. https:\/\/doi.org\/10.1007\/978-3-030-22038-9_3 10.1007\/978-3-030-22038-9_3","DOI":"10.1007\/978-3-030-22038-9_3"},{"key":"#cr-split#-e_1_3_2_1_31_1.2","doi-asserted-by":"crossref","unstructured":"Pierre Laperdrix Gildas Avoine Benoit Baudry and Nick Nikiforakis. 2019. Morellian Analysis for Browsers: Making Web Authentication Stronger With Canvas Fingerprinting. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA) (2019-06). 43-66. https:\/\/doi.org\/10.1007\/978-3-030-22038-9_3","DOI":"10.1007\/978-3-030-22038-9_3"},{"key":"e_1_3_2_1_32_1","volume-title":"Mitigating Browser Fingerprint Tracking: Multi-level Reconfiguration and Diversification","author":"Laperdrix Pierre","year":"2015","unstructured":"Pierre Laperdrix , Walter Rudametkin , and Benoit Baudry . 2015. Mitigating Browser Fingerprint Tracking: Multi-level Reconfiguration and Diversification . In IEEE\/ACM International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS) ( 2015 -05). 98\u2013108. https:\/\/doi.org\/10.1109\/SEAMS.2015.18 10.1109\/SEAMS.2015.18 Pierre Laperdrix, Walter Rudametkin, and Benoit Baudry. 2015. Mitigating Browser Fingerprint Tracking: Multi-level Reconfiguration and Diversification. In IEEE\/ACM International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS) (2015-05). 98\u2013108. https:\/\/doi.org\/10.1109\/SEAMS.2015.18"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_34_1","volume-title":"Dark Web\u2019s Doppelg\u00e4ngers Aim to Dupe Antifraud Systems. 63, 2","author":"Marks Paul","year":"2020","unstructured":"Paul Marks . 2020. Dark Web\u2019s Doppelg\u00e4ngers Aim to Dupe Antifraud Systems. 63, 2 ( 2020 ), 16\u201318. https:\/\/doi.org\/10.1145\/3374878 10.1145\/3374878 Paul Marks. 2020. Dark Web\u2019s Doppelg\u00e4ngers Aim to Dupe Antifraud Systems. 63, 2 (2020), 16\u201318. https:\/\/doi.org\/10.1145\/3374878"},{"key":"e_1_3_2_1_35_1","unstructured":"Jo\u00e3o Pedro Figueiredo Correia\u00a0Rijo Mendes. 2011. noPhish \u2013 Anti-phishing System using Browser Fingerprinting. https:\/\/estagios.dei.uc.pt\/cursos\/mei\/relatorios-de-estagio\/?id=279  Jo\u00e3o Pedro Figueiredo Correia\u00a0Rijo Mendes. 2011. noPhish \u2013 Anti-phishing System using Browser Fingerprinting. https:\/\/estagios.dei.uc.pt\/cursos\/mei\/relatorios-de-estagio\/?id=279"},{"key":"e_1_3_2_1_36_1","volume-title":"Enigma","author":"Milka Grzergor","year":"2018","unstructured":"Grzergor Milka . 2018. Anatomy of Account Takeover . In Enigma ( 2018 ). https:\/\/www.usenix.org\/node\/208154 Grzergor Milka. 2018. Anatomy of Account Takeover. In Enigma (2018). https:\/\/www.usenix.org\/node\/208154"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of W2SP(2011-05)","author":"Mowery Keaton","year":"2011","unstructured":"Keaton Mowery , Dillon Bogenreif , Scott Yilek , and Hovav Shacham . 2011 . Fingerprinting Information in JavaScript Implementations . In Proceedings of W2SP(2011-05) , Helen Wang (Ed.), Vol.\u00a02. Keaton Mowery, Dillon Bogenreif, Scott Yilek, and Hovav Shacham. 2011. Fingerprinting Information in JavaScript Implementations. In Proceedings of W2SP(2011-05), Helen Wang (Ed.), Vol.\u00a02."},{"key":"e_1_3_2_1_38_1","unstructured":"Keaton Mowery and Hovav Shacham. 2012. Pixel perfect: Fingerprinting canvas in HTML5. 12\u00a0pages. https:\/\/www.ieee-security.org\/TC\/W2SP\/2012\/papers\/w2sp12-final4.pdf  Keaton Mowery and Hovav Shacham. 2012. Pixel perfect: Fingerprinting canvas in HTML5. 12\u00a0pages. https:\/\/www.ieee-security.org\/TC\/W2SP\/2012\/papers\/w2sp12-final4.pdf"},{"key":"e_1_3_2_1_39_1","volume-title":"Web 2.0 Workshop on Security and Privacy (W2SP)","author":"Mulazzani Martin","year":"2013","unstructured":"Martin Mulazzani , Philipp Reschl , Markus Huber , Manuel Leithner , Sebastian Schrittwieser , Edgar Weippl , and FC Wien . 2013. Fast and Reliable Browser Identification with Javascript Engine Fingerprinting . In Web 2.0 Workshop on Security and Privacy (W2SP) ( 2013 ), Vol .