{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:05Z","timestamp":1755882605693,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1145\/3646548.3672591","type":"proceedings-article","created":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T12:19:07Z","timestamp":1723205947000},"page":"66-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Taming the Variability of Browser Fingerprints"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-8582-0017","authenticated-orcid":false,"given":"Maxime","family":"Huyghe","sequence":"first","affiliation":[{"name":"CRIStAL, University of Lille, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3203-6107","authenticated-orcid":false,"given":"Cl\u00e9ment","family":"Quinton","sequence":"additional","affiliation":[{"name":"CRIStAL, University of Lille, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2903-7600","authenticated-orcid":false,"given":"Walter","family":"Rudametkin","sequence":"additional","affiliation":[{"name":"IRISA, University of Rennes, France"}]}],"member":"320","published-online":{"date-parts":[[2024,9,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110147.2110153"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31095-9_41"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994621"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29615-4_4"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336294.3336298"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561435"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPLC.2007.19"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_7"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186097"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24093"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386040"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33119-0_13"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65310-1_20"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of W2SP (2012","author":"Mowery Keaton","year":"2012","unstructured":"Keaton Mowery and Hovav Shacham. 2012. Pixel perfect: Fingerprinting canvas in HTML5. Proceedings of W2SP (2012). https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&type=pdf&doi=3208feae829cba6bd319421fe1fea58962da8fd9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338974"},{"key":"e_1_3_2_1_19_1","unstructured":"Muath\u00a0A. Obidat. 2021. Canvas Deceiver-A New Defense Mechanism Against Canvas Fingerprinting. https:\/\/www.iiisci.org\/journal\/pdv\/sci\/pdfs\/SA899XU20.pdf"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417866"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2019136.2019141"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2016.108"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23155"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985856"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.01.012"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2988369"},{"key":"e_1_3_2_1_27_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Solomos Konstantinos","year":"2022","unstructured":"Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, and Jason Polakis. 2022. The dangers of human touch: fingerprinting browser extensions through user actions. In 31st USENIX Security Symposium (USENIX Security 22). 717\u2013733. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/solomos"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.18"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635915"},{"key":"e_1_3_2_1_30_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Vastel Antoine","year":"2018","unstructured":"Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. 2018. { Fp-Scanner} : The Privacy Implications of Browser Fingerprint Inconsistencies. In 27th USENIX Security Symposium (USENIX Security 18). 135\u2013150."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00008"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00020"},{"key":"e_1_3_2_1_33_1","volume-title":"Software Product Lines Conference. https:\/\/dl.acm.org\/doi\/10","author":"Weston Nathan","year":"2009","unstructured":"Nathan Weston, Ruzanna Chitchyan, and Awais Rashid. 2009. A framework for constructing semantically composable feature models from natural language requirements. In Software Product Lines Conference. https:\/\/dl.acm.org\/doi\/10.5555\/1753235.1753265"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-022-00348-8"},{"key":"e_1_3_2_1_35_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Zimmeck Sebastian","year":"2017","unstructured":"Sebastian Zimmeck, Jie\u00a0S Li, Hyungtae Kim, Steven\u00a0M Bellovin, and Tony Jebara. 2017. A privacy analysis of cross-device tracking. In 26th USENIX Security Symposium (USENIX Security 17). 1391\u20131408. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/zimmeck"}],"event":{"name":"SPLC '24: 28th ACM International Systems and Software Product Line Conference","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Dommeldange Luxembourg","acronym":"SPLC '24"},"container-title":["28th ACM International Systems and Software Product Line Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646548.3672591","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3646548.3672591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:55:00Z","timestamp":1755881700000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646548.3672591"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":35,"alternative-id":["10.1145\/3646548.3672591","10.1145\/3646548"],"URL":"https:\/\/doi.org\/10.1145\/3646548.3672591","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]},"assertion":[{"value":"2024-09-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}