{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T21:21:27Z","timestamp":1758662487239,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,20]]},"DOI":"10.1145\/3731806.3731843","type":"proceedings-article","created":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T10:17:39Z","timestamp":1758622659000},"page":"13-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Breaking the Trackers: A Multi-Module Privacy Framework through Fingerprint Injection and Data isolation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3797-1461","authenticated-orcid":false,"given":"Pannag","family":"Kumaar","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, PES University, Bangalore, Karnataka, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0331-7487","authenticated-orcid":false,"given":"Himank","family":"Bansal","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, PES University, Bangalore, Karnataka, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4829-4288","authenticated-orcid":false,"given":"Maryam","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, PES University, Bangalore, Karnataka, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5735-4365","authenticated-orcid":false,"given":"Tania","family":"Somanna N","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, PES University, Bangalore, Karnataka, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0494-9825","authenticated-orcid":false,"given":"Sarasvathi","family":"V","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, PES University, Bangalore, Karnataka, India"}]}],"member":"320","published-online":{"date-parts":[[2025,9,23]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"Pierre Laperdrix Nataliia Bielova Benoit Baudry and Gildas Avoine. \"Browser Fingerprinting: A Survey.\" ACM Transactions on the Web (TWEB) vol. 14 no. 2 Article 8 April 2020 pp. 1\u201333. Association for Computing Machinery New York NY USA. 10.1145\/3386040.","DOI":"10.1145\/3386040"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Hang Hu; Peng Peng; Gang Wang. \"Characterizing Pixel Tracking through the Lens of Disposable Email Services.\" 2019 IEEE Symposium on Security and Privacy (SP) San Francisco CA USA 2019 pp. 365\u2013379. 10.1109\/SP.2019.00033.","DOI":"10.1109\/SP.2019.00033"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"V. L. Ajay and A. M. Guptha. \"A Defense against JavaScript Object-Based Fingerprinting and Passive Fingerprinting.\" 2022 International Conference on Computing Communication Security and Intelligent Systems (IC3SIS) Kochi India 2022 pp. 1\u20136. 10.1109\/IC3SIS54991.2022.9885716.","DOI":"10.1109\/IC3SIS54991.2022.9885716"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"Jianhui Zhang Youjun Bu Bo Chen Chongxin Sun and Tianyu Wang. \"A Survey of Browser Fingerprint Research and Application.\" Security and Communication Networks 2022 Article ID 3363335 pp. 14. 10.1155\/2022\/3363335.","DOI":"10.1155\/2022\/3363335"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"T. Li X. Zheng K. Shen and X. Han. \"FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint Analysis.\" In: Lu W. Zhang Y. Wen W. Yan H. Li C. (eds). Cyber Security CNCERT 2021 Communications in Computer and Information Science vol. 1506 Springer Singapore 2022 pp. 60\u201377. 10.1007\/978-981-16-9229-1_4.","DOI":"10.1007\/978-981-16-9229-1_4"},{"key":"#cr-split#-e_1_3_3_1_7_2.1","doi-asserted-by":"crossref","unstructured":"N. Mathews J. K. Holland S. E. Oh M. S. Rahman N. Hopper and M. Wright. \"SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses.\" 2023 IEEE Symposium on Security and Privacy","DOI":"10.1109\/SP46215.2023.10179289"},{"key":"#cr-split#-e_1_3_3_1_7_2.2","unstructured":"(SP) San Francisco CA USA 2023 pp. 969-986. https:\/\/ieeexplore.ieee.org\/abstract\/document\/10179289."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Babak Amin Azad Oleksii Starov Pierre Laperdrix and Nick Nikiforakis. \"Taming the Shape Shifter: Detecting Anti-fingerprinting Browsers.