\u00a05. Martin Mulazzani, Philipp Reschl, Markus Huber, Manuel Leithner, Sebastian Schrittwieser, Edgar Weippl, and FC Wien. 2013. Fast and Reliable Browser Identification with Javascript Engine Fingerprinting. In Web 2.0 Workshop on Security and Privacy (W2SP) (2013), Vol.\u00a05."},{"key":"e_1_3_2_1_40_1","unstructured":"Gabi Nakibly Gilad Shelef and Shiran Yudilevich. 2015. Hardware Fingerprinting Using HTML5. (2015). https:\/\/arxiv.org\/abs\/1503.01408  Gabi Nakibly Gilad Shelef and Shiran Yudilevich. 2015. Hardware Fingerprinting Using HTML5. (2015). https:\/\/arxiv.org\/abs\/1503.01408"},{"key":"e_1_3_2_1_41_1","volume-title":"Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. In Network and Distributed System Security Symposium (NDSS) (2019-02)","author":"Papadopoulos Panagiotis","year":"2019","unstructured":"Panagiotis Papadopoulos , Panagiotis Ilia , Michalis Polychronakis , Evangelos\u00a0 P. Markatos , Sotiris Ioannidis , and Giorgos Vasiliadis . 2019 . Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. In Network and Distributed System Security Symposium (NDSS) (2019-02) . https:\/\/doi.org\/10.14722\/ndss.2019.23070 10.14722\/ndss.2019.23070 Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos\u00a0P. Markatos, Sotiris Ioannidis, and Giorgos Vasiliadis. 2019. Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. In Network and Distributed System Security Symposium (NDSS) (2019-02). https:\/\/doi.org\/10.14722\/ndss.2019.23070"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751323.2751327"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695908"},{"key":"e_1_3_2_1_44_1","volume-title":"Trackability and Perspective.","author":"Pugliese Gaston","year":"2020","unstructured":"Gaston Pugliese , Christian Riess , Freya Gassmann , and Zinaida Benenson . 2020. Long-Term Observation on Browser Fingerprinting: Users \u2019 Trackability and Perspective. 2020 , 2 (2020), 558\u2013577. https:\/\/doi.org\/10.2478\/popets-2020-0041 10.2478\/popets-2020-0041 Gaston Pugliese, Christian Riess, Freya Gassmann, and Zinaida Benenson. 2020. Long-Term Observation on Browser Fingerprinting: Users\u2019 Trackability and Perspective. 2020, 2 (2020), 558\u2013577. https:\/\/doi.org\/10.2478\/popets-2020-0041"},{"key":"#cr-split#-e_1_3_2_1_45_1.1","doi-asserted-by":"crossref","unstructured":"Jordan\u00a0S. Queiroz and Eduardo\u00a0L. Feitosa. 2019. A Web Browser Fingerprinting Method Based on the Web Audio API. (2019). https:\/\/doi.org\/10.1093\/comjnl\/bxy146 10.1093\/comjnl","DOI":"10.1093\/comjnl\/bxy146"},{"key":"#cr-split#-e_1_3_2_1_45_1.2","doi-asserted-by":"crossref","unstructured":"Jordan\u00a0S. Queiroz and Eduardo\u00a0L. Feitosa. 2019. A Web Browser Fingerprinting Method Based on the Web Audio API. (2019). https:\/\/doi.org\/10.1093\/comjnl\/bxy146","DOI":"10.1093\/comjnl\/bxy146"},{"key":"e_1_3_2_1_46_1","volume-title":"SWAT: Seamless Web Authentication Technology. In The Web Conference (TheWebConf) (2019-05)","author":"Rochet Florentin","year":"2019","unstructured":"Florentin Rochet , Kyriakos Efthymiadis , Fran\u00e7ois Koeune , and Olivier Pereira . 2019 . SWAT: Seamless Web Authentication Technology. In The Web Conference (TheWebConf) (2019-05) . 1579\u20131589. https:\/\/doi.org\/10.1145\/3308558.3313637 10.1145\/3308558.3313637 Florentin Rochet, Kyriakos Efthymiadis, Fran\u00e7ois Koeune, and Olivier Pereira. 2019. SWAT: Seamless Web Authentication Technology. In The Web Conference (TheWebConf) (2019-05). 1579\u20131589. https:\/\/doi.org\/10.1145\/3308558.3313637"},{"key":"e_1_3_2_1_47_1","unstructured":"Julian F.\u00a0Reschke Roy T.\u00a0Fielding. 2014. RFC 7231 - Hypertext Transfer Protocol (HTTP\/1.1): Semantics and Content. https:\/\/tools.ietf.org\/html\/rfc7231#section-5.5.3 accessed 2020-06-30.  Julian F.\u00a0Reschke Roy T.\u00a0Fielding. 2014. RFC 7231 - Hypertext Transfer Protocol (HTTP\/1.1): Semantics and Content. https:\/\/tools.ietf.org\/html\/rfc7231#section-5.5.3 accessed 2020-06-30."