{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:16:41Z","timestamp":1763968601674,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T00:00:00Z","timestamp":1762214400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Department of Navy","award":["N00014-24-1-2193"],"award-info":[{"award-number":["N00014-24-1-2193"]}]},{"name":"Department of Defense"},{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2127232, CNS-2346845, and CNS-2419829"],"award-info":[{"award-number":["CNS-2127232, CNS-2346845, and CNS-2419829"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,4]]},"DOI":"10.1145\/3646547.3688455","type":"proceedings-article","created":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T09:40:26Z","timestamp":1730454026000},"page":"681-703","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["<scp>Browser Polygraph:<\/scp>\n            Efficient Deployment of Coarse-Grained Browser Fingerprints for Web-Scale Detection of Fraud Browsers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9581-6269","authenticated-orcid":false,"given":"Faezeh","family":"Kalantari","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0236-1079","authenticated-orcid":false,"given":"Mehrnoosh","family":"Zaeifi","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2960-2828","authenticated-orcid":false,"given":"Yeganeh","family":"Safaei","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8561-052X","authenticated-orcid":false,"given":"Marzieh","family":"Bitaab","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4313-3714","authenticated-orcid":false,"given":"Adam","family":"Oest","sequence":"additional","affiliation":[{"name":"Amazon, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6162-578X","authenticated-orcid":false,"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8832-1789","authenticated-orcid":false,"given":"Yan","family":"Shoshitaishvili","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2634-3901","authenticated-orcid":false,"given":"Adam","family":"Doup\u00e9","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_3_1","unstructured":"Gemini Advisory. 2023. Illicit Antidetect Platforms vs. Anti-Fraud Solutions. https:\/\/geminiadvisory.io\/antidetect-platforms-vs-anti-fraud-solutions."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91356-4_9"},{"key":"e_1_3_2_1_5_1","unstructured":"Akhavani Seyed Ali. 2024. bowserprint github. https:\/\/github.com\/sa-akhavani\/browserprint."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427297"},{"key":"e_1_3_2_1_7_1","volume-title":"Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers. In DIMVA 2020--17th Conference on Detection of Intrusions and Malware & Vulnerability Assessment.","author":"Azad Babak Amin","year":"2020","unstructured":"Babak Amin Azad, Oleksii Starov, Pierre Laperdrix, and Nick Nikiforakis. 2020. Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers. In DIMVA 2020--17th Conference on Detection of Intrusions and Malware & Vulnerability Assessment."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29615-4_4"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994459.2994467"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417892"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23152"},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/developers.cloudflare.com\/waf\/tools\/privacy-pass\/ Accessed","author":"Pass Privacy","year":"2024","unstructured":"Cloudflare. 2024. Privacy Pass. https:\/\/developers.cloudflare.com\/waf\/tools\/privacy-pass\/ Accessed: August 19, 2024."},{"key":"e_1_3_2_1_13_1","volume-title":"DIMVA 2021, Virtual Event, July 14--16, 2021, Proceedings 18","author":"Durey Antonin","year":"2021","unstructured":"Antonin Durey, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. 2021. FP-Redemption: Studying browser fingerprinting adoption for the sake of web security. In Detection of Intrusions and Malware, and Vulnerability Assessment: 18th International Conference, DIMVA 2021, Virtual Event, July 14--16, 2021, Proceedings 18. Springer, 237--257."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_16_1","unstructured":"FBI. 2023. 2022 Internet Crime Report. https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2022_IC3Report.pdf."},{"key":"e_1_3_2_1_17_1","first-page":"21","article-title":"Who Are You? A Statistical Approach to Measuring User Authenticity","volume":"16","author":"Freeman David","year":"2016","unstructured":"David Freeman, Sakshi Jain, Markus D\u00fcrmuth, Battista Biggio, and Giorgio Giacinto. 2016. Who Are You? A Statistical Approach to Measuring User Authenticity.. In NDSS, Vol. 16. 