\" DIMVA 2020 - 17th Conference on Detection of Intrusions and Malware & Vulnerability Assessment Lisboa \/ Virtual Portugal Jun 2020 pp. 10. https:\/\/www.securitee.org\/files\/antifpbrowsers_dimva2020.pdf.","DOI":"10.1007\/978-3-030-52683-2_8"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Alexander Sj\u00f6sten Daniel Hedin and Andrei Sabelfeld. \"EssentialFP: Exposing the Essence of Browser Fingerprinting.\" 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2021 pp. 32-48. https:\/\/api.semanticscholar.org\/CorpusID:236426315.","DOI":"10.1109\/EuroSPW54576.2021.00011"},{"key":"e_1_3_3_1_10_2","unstructured":"Ting-Fang Yen Yinglian Xie Fang Yu Roger Peng Yu and Mart\u00edn Abadi. \"Host Fingerprinting and Tracking on the Web: Privacy and Security Implications.\" Proceedings of the Network and Distributed System Security Symposium (NDSS) 2012. https:\/\/www.audentia-gestion.fr\/MICROSOFT\/ndss2012.pdf."},{"key":"e_1_3_3_1_11_2","unstructured":"Lukasz Olejnik Claude Castelluccia and Artur Janc. \"Why Johnny Can\u2019t Browse in Peace: On the Uniqueness of Web Browsing History Patterns.\" 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs) July 2012 Vigo Spain. https:\/\/hal.archives-ouvertes.fr\/hal-00747841."},{"key":"e_1_3_3_1_12_2","unstructured":"Keaton Mowery Dillon Bogenreif Scott Yilek and Hovav Shacham. \"Fingerprinting Information in JavaScript Implementations.\" In Proceedings of the Workshop on Web 2.0 Security and Privacy (W2SP) 2011. https:\/\/api.semanticscholar.org\/CorpusID:6066432."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"Zengrui Liu Prakash Shrestha and Nitesh Saxena. \"Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques.\" Applied Cryptography and Network Security edited by Giuseppe Ateniese and Daniele Venturi Springer International Publishing Cham 2022 pp. 147\u2013169. 10.1007\/978-3-031-09234-3_8.","DOI":"10.1007\/978-3-031-09234-3_8"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Steven Englehardt Jeffrey Han and Arvind Narayanan. \"I Never Signed Up for This! Privacy Implications of Email Tracking.\" Proceedings on Privacy Enhancing Technologies (PETS) 2018 pp. 1\u201323. https:\/\/senglehardt.com\/papers\/pets18_email_tracking.pdf.","DOI":"10.1515\/popets-2018-0006"},{"key":"e_1_3_3_1_15_2","unstructured":"Benedict Bender Benjamin Fabian Johannes Haupt and Stefan Lessmann. \"Track and Treat - Usage of E-Mail Tracking for Newsletter Individualization.\" ECIS 2018 Research Papers Article 59 2018. https:\/\/aisel.aisnet.org\/ecis2018_rp\/59."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"Adrian Dabrowski Georg Merzdovnik Johanna Ullrich Gerald Sendera and Edgar Weippl. \"Measuring Cookies and Web Privacy in a Post-GDPR World.\" SBA Research Vienna Austria Christian Doppler Laboratory for Security and Quality Improvement in the Production System Lifecycle TU Wien Austria. 10.1007\/978-3-030-15986-3_17.","DOI":"10.1007\/978-3-030-15986-3_17"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"Ian D. Mitchell. \"Third-Party Tracking Cookies and Data Privacy.\" SSRN Electronic Journal April 2012. 10.2139\/ssrn.2058326.","DOI":"10.2139\/ssrn.2058326"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"Steven Englehardt Dillon Reisman Christian Eubank Peter Zimmerman Jonathan Mayer Arvind Narayanan and Edward W. Felten. \"Cookies That Give You Away: The Surveillance Implications of Web Tracking.\" In Proceedings of the 24th International Conference on World Wide Web (WWW \u201915) Florence Italy May 2015 pp. 289\u2013299. International World Wide Web Conferences Steering Committee Republic and Canton of Geneva CHE. 10.1145\/2736277.2741679.","DOI":"10.1145\/2736277.2741679"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"Umar Iqbal Steven Englehardt and Zubair Shafiq. \"Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors.\" In Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP) 2021 pp. 1143\u20131161. 10.1109\/SP40001.2021.00017.","DOI":"10.1109\/SP40001.2021.00017"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","unstructured":"Peter Eckersley. \"How Unique Is Your Web Browser?