{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:32:06Z","timestamp":1766442726774,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765158","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:42:02Z","timestamp":1763854922000},"page":"3723-3736","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Byte by Byte: Unmasking Browser Fingerprinting at the Function Level using V8 Bytecode Transformers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1514-2920","authenticated-orcid":false,"given":"Pouneh Nikkhah","family":"Bahrami","sequence":"first","affiliation":[{"name":"University of California, Davis, Davis, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3928-8640","authenticated-orcid":false,"given":"Dylan","family":"Cutler","sequence":"additional","affiliation":[{"name":"Google, Cambridge, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9301-3091","authenticated-orcid":false,"given":"Igor","family":"Bilogrevic","sequence":"additional","affiliation":[{"name":"Google, Zurich, Swaziland"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mart\u00edn Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro Greg S Corrado Andy Davis Jeffrey Dean Matthieu Devin et al. 2015. TensorFlow: Large-scale machine learning on heterogeneous systems."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670329"},{"key":"e_1_3_2_1_3_1","volume-title":"Fp-radar: Longitudinal measurement and early detection of browser fingerprinting. arXiv preprint arXiv:2112.01662","author":"Bahrami Pouneh Nikkhah","year":"2021","unstructured":"Pouneh Nikkhah Bahrami, Umar Iqbal, and Zubair Shafiq. 2021. Fp-radar: Longitudinal measurement and early detection of browser fingerprinting. arXiv preprint arXiv:2112.01662 (2021)."},{"key":"e_1_3_2_1_4_1","unstructured":"bravemitigations 2018. Fingerprinting Protection Mode. https:\/\/github.com\/brave\/browser-laptop\/wiki\/Fingerprinting-Protection-Mode."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994459.2994467"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 11th ACM SIGPLAN International Workshop on Virtual Machines and Intermediate Languages. 22--31","author":"Arteaga Javier Cabrera","year":"2019","unstructured":"Javier Cabrera Arteaga, Martin Monperrus, and Benoit Baudry. 2019. Scalable comparison of JavaScript V8 bytecode traces. In Proceedings of the 11th ACM SIGPLAN International Workshop on Virtual Machines and Intermediate Languages. 22--31."},{"key":"e_1_3_2_1_7_1","volume-title":"Apple Declares War on Browser Fingerprinting, the Sneaky Tactic That Tracks You in Incognito Mode. https:\/\/gizmodo.com\/appledeclareswar- on-browser-fingerprinting-the-sneak-1826549108. Accessed","author":"Cameron Dell","year":"2025","unstructured":"Dell Cameron. 2018. Apple Declares War on Browser Fingerprinting, the Sneaky Tactic That Tracks You in Incognito Mode. https:\/\/gizmodo.com\/appledeclareswar- on-browser-fingerprinting-the-sneak-1826549108. Accessed: 2025."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23152"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3072874"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243860"},{"key":"e_1_3_2_1_11_1","volume-title":"The effectiveness of privacy enhancing technologies against fingerprinting. arXiv preprint arXiv:1812.03920","author":"Datta Amit","year":"2018","unstructured":"Amit Datta, Jianan Lu, and Michael Carl Tschantz. 2018. The effectiveness of privacy enhancing technologies against fingerprinting. arXiv preprint arXiv:1812.03920 (2018)."},{"key":"e_1_3_2_1_12_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0053"},{"key":"e_1_3_2_1_14_1","volume-title":"Disconnect tracking protection lists. https:\/\/disconnect.me\/ trackerprotection. Accessed","author":"Disconnect","year":"2025","unstructured":"Disconnect 2024. Disconnect tracking protection lists. https:\/\/disconnect.me\/ trackerprotection. Accessed: 2025."},{"key":"e_1_3_2_1_15_1","volume-title":"DIMVA 2021, Virtual Event, July 14--16, 2021, Proceedings 18","author":"Durey Antonin","year":"2021","unstructured":"Antonin Durey, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. 