21--24.","journal-title":"NDSS"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186097"},{"key":"e_1_3_2_1_19_1","volume-title":"https:\/\/privacysandbox.com Accessed","author":"Sandbox Privacy","year":"2024","unstructured":"Google. 2024. Privacy Sandbox. https:\/\/privacysandbox.com Accessed: August 19, 2024."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 2nd Workshop on Multidisciplinary and Applications (WMA)","author":"Humaira Hestry","year":"2020","unstructured":"Hestry Humaira and Rasyidah Rasyidah. 2020. Determining The Appropriate Cluster Number Using Elbow Method for K-Means Algorithm. In Proceedings of the 2nd Workshop on Multidisciplinary and Applications (WMA) 2018."},{"volume-title":"Principal component analysis for special types of data","author":"Jolliffe Ian T","key":"e_1_3_2_1_21_1","unstructured":"Ian T Jolliffe. 2002. Principal component analysis for special types of data. Springer."},{"key":"e_1_3_2_1_22_1","unstructured":"Kaggle. 2024. Credit Card Fraud Detection. https:\/\/www.kaggle.com\/datasets\/mlg-ulb\/creditcardfraud."},{"key":"e_1_3_2_1_23_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Karami Soroush","year":"2022","unstructured":"Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doup\u00e9, and Jason Polakis. 2022. Unleash the simulacrum: shifting browser realities for robust \"Extension-Fingerprinting\" prevention. In 31st USENIX Security Symposium (USENIX Security 22). 735--752."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342220.3343651"},{"key":"e_1_3_2_1_25_1","volume-title":"DIMVA 2019, Gothenburg, Sweden, June 19--20, 2019, Proceedings 16","author":"Laperdrix Pierre","year":"2019","unstructured":"Pierre Laperdrix, Gildas Avoine, Benoit Baudry, and Nick Nikiforakis. 2019. Morellian analysis for browsers: Making web authentication stronger with canvas fingerprinting. In Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19--20, 2019, Proceedings 16. Springer, 43--66."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386040"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_28_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Laperdrix Pierre","year":"2021","unstructured":"Pierre Laperdrix, Oleksii Starov, Quan Chen, Alexandros Kapravelos, and Nick Nikiforakis. 2021. Fingerprinting in style: Detecting browser extensions via injected style sheets. In 30th USENIX Security Symposium (USENIX Security 21). 2507--2524."},{"key":"e_1_3_2_1_29_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Lin Xu","year":"2022","unstructured":"Xu Lin, Panagiotis Ilia, Saumya Solanki, and Jason Polakis. 2022. Phish in sheep's clothing: Exploring the authentication pitfalls of browser fingerprinting. In 31st USENIX Security Symposium (USENIX Security 22). 1651--1668."},{"key":"e_1_3_2_1_30_1","volume-title":"Kai Ming Ting, and Zhi-Hua Zhou","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In 2008 eighth ieee international conference on data mining. IEEE, 413--422."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09234-3_8"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1201\/9780429296284"},{"key":"e_1_3_2_1_33_1","unstructured":"MDN. 2022. MDN Web API. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API."},{"key":"e_1_3_2_1_34_1","volume-title":"Enigma 2018 (Enigma","author":"Milka Grzergor","year":"2018","unstructured":"Grzergor Milka. 2018. Anatomy of account takeover. In Enigma 2018 (Enigma 2018)."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of W2SP","volume":"2012","author":"Mowery Keaton","year":"2012","unstructured":"Keaton Mowery and Hovav Shacham. 2012. Pixel perfect: Fingerprinting canvas in HTML5. Proceedings of W2SP, Vol. 2012 (2012)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_37_1","unstructured":"U.S. Department of Health and Human Services. 2024. Human Subject Regulations Decision Charts: 2018 Requirements. https:\/\/www.hhs.gov\/ohrp\/regulations-and-policy\/decision-charts-2018\/index.html."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987475"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65411-5_6"},{"key":"e_1_3_2_1_40_1","unstructured":"Radware. 2024. Detecting and Mitigating Highly Distributed Sophisticated Bot Attacks. https:\/\/www.radware.com\/blog\/application-protection\/2023\/11\/detecting-and-mitigating-highly-distributed-sophisticated-bot-attacks."},{"key":"e_1_3_2_1_41_1","unstructured":"Rohan Goswami. 2023. Cybercrime marketplace Genesis Market shut by FBI international law enforcement. https:\/\/www.cnbc.com\/2023\/04\/04\/genesis-market-shut-by-law-enforcement-in-cybercrime-operation.html."},{"key":"e_1_3_2_1_42_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Sanchez-Rola Iskander","year":"2023","unstructured":"Iskander Sanchez-Rola, Leyla Bilge, Davide Balzarotti, Armin Buescher, and Petros Efstathopoulos. 