{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:58Z","timestamp":1750309558762,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Agence Nationale de la Recherche","award":["ANR-21-CE39-0019 FACADES, ProjetIA-22-PECY-0002 iPoP"],"award-info":[{"award-number":["ANR-21-CE39-0019 FACADES, ProjetIA-22-PECY-0002 iPoP"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1145\/3696410.3714699","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:57:28Z","timestamp":1745362648000},"page":"4325-4335","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["FP-Rainbow: Fingerprint-Based Browser Configuration Identification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-8582-0017","authenticated-orcid":false,"given":"Maxime","family":"Huyghe","sequence":"first","affiliation":[{"name":"Univ. Lille, CNRS, Inria, UMR 9189 CRIStAL, Lille, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2903-7600","authenticated-orcid":false,"given":"Walter","family":"Rudametkin","sequence":"additional","affiliation":[{"name":"Univ. Rennes, CNRS, Inria, IRISA, IUF, Rennes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3203-6107","authenticated-orcid":false,"given":"Cl\u00e9ment","family":"Quinton","sequence":"additional","affiliation":[{"name":"Univ. Lille, CNRS, Inria, UMR 9189 CRIStAL, Lille, France"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_2_1","volume-title":"Learning the Linux Kernel Configuration Space: Results and Challenges. In ELC Europe 2019 - Embedded Linux Conference Europe 2019","author":"Acher Mathieu","year":"2019","unstructured":"Mathieu Acher. 2019. Learning the Linux Kernel Configuration Space: Results and Challenges. In ELC Europe 2019 - Embedded Linux Conference Europe 2019 (Lyon, France, 2019--10). 1--49. https:\/\/hal.inria.fr\/hal-02342130"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1017\/9781316831960.010"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--52683--2_8"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994621"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447545.3451177"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23152"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--47854--7_7"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.102.3.349"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Edouard Gu\u00e9gain Amir Taherkordi and Cl\u00e9ment Quinton. 2023. Configuration Optimization with\u00a0Limited Functional Impact. In Advanced Information Systems Engineering Marta Indulska Iris Reinhartz-Berger Carlos Cetina and Oscar Pastor (Eds.). Springer Nature Switzerland Cham 53--68.","DOI":"10.1007\/978-3-031-34560-9_4"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693089"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3646548.3672591"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2008.04480"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00112"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24093"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--22038--93"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2015.18"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-022-01052-x"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of W2SP","author":"Mowery Keaton","year":"2012","unstructured":"Keaton Mowery and Hovav Shacham. 2012. Pixel perfect: Fingerprinting canvas in HTML5. Proceedings of W2SP (2012)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741090"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_24_1","unstructured":"Muath A. Obidat. 2021. Canvas Deceiver-A New Defense Mechanism Against Canvas Fingerprinting. https:\/\/www.semanticscholar.org\/paper\/Canvas-Deceiver-A-New-Defense-Mechanism-Against-Obidat\/38ceac51acaeec926a839640350bd4ee06adfe92"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111044"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417866"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2016.108"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2022.07.043"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23155"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.18"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031--17143--7_5"},{"key":"e_1_3_2_1_32_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Trickel Erik","year":"2019","unstructured":"Erik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, and Adam Doup\u00e9. 2019. Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting. In 28th USENIX Security Symposium (USENIX Security 19) (2019). 1679--1696. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/trickel"},{"key":"e_1_3_2_1_33_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Vastel Antoine","year":"2018","unstructured":"Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. 2018a. {Fp-Scanner}: The privacy implications of browser fingerprint inconsistencies. In 27th USENIX Security Symposium (USENIX Security 18). 135--150."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00008"},{"key":"e_1_3_2_1_35_1","volume-title":"FP-TESTER: Automated Testing of Browser Fingerprint Resilience. In IWPE 2018 - 4th International Workshop on Privacy Engineering","author":"Vastel Antoine","year":"2018","unstructured":"Antoine Vastel, Walter Rudametkin, and Romain Rouvoy. 2018c. FP-TESTER: Automated Testing of Browser Fingerprint Resilience. In IWPE 2018 - 4th International Workshop on Privacy Engineering (London, United Kingdom, 2018-04). 1--5. https:\/\/hal.inria.fr\/hal-01717158"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Sydney NSW Australia","acronym":"WWW '25"},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714699","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:57Z","timestamp":1750295937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714699"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":35,"alternative-id":["10.1145\/3696410.3714699","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714699","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}