2021. FP-Redemption: Studying browser fingerprinting adoption for the sake of web security. In Detection of Intrusions and Malware, and Vulnerability Assessment: 18th International Conference, DIMVA 2021, Virtual Event, July 14--16, 2021, Proceedings 18. Springer, 237--257."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881152"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"volume-title":"Syntactic Analysis (Parsing). https:\/\/docs.esprima.org\/ en\/latest\/syntactic-analysis.html. Accessed","year":"2025","key":"e_1_3_2_1_18_1","unstructured":"esprima_parsing [n.d.]. Syntactic Analysis (Parsing). https:\/\/docs.esprima.org\/ en\/latest\/syntactic-analysis.html. Accessed: 2025."},{"key":"e_1_3_2_1_19_1","volume-title":"Fingerprintability of webrtc. arXiv preprint arXiv:1605.08805","author":"Fifield David","year":"2016","unstructured":"David Fifield and Mia Gil Epner. 2016. Fingerprintability of webrtc. arXiv preprint arXiv:1605.08805 (2016)."},{"key":"e_1_3_2_1_20_1","volume-title":"How to block fingerprinting with Firefox. https:\/\/blog.mozilla.org\/firefox\/how-to-block-fingerprinting-with-firefox. Accessed","author":"AntiFingerpriting","year":"2025","unstructured":"firefoxAntiFingerpriting [n.d.]. How to block fingerprinting with Firefox. https:\/\/blog.mozilla.org\/firefox\/how-to-block-fingerprinting-with-firefox. Accessed: 2025."},{"key":"e_1_3_2_1_21_1","volume-title":"Matthew James Johnson, and Chris Leary","author":"Frostig Roy","year":"2018","unstructured":"Roy Frostig, Matthew James Johnson, and Chris Leary. 2018. Compiling machine learning programs via high-level tracing. Systems for Machine Learning 4, 9 (2018)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616637"},{"key":"e_1_3_2_1_23_1","volume-title":"word2vec Explained: deriving Mikolov et al.'s negativesampling word-embedding method. arXiv preprint arXiv:1402.3722","author":"Goldberg Yoav","year":"2014","unstructured":"Yoav Goldberg. 2014. word2vec Explained: deriving Mikolov et al.'s negativesampling word-embedding method. arXiv preprint arXiv:1402.3722 (2014)."},{"volume-title":"Google Closure compiler. https:\/\/developers.google.com\/closure\/compiler. Accessed","year":"2025","key":"e_1_3_2_1_24_1","unstructured":"google_closure [n.d.]. Google Closure compiler. https:\/\/developers.google.com\/closure\/compiler. Accessed: 2025."},{"volume-title":"High Entropy APIs flagged by chromium. https:\/\/github.com\/chromium\/chromium\/blob\/aae7191b27cef1f097b23e7742afb4895ec6a9d3\/docs\/privacy_budget\/privacy_budget_instrumentation.md?plain=1#L196. Accessed","year":"2025","key":"e_1_3_2_1_25_1","unstructured":"high_entropy_apis [n.d.]. High Entropy APIs flagged by chromium. https:\/\/github.com\/chromium\/chromium\/blob\/aae7191b27cef1f097b23e7742afb4895ec6a9d3\/docs\/privacy_budget\/privacy_budget_instrumentation.md?plain=1#L196. Accessed: 2025."},{"key":"e_1_3_2_1_26_1","volume-title":"Understanding V8's Bytecode. https:\/\/medium.com\/dailyjs\/understanding-v8s-bytecode-317d46c94775. Accessed","author":"Hinkelmann Franziska","year":"2025","unstructured":"Franziska Hinkelmann. 2017. Understanding V8's Bytecode. https:\/\/medium.com\/dailyjs\/understanding-v8s-bytecode-317d46c94775. Accessed: 2025."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00017"},{"key":"e_1_3_2_1_28_1","volume-title":"Bag of tricks for efficient text classification. arXiv preprint arXiv:1607.01759","author":"Joulin Armand","year":"2016","unstructured":"Armand Joulin, Edouard Grave, Piotr Bojanowski, and Tomas Mikolov. 2016. Bag of tricks for efficient text classification. arXiv preprint arXiv:1607.01759 (2016)."},{"key":"e_1_3_2_1_29_1","volume-title":"Javascript obfuscator tool. https:\/\/obfuscator.io\/. Accessed","author":"Kachalov Timofey","year":"2025","unstructured":"Timofey Kachalov. [n.d.]. Javascript obfuscator tool. https:\/\/obfuscator.io\/. Accessed: 2025."