2023. Rods with laser beams: understanding browser fingerprinting on phishing pages. In 32nd USENIX Security Symposium (USENIX Security 23). 4157--4173."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243796"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Michael Schwarz Florian Lackner and Daniel Gruss. 2019. JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits.. In NDSS.","DOI":"10.14722\/ndss.2019.23155"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645493"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029820"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2015.105"},{"key":"e_1_3_2_1_48_1","unstructured":"AdsPower Team. 2024. AdsPower. https:\/\/www.adspower.com."},{"key":"e_1_3_2_1_49_1","unstructured":"AmIUnique Team. 2024. AmIUnique. https:\/\/amiunique.org."},{"key":"e_1_3_2_1_50_1","unstructured":"AntBrowser Team. 2024. AntBrowser. https:\/\/antbrowser.pro."},{"key":"e_1_3_2_1_51_1","unstructured":"CheBrowser Team. 2024 d. CheBrowser. https:\/\/chebrowser.site."},{"key":"e_1_3_2_1_52_1","unstructured":"ClientJS Team. 2024 e. ClientJS. http:\/\/clientjs.org."},{"key":"e_1_3_2_1_53_1","unstructured":"ClonBrowser Team. 2024 f. ClonBrowser. https:\/\/www.clonbrowser.com."},{"key":"e_1_3_2_1_54_1","unstructured":"FingerprintJS Team. 2024 g. FingerprintJS. https:\/\/github.com\/fingerprintjs\/fingerprintjs."},{"key":"e_1_3_2_1_55_1","unstructured":"GoLogin Team. 2024 h. GoLogin. https:\/\/gologin.com."},{"key":"e_1_3_2_1_56_1","unstructured":"Incogniton Team. 2024 i. incogniton. https:\/\/incogniton.com."},{"key":"e_1_3_2_1_57_1","unstructured":"OctoBrowser Team. 2024 j. Octo Browser. https:\/\/octobrowser.net."},{"key":"e_1_3_2_1_58_1","unstructured":"Sphere Team. 2024 k. Sphere -- A Browser for Anonymity. https:\/\/www.geeksforgeeks.org\/sphere-a-browser-for-anonymity\/y."},{"key":"e_1_3_2_1_59_1","unstructured":"VMLogin Team. 2024 l. VMLogin. https:\/\/www.vmlogin.us."},{"key":"e_1_3_2_1_60_1","unstructured":"Wappalyzer Team. 2024 m. Browser fingerprinting market share. https:\/\/www.wappalyzer.com\/technologies\/browser-fingerprinting."},{"key":"e_1_3_2_1_61_1","unstructured":"Tenebris. 2024. Linken Sphere. https:\/\/ls.tenebris.cc."},{"key":"e_1_3_2_1_62_1","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security (CCS).","author":"Thomas Kurt","year":"2017","unstructured":"Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, et al. 2017. Data breaches, phishing, or malware? Understanding the risks of stolen credentials. In Proceedings of the ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_63_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Trickel Erik","year":"2019","unstructured":"Erik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, and Adam Doup\u00e9. 2019. Everyone is different: Client-side diversification for defending against extension fingerprinting. In 28th USENIX Security Symposium (USENIX Security 19). 1679--1696."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOTEH.2019.8717766"},{"key":"e_1_3_2_1_65_1","volume-title":"Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Vastel Antoine","year":"2018","unstructured":"Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. 2018. Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies. In 27th USENIX Security Symposium (USENIX Security 18). 135--150."},{"key":"e_1_3_2_1_66_1","unstructured":"Ben Wiser. 2023. Web Environment Integrity. https:\/\/rupertbenwiser.github.io\/Web-Environment-Integrity."},{"key":"e_1_3_2_1_67_1","unstructured":"Shujiang Wu Pengfei Sun Yao Zhao and Yinzhi Cao. 2023. Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites.. In NDSS."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626232.3653266"}],"event":{"name":"IMC '24: ACM Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Madrid Spain","acronym":"IMC '24"},"container-title":["Proceedings of the 2024 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646547.3688455","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3646547.3688455","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3646547.3688455","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3646547.3688455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:52:21Z","timestamp":1755863541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646547.3688455"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,4]]},"references-count":68,"alternative-id":["10.1145\/3646547.3688455","10.1145\/3646547"],"URL":"https:\/\/doi.org\/10.1145\/3646547.3688455","relation":{},"subject":[],"published":{"date-parts":[[2024,11,4]]},"assertion":[{"value":"2024-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}