},{"key":"e_1_3_2_1_48_1","volume-title":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) (2016-07)","author":"Saito T.","year":"2016","unstructured":"T. Saito , K. Yasuda , T. Ishikawa , R. Hosoi , K. Takahashi , Y. Chen , and M. Zalasi\u0144ski . 2016. Estimating CPU Features by Browser Fingerprinting . In International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) (2016-07) . 587\u2013592. https:\/\/doi.org\/10.1109\/IMIS. 2016 .108 10.1109\/IMIS.2016.108 T. Saito, K. Yasuda, T. Ishikawa, R. Hosoi, K. Takahashi, Y. Chen, and M. Zalasi\u0144ski. 2016. Estimating CPU Features by Browser Fingerprinting. In International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) (2016-07). 587\u2013592. https:\/\/doi.org\/10.1109\/IMIS.2016.108"},{"key":"e_1_3_2_1_49_1","volume-title":"International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) (2017-11-08)","author":"Saito Takamichi","year":"2017","unstructured":"Takamichi Saito , Koki Yasuda , Kazuhisa Tanabe , and Kazushi Takahashi . 2017 . Web Browser Tampering: Inspecting CPU Features from Side-Channel Information . In International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) (2017-11-08) . 392\u2013403. https:\/\/doi.org\/10.1007\/978-3-319-69811-3_36 10.1007\/978-3-319-69811-3_36 Takamichi Saito, Koki Yasuda, Kazuhisa Tanabe, and Kazushi Takahashi. 2017. Web Browser Tampering: Inspecting CPU Features from Side-Channel Information. In International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) (2017-11-08). 392\u2013403. https:\/\/doi.org\/10.1007\/978-3-319-69811-3_36"},{"key":"e_1_3_2_1_50_1","unstructured":"Rachel Schutt and Cathy O\u2019Neil. 2014. Doing data science: Straight talk from the frontline. O\u2019Reilly. 181\u2013182 pages.  Rachel Schutt and Cathy O\u2019Neil. 2014. Doing data science: Straight talk from the frontline. O\u2019Reilly. 181\u2013182 pages."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029820"},{"key":"e_1_3_2_1_52_1","volume-title":"Risk-Based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics. In Applied Cryptography and Network Security Workshops (ACNS)","author":"Solano Jesus","year":"2019","unstructured":"Jesus Solano , Luis Camacho , Alejandro Correa , Claudio Deiro , Javier Vargas , and Mart\u00edn Ochoa . 2019 . Risk-Based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics. In Applied Cryptography and Network Security Workshops (ACNS) (2019), Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, and Kehuan Zhang (Eds.). 3\u201323. https:\/\/doi.org\/10.1007\/978-3-030-29729-9_1 10.1007\/978-3-030-29729-9_1 Jesus Solano, Luis Camacho, Alejandro Correa, Claudio Deiro, Javier Vargas, and Mart\u00edn Ochoa. 2019. Risk-Based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics. In Applied Cryptography and Network Security Workshops (ACNS) (2019), Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, and Kehuan Zhang (Eds.). 3\u201323. https:\/\/doi.org\/10.1007\/978-3-030-29729-9_1"},{"key":"e_1_3_2_1_53_1","volume-title":"Mobile Device Fingerprinting Considered Harmful for Risk-based Authentication. In European Workshop on System Security (EuroSec)","author":"Spooren Jan","year":"2015","unstructured":"Jan Spooren , Davy Preuveneers , and Wouter Joosen . 2015 . Mobile Device Fingerprinting Considered Harmful for Risk-based Authentication. In European Workshop on System Security (EuroSec) (2015). 6:1\u20136:6. https:\/\/doi.org\/10.1145\/2751323.2751329 10.1145\/2751323.2751329 Jan Spooren, Davy Preuveneers, and Wouter Joosen. 2015. Mobile Device Fingerprinting Considered Harmful for Risk-based Authentication. In European Workshop on System Security (EuroSec) (2015). 6:1\u20136:6. https:\/\/doi.org\/10.1145\/2751323.2751329"},{"key":"#cr-split#-e_1_3_2_1_54_1.1","doi-asserted-by":"crossref","unstructured":"Jan Spooren Davy Preuveneers and Wouter Joosen. 