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3646547.3688455"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of naacL-HLT","volume":"1","author":"Ming-Wei Chang Jacob Devlin","year":"2019","unstructured":"Jacob Devlin Ming-Wei Chang Kenton and Lee Kristina Toutanova. 2019. Bert: Pre-training of deep bidirectional transformers for language understanding. In Proceedings of naacL-HLT, Vol. 1."},{"key":"e_1_3_2_1_32_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386040"},{"key":"e_1_3_2_1_34_1","volume-title":"The First Early Evidence of the Use of Browser Fingerprinting for Online Tracking. In THE WEB CONFERENCE","author":"Liu Zengrui","year":"2025","unstructured":"Zengrui Liu, Jimmy Dani, Yinzhi Cao, Shujiang Wu, and Nitesh Saxena. 2025. The First Early Evidence of the Use of Browser Fingerprinting for Online Tracking. In THE WEB CONFERENCE 2025."},{"key":"e_1_3_2_1_35_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00065"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of W2SP 2012","author":"Mowery Keaton","year":"2012","unstructured":"Keaton Mowery and Hovav Shacham. 2012. Pixel perfect: Fingerprinting canvas in HTML5. Proceedings of W2SP 2012 (2012)."},{"key":"e_1_3_2_1_38_1","volume-title":"Nowhere to hide: Detecting obfuscated fingerprinting scripts. arXiv preprint arXiv:2206.13599","author":"Ngan Ray","year":"2022","unstructured":"Ray Ngan, Surya Konkimalla, and Zubair Shafiq. 2022. Nowhere to hide: Detecting obfuscated fingerprinting scripts. arXiv preprint arXiv:2206.13599 (2022)."},{"key":"e_1_3_2_1_39_1","volume-title":"W3C Fingerprinting Guidance. https:\/\/w3c.github.io\/fingerprinting-guidance\/. Accessed","author":"Nick Doty Tom Ritter","year":"2025","unstructured":"Tom Ritter Nick Doty. 2025. W3C Fingerprinting Guidance. https:\/\/w3c.github.io\/fingerprinting-guidance\/. Accessed: 2025."},{"key":"e_1_3_2_1_40_1","volume-title":"Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12","author":"Pedregosa Fabian","year":"2011","unstructured":"Fabian Pedregosa, Ga\u00ebl Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, et al. 2011. Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12 (2011), 2825--2830."},{"key":"e_1_3_2_1_41_1","volume-title":"Samaneh Tajalizadehkhoob, Maciej Korczy'ski, and Wouter Joosen.","author":"Pochat Victor Le","year":"2018","unstructured":"Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczy'ski, and Wouter Joosen. 2018. Tranco: A research-oriented top sites ranking hardened against manipulation. arXiv preprint arXiv:1806.01156 (2018)."},{"key":"e_1_3_2_1_42_1","volume-title":"https:\/\/www.eff.org\/privacybadger. Accessed","author":"Badger Privacy","year":"2025","unstructured":"privacybadger [n.d.]. Privacy Badger. https:\/\/www.eff.org\/privacybadger. Accessed: 2025."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0041"},{"key":"e_1_3_2_1_44_1","volume-title":"Improving language understanding by generative pre-training. OpenAI blog","author":"Radford Alec","year":"2018","unstructured":"Alec Radford, Karthik Narasimhan, Tim Salimans, and Ilya Sutskever. 2018. Improving language understanding by generative pre-training. OpenAI blog (2018)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019844"},{"key":"e_1_3_2_1_46_1","unstructured":"Valentino Rizzo. 2018. Machine Learning Approaches for Automatic Detection of Web Fingerprinting. Ph.D. Dissertation. Politecnico di Torino."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207134"},{"key":"e_1_3_2_1_48_1","volume-title":"https:\/\/www.selenium.dev\/documentation\/webdriver\/. Accessed","author":"WebDriver Selenium","year":"2025","unstructured":"selenium [n.d.]. Selenium WebDriver. https:\/\/www.selenium.dev\/documentation\/webdriver\/. Accessed: 2025."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645493"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Philippe Skolka Cristian-Alexandru Staicu and Michael Pradel. 2019. Anything to hide? studying minified and obfuscated code in the web. In The world wide web conference. 