\" In: M.J. Atallah and N.J. Hopper (eds) Privacy Enhancing Technologies. PETS 2010. Lecture Notes in Computer Science vol. 6205 Springer Berlin Heidelberg 2010 pp. 1\u201318. 10.1007\/978-3-642-14527-8_1.","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Liou Jing-Chiou Mohanapriya Logapriyan Te Lai Daniel Pareja and Sean Sewell. \"A Study of the Internet Privacy in Private Browsing Mode.\" Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering (EASE \u201916). Published August 2016. Accessed January 24 2025. http:\/\/dx.doi.org\/10.1145\/2955129.2955153.","DOI":"10.1145\/2955129.2955153"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","unstructured":"Mohamad Amar Irsyad Mohd Aminuddin Zarul Fitri Zaaba Azman Samsudin Faiz Zaki and Nor Badrul Anuar. \"The rise of website fingerprinting on Tor: Analysis on techniques and assumptions.\" Journal of Network and Computer Applications Vol. 212 pp. 103582 2023. 10.1016\/j.jnca.2023.103582.","DOI":"10.1016\/j.jnca.2023.103582"},{"key":"e_1_3_3_1_23_2","unstructured":"Joseph Steinberg. \"You Are Being Tracked Online By A Sneaky New Technology \u2014 Here\u2019s What You Need To Know.\" Forbes July 23 2014. https:\/\/www.forbes.com\/sites\/josephsteinberg\/2014\/07\/23\/you-are-being-tracked-online-by-a-sneaky-new-technology-heres-what-you-need-to-know\/."},{"key":"e_1_3_3_1_24_2","unstructured":"Gabor Gulyas. \"Device Spoofing and Anti-Fingerprinting: How Fraudsters Do It.\" SEON Resources 2023. https:\/\/seon.io\/resources\/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it\/."},{"key":"e_1_3_3_1_25_2","unstructured":"Kate Knibbs. \"What You Need to Know About the Sneakiest New Online Tracking Tool.\" Gizmodo July 21 2014. https:\/\/gizmodo.com\/what-you-need-to-know-about-the-sneakiest-new-online-tr-1608455771."},{"key":"e_1_3_3_1_26_2","unstructured":"Wikipedia contributors. \"Spy pixel.\" Wikipedia The Free Encyclopedia. Accessed December 6 2024. https:\/\/en.wikipedia.org\/wiki\/Spypixel."},{"key":"e_1_3_3_1_27_2","unstructured":"Proton. \"How to Stop Email Trackers.\" Proton Blog December 2024. Accessed December 6 2024. https:\/\/proton.me\/blog\/how-to-stop-email-trackers."},{"key":"e_1_3_3_1_28_2","unstructured":"Federal Trade Commission. \"How Websites and Apps Collect and Use Your Information.\" Consumer Advice. Accessed December 6 2024. https:\/\/consumer.ftc.gov\/articles\/how-websites-and-apps-collect-and-use-your-information."},{"key":"e_1_3_3_1_29_2","unstructured":"Shahed Nasser. \"Incognito Mode Detection: Detecting Visitors Who Browse in Private Mode.\" Fingerprint July 29 2021. https:\/\/fingerprint.com\/blog\/incognito-mode-detection\/."},{"key":"e_1_3_3_1_30_2","unstructured":"Wolford Ben. \"Google\u2019s Privacy Sandbox is Privacy Quicksand.\" Proton Blog. Published September 15 2023. Accessed January 22 2025. https:\/\/proton.me\/blog\/google-privacy-sandbox."},{"key":"e_1_3_3_1_31_2","unstructured":"Electronic Frontier Foundation. \"Why Privacy Badger Opts You Out of Google\u2019s Privacy Sandbox.\" EFF Deeplinks. Published July 2024. Accessed January 22 2025. https:\/\/www.eff.org\/deeplinks\/2024\/07\/why-privacy-badger-opts-you-out-googles-privacy-sandbox."}],"event":{"name":"ICSCA 2025: 2025 14th International Conference on Software and Computer Applications","acronym":"ICSCA 2025","location":"Kuala Lumpur Malaysia"},"container-title":["Proceedings of the 2025 14th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3731806.3731843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T20:52:37Z","timestamp":1758660757000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3731806.3731843"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,20]]},"references-count":31,"alternative-id":["10.1145\/3731806.3731843","10.1145\/3731806"],"URL":"https:\/\/doi.org\/10.1145\/3731806.3731843","relation":{},"subject":[],"published":{"date-parts":[[2025,2,20]]},"assertion":[{"value":"2025-09-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}