2017. Leveraging Battery Usage from Mobile Devices for Active Authentication. (2017). https:\/\/doi.org\/10.1155\/2017\/1367064 10.1155\/2017","DOI":"10.1155\/2017\/1367064"},{"key":"#cr-split#-e_1_3_2_1_54_1.2","doi-asserted-by":"crossref","unstructured":"Jan Spooren Davy Preuveneers and Wouter Joosen. 2017. Leveraging Battery Usage from Mobile Devices for Active Authentication. (2017). https:\/\/doi.org\/10.1155\/2017\/1367064","DOI":"10.1155\/2017\/1367064"},{"key":"e_1_3_2_1_55_1","volume-title":"XHOUND: Quantifying the Fingerprintability of Browser Extensions. In IEEE Symposium on Security & Privacy (S&P) (2017-05-24)","author":"Starov Oleksii","year":"2017","unstructured":"Oleksii Starov and Nick Nikiforakis . 2017 . XHOUND: Quantifying the Fingerprintability of Browser Extensions. In IEEE Symposium on Security & Privacy (S&P) (2017-05-24) . 941\u2013956. https:\/\/doi.org\/10.1109\/SP.2017.18 10.1109\/SP.2017.18 Oleksii Starov and Nick Nikiforakis. 2017. XHOUND: Quantifying the Fingerprintability of Browser Extensions. In IEEE Symposium on Security & Privacy (S&P) (2017-05-24). 941\u2013956. https:\/\/doi.org\/10.1109\/SP.2017.18"},{"key":"e_1_3_2_1_56_1","volume-title":"Advances on Broadband and Wireless Computing, Communication and Applications (BWCCA)","author":"Tanabe Kazuhisa","year":"2018","unstructured":"Kazuhisa Tanabe , Ryohei Hosoya , and Takamichi Saito . 2018. Combining Features in Browser Fingerprinting . In Advances on Broadband and Wireless Computing, Communication and Applications (BWCCA) ( 2018 ), Leonard Barolli, Fang- Yie Leu , Tomoya Enokido, and Hsing-Chung Chen (Eds .). 671\u2013681. https:\/\/doi.org\/10.1007\/978-3-030-02613-4_60 10.1007\/978-3-030-02613-4_60 Kazuhisa Tanabe, Ryohei Hosoya, and Takamichi Saito. 2018. Combining Features in Browser Fingerprinting. In Advances on Broadband and Wireless Computing, Communication and Applications (BWCCA) (2018), Leonard Barolli, Fang-Yie Leu, Tomoya Enokido, and Hsing-Chung Chen (Eds.). 671\u2013681. https:\/\/doi.org\/10.1007\/978-3-030-02613-4_60"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134067"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.33"},{"key":"e_1_3_2_1_59_1","first-page":"2018.00008","volume-title":"FP-STALKER: Tracking Browser Fingerprint Evolutions. In IEEE Symposium on Security and Privacy (S&P) (2018-05-21)","author":"Vastel Antoine","year":"2018","unstructured":"Antoine Vastel , Pierre Laperdrix , Walter Rudametkin , and Romain Rouvoy . 2018 . FP-STALKER: Tracking Browser Fingerprint Evolutions. In IEEE Symposium on Security and Privacy (S&P) (2018-05-21) . 728\u2013741. https:\/\/doi.org\/10.1109\/sp. 2018.00008 10.1109\/sp.2018.00008 Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. 2018. FP-STALKER: Tracking Browser Fingerprint Evolutions. In IEEE Symposium on Security and Privacy (S&P) (2018-05-21). 728\u2013741. https:\/\/doi.org\/10.1109\/sp.2018.00008"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978339"},{"key":"e_1_3_2_1_61_1","volume-title":"Password Cracking Using Probabilistic Context-Free Grammars. In IEEE Symposium on Security and Privacy (S&P) (2009-05)","author":"Weir Matt","year":"2009","unstructured":"Matt Weir , Sudhir Aggarwal , Breno\u00a0de Medeiros , and Bill Glodek . 2009 . Password Cracking Using Probabilistic Context-Free Grammars. In IEEE Symposium on Security and Privacy (S&P) (2009-05) . 391\u2013405. https:\/\/doi.org\/10.1109\/SP.2009.8 10.1109\/SP.2009.8 Matt Weir, Sudhir Aggarwal, Breno\u00a0de Medeiros, and Bill Glodek. 2009. Password Cracking Using Probabilistic Context-Free Grammars. In IEEE Symposium on Security and Privacy (S&P) (2009-05). 391\u2013405. https:\/\/doi.org\/10.1109\/SP.2009.8"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2626395"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427297","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":67,"alternative-id":["10.1145\/3427228.3427297","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427297","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}