1735--1746.","DOI":"10.1145\/3308558.3313752"},{"key":"e_1_3_2_1_51_1","volume-title":"Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research 15, 1","author":"Srivastava Nitish","year":"2014","unstructured":"Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research 15, 1 (2014), 1929--1958."},{"key":"e_1_3_2_1_52_1","volume-title":"Fingerprint randomization. https:\/\/brave.com\/privacyupdates\/3-fingerprint-randomization\/. Accessed","author":"Team Brave Privacy","year":"2025","unstructured":"Brave Privacy Team. 2020. Fingerprint randomization. https:\/\/brave.com\/privacyupdates\/3-fingerprint-randomization\/. Accessed: 2025."},{"volume-title":"Launching Ignition and TurboFan. https:\/\/v8.dev\/blog\/launchingignition-and-turbofan. Accessed","year":"2025","key":"e_1_3_2_1_53_1","unstructured":"V8 team. 2017. Launching Ignition and TurboFan. https:\/\/v8.dev\/blog\/launchingignition-and-turbofan. Accessed: 2025."},{"volume-title":"Fingerprinting Defenses in The Tor Browser. https:\/\/2019. www.torproject.org\/projects\/torbrowser\/design\/#fingerprinting-defenses. Accessed","year":"2025","key":"e_1_3_2_1_54_1","unstructured":"tormitigations [n.d.]. Fingerprinting Defenses in The Tor Browser. https:\/\/2019. www.torproject.org\/projects\/torbrowser\/design\/#fingerprinting-defenses. Accessed: 2025."},{"key":"e_1_3_2_1_55_1","volume-title":"Tracing domain in Chrome DevTools protocol. https:\/\/chromedevtools.github.io\/devtools-protocol\/tot\/Tracing\/. Accessed","author":"CDP","year":"2025","unstructured":"tracing_CDP [n.d.]. Tracing domain in Chrome DevTools protocol. https:\/\/chromedevtools.github.io\/devtools-protocol\/tot\/Tracing\/. Accessed: 2025."},{"key":"e_1_3_2_1_56_1","unstructured":"Tim van Zalingen and Sjors Haanen. 2018. Detection of Browser Fingerprinting by Static JavaScript Code Classification."},{"key":"e_1_3_2_1_57_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Vastel Antoine","year":"2018","unstructured":"Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. 2018. {Fp-Scanner}: The privacy implications of browser fingerprint inconsistencies. In 27th USENIX Security Symposium (USENIX Security 18). 135--150."},{"key":"e_1_3_2_1_58_1","volume-title":"Attention is all you need. Advances in neural information processing systems 30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017)."},{"volume-title":"Mitigating Browser Fingerprinting in Web Specifications. https:\/\/www.w3.org\/TR\/fingerprinting-guidance\/?utm_source=chatgpt. com#narrow-scope-availability. Accessed","year":"2025","key":"e_1_3_2_1_59_1","unstructured":"w3mitigations [n.d.]. Mitigating Browser Fingerprinting in Web Specifications. https:\/\/www.w3.org\/TR\/fingerprinting-guidance\/?utm_source=chatgpt. com#narrow-scope-availability. Accessed: 2025."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950352"},{"key":"e_1_3_2_1_61_1","volume-title":"Tracking Prevention in WebKit. https:\/\/webkit.org\/tracking-prevention\/. Accessed","author":"Blocking","year":"2025","unstructured":"webkitBlocking [n.d.]. Tracking Prevention in WebKit. https:\/\/webkit.org\/tracking-prevention\/. Accessed: 2025."},{"key":"e_1_3_2_1_62_1","volume-title":"Combating Fingerprinting with a Privacy Budget Explainer. https:\/\/github.com\/bslassey\/privacy-budget. Accessed","author":"West Mike","year":"2025","unstructured":"Mike West. 2024. Combating Fingerprinting with a Privacy Budget Explainer. https:\/\/github.com\/bslassey\/privacy-budget. Accessed: 2025."},{"key":"e_1_3_2_1_63_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Wu Shujiang","year":"2019","unstructured":"Shujiang Wu, Song Li, Yinzhi Cao, and Ningfei Wang. 2019. Rendered private: Making {GLSL} execution uniform to prevent {WebGL-based} browser fingerprinting. In 28th USENIX Security Symposium (USENIX Security 19). 1645--1660."}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:28:21Z","timestamp":1766442501000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765158"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":63,"alternative-id":["10.1145\/3719027.3765158","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765158","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}