{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T21:47:38Z","timestamp":1764020858622,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1145\/3696410.3714713","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:52:18Z","timestamp":1745362338000},"page":"4336-4345","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Breaking the Shield: Analyzing and Attacking Canvas Fingerprinting Defenses in the Wild"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5756-3103","authenticated-orcid":false,"given":"Hoang Dai","family":"Nguyen","sequence":"first","affiliation":[{"name":"Louisiana State University, Baton Rouge, Louisiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5286-2011","authenticated-orcid":false,"given":"Phani","family":"Vadrevu","sequence":"additional","affiliation":[{"name":"Louisiana State University, Baton Rouge, Louisiana, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_2_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Acharya Bhupendra","year":"2021","unstructured":"Bhupendra Acharya and Phani Vadrevu. 2021. {PhishPrint}: Evading phishing detection crawlers by prior profiling. In 30th USENIX Security Symposium (USENIX Security 21). 3775--3792."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031-09484--2_9nolinkurl10.1007"},{"volume-title":"Google Chrome Users Statistics","year":"2023","key":"e_1_3_2_1_4_1","unstructured":"Backlinko. 2023. Google Chrome Users Statistics 2023. https:\/\/backlinko.com\/chrome-users Accessed: 2025-01--24."},{"key":"e_1_3_2_1_5_1","volume-title":"Fp-radar: Longitudinal measurement and early detection of browser fingerprinting. arXiv preprint arXiv:2112.01662","author":"Bahrami Pouneh Nikkhah","year":"2021","unstructured":"Pouneh Nikkhah Bahrami, Umar Iqbal, and Zubair Shafiq. 2021. Fp-radar: Longitudinal measurement and early detection of browser fingerprinting. arXiv preprint arXiv:2112.01662 (2021)."},{"key":"e_1_3_2_1_6_1","unstructured":"Brave Software. 2024. Privacy Updates. https:\/\/brave.com\/privacy-updates\/"},{"volume-title":"Chrome Extension Statistics","year":"2023","key":"e_1_3_2_1_7_1","unstructured":"DebugBear. 2023. Chrome Extension Statistics 2023. https:\/\/www.debugbear.com\/blog\/chrome-extension-statistics Accessed: 2025-01--24."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_9_1","unstructured":"Firefox. 2020. Firefox 72 blocks third-party fingerprinting resources. https:\/\/blog.mozilla.org\/security\/2020\/01\/07\/firefox-72-fingerprinting\/ Accessed: 2024--10-09."},{"key":"e_1_3_2_1_10_1","unstructured":"Mozilla Foundation. 2024. Enhanced Tracking Protection in Firefox for desktop. https:\/\/support.mozilla.org\/en-US\/kb\/enhanced-tracking-protection-firefox-desktop. Accessed: 2024--10-02."},{"key":"e_1_3_2_1_11_1","unstructured":"Khronos Group. 2018. WebGL-OpenGL ES for the Web. https:\/\/www.khronos.org\/webgl\/. Accessed: 2024-09--30."},{"key":"e_1_3_2_1_12_1","volume-title":"Customize Opera: Extensions. https:\/\/help.opera.com\/en\/latest\/customization\/#extensions Accessed: 2025-01--24.","author":"Help Opera","year":"2025","unstructured":"Opera Help. 2025. Customize Opera: Extensions. https:\/\/help.opera.com\/en\/latest\/customization\/#extensions Accessed: 2025-01--24."},{"key":"e_1_3_2_1_13_1","volume-title":"Safari White Paper","author":"Apple Inc. 2019.","year":"2019","unstructured":"Apple Inc. 2019. Safari White Paper November 2019. https:\/\/www.apple.com\/safari\/docs\/Safari_White_Paper_Nov2019.pdf. Accessed: 2024--10-02."},{"key":"e_1_3_2_1_14_1","unstructured":"Brave Software Inc. 2020a. Fingerprinting defenses 2.0. https:\/\/brave.com\/privacy-updates\/4-fingerprinting-defenses-2.0\/. Accessed: 2024--10-02."},{"key":"e_1_3_2_1_15_1","unstructured":"Brave Software Inc. 2020b. Fingerprinting Protections in Brave - Issue 11067. https:\/\/github.com\/brave\/brave-browser\/issues\/11067. Accessed: 2024--10-02."},{"key":"e_1_3_2_1_16_1","unstructured":"Brave Software Inc. 2024. Sunsetting Strict Fingerprinting Mode. https:\/\/brave.com\/privacy-updates\/28-sunsetting-strict-fingerprinting-mode\/. Accessed: 2024--10-02."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00017"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386040"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of W2SP","volume":"2012","author":"Mowery Keaton","year":"2012","unstructured":"Keaton Mowery and Hovav Shacham. 2012. Pixel perfect: Fingerprinting canvas in HTML5. Proceedings of W2SP, Vol. 2012 (2012)."},{"key":"e_1_3_2_1_22_1","unstructured":"Mozilla. 2024. HTMLCanvasElement. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/HTMLCanvasElement."},{"key":"e_1_3_2_1_23_1","unstructured":"Mozilla Support. 2024. Firefox's Protection Against Fingerprinting. https:\/\/support.mozilla.org\/en-US\/kb\/firefox-protection-against-fingerprinting"},{"key":"e_1_3_2_1_24_1","unstructured":"Tor Project. 2024. Anti-Fingerprinting Features. https:\/\/tb-manual.torproject.org\/anti-fingerprinting. Accessed: 2024--10-02."},{"key":"e_1_3_2_1_25_1","unstructured":"PublicWWW. [n. d.]. PublicWWW. https:\/\/publicwww.com. Accessed: 2024--10-09."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0056"},{"key":"e_1_3_2_1_27_1","volume-title":"Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages. In 32nd USENIX Security Symposium, USENIX Security 2023","author":"S\u00e1nchez-Rola Iskander","year":"2023","unstructured":"Iskander S\u00e1nchez-Rola, Leyla Bilge, Davide Balzarotti, Armin Buescher, and Petros Efstathopoulos. 2023. Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages. In 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9--11, 2023. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/sanchez-rola"},{"key":"e_1_3_2_1_28_1","unstructured":"Microsoft Support. 2025. Add Turn Off or Remove Extensions in Microsoft Edge. https:\/\/support.microsoft.com\/en-us\/microsoft-edge\/add-turn-off-or-remove-extensions-in-microsoft-edge-9c0ec68c-2fbc-2f2c-9ff0-bdc76f46b026 Accessed: 2025-01--24."},{"key":"e_1_3_2_1_29_1","unstructured":"FingerprintJS Team. 2024. FingerprintJS: Browser Fingerprinting Library. https:\/\/github.com\/fingerprintjs\/fingerprintjs. Accessed: 2024--10-01."},{"key":"e_1_3_2_1_30_1","volume-title":"HTML Canvas 2D Context. https:\/\/www.w3.org\/TR\/2dcontext\/. W3C Recommendation","author":"C.","year":"2015","unstructured":"W3C. 2015. HTML Canvas 2D Context. https:\/\/www.w3.org\/TR\/2dcontext\/. W3C Recommendation 19 November 2015."}],"event":{"name":"WWW '25: The ACM Web Conference 2025","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Sydney NSW Australia","acronym":"WWW '25"},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714713","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714713","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:57Z","timestamp":1750295937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714713"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":30,"alternative-id":["10.1145\/3696410.3714713","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714713","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}