{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T18:09:31Z","timestamp":1774634971583,"version":"3.50.1"},"reference-count":22,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"2","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Browser fingerprinting as a tracking technique to recognize users based on their browsers\u2019 unique features or behavior has been known for more than a decade. We present the results of a 3-year online study on browser fingerprinting with more than 1,300 users. This is the first study with ground truth on user level, which allows the assessment of trackability based on fingerprints of multiple browsers and devices per user. Based on our longitudinal observations of 88,000 measurements with over 300 considered browser features, we optimized feature sets for mobile and desktop devices. Further, we conducted two user surveys to determine the representativeness of our user sample based on users\u2019 demographics and technical background, and to learn how users perceive browser fingerprinting and how they protect themselves.<\/jats:p>","DOI":"10.2478\/popets-2020-0041","type":"journal-article","created":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T15:01:13Z","timestamp":1590505273000},"page":"558-577","source":"Crossref","is-referenced-by-count":29,"title":["Long-Term Observation on Browser Fingerprinting: Users\u2019 Trackability and Perspective"],"prefix":"10.56553","volume":"2020","author":[{"given":"Gaston","family":"Pugliese","sequence":"first","affiliation":[{"name":"Friedrich-Alexander University Erlangen-N\u00fcrnberg"}]},{"given":"Christian","family":"Riess","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander University Erlangen-N\u00fcrnberg"}]},{"given":"Freya","family":"Gassmann","sequence":"additional","affiliation":[{"name":"Saarland University"}]},{"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander University Erlangen-N\u00fcrnberg"}]}],"member":"35752","published-online":{"date-parts":[[2020,5,8]]},"reference":[{"key":"2022043007191655847_j_popets-2020-0041_ref_001_w2aab3b7c56b1b6b1ab1ab1Aa","doi-asserted-by":"crossref","unstructured":"[1] P. Eckersley, \u201cHow unique is your web browser?,\u201d in Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings, pp. 1\u201318, 2010.10.1007\/978-3-642-14527-8_1","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"2022043007191655847_j_popets-2020-0041_ref_002_w2aab3b7c56b1b6b1ab1ab2Aa","unstructured":"[2] H. Tillmann, \u201cBrowser fingerprinting - tracking ohne spuren zu hinterlassen,\u201d Master\u2019s thesis, 2013."},{"key":"2022043007191655847_j_popets-2020-0041_ref_003_w2aab3b7c56b1b6b1ab1ab3Aa","doi-asserted-by":"crossref","unstructured":"[3] A. Vastel, P. Laperdrix, W. Rudametkin, and R. Rouvoy, \u201cFP-STALKER: Tracking Browser Fingerprint Evolutions,\u201d in 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA, pp. 728\u2013741, 2018.10.1109\/SP.2018.00008","DOI":"10.1109\/SP.2018.00008"},{"key":"2022043007191655847_j_popets-2020-0041_ref_004_w2aab3b7c56b1b6b1ab1ab4Aa","doi-asserted-by":"crossref","unstructured":"[4] P. Laperdrix, W. Rudametkin, and B. Baudry, \u201cBeauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints,\u201d in IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016, pp. 878\u2013894, 2016.10.1109\/SP.2016.57","DOI":"10.1109\/SP.2016.57"},{"key":"2022043007191655847_j_popets-2020-0041_ref_005_w2aab3b7c56b1b6b1ab1ab5Aa","doi-asserted-by":"crossref","unstructured":"[5] A. G\u00f3mez-Boix, P. Laperdrix, and B. Baudry, \u201cHiding in the Crowd: An Analysis of the Effectiveness of Browser Fingerprinting at Large Scale,\u201d in Proceedings of the 2018 World Wide Web Conference on World Wide Web, WWW 2018, Lyon, France, April 23-27, 2018, pp. 309\u2013318, 2018.10.1145\/3178876.3186097","DOI":"10.1145\/3178876.3186097"},{"key":"2022043007191655847_j_popets-2020-0041_ref_006_w2aab3b7c56b1b6b1ab1ab6Aa","doi-asserted-by":"crossref","unstructured":"[6] D. Fifield and S. Egelman, \u201cFingerprinting Web Users Through Font Metrics,\u201d in Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers, pp. 107\u2013124, 2015.10.1007\/978-3-662-47854-7_7","DOI":"10.1007\/978-3-662-47854-7_7"},{"key":"2022043007191655847_j_popets-2020-0041_ref_007_w2aab3b7c56b1b6b1ab1ab7Aa","unstructured":"[7] J. R. Mayer, \u201cAny person... a pamphleteer: Internet Anonymity in the Age of Web 2.0,\u201d 2009. Bachelor\u2019s thesis: https:\/\/jonathanmayer.org\/publications\/thesis09.pdf, accessed on August 5, 2019."},{"key":"2022043007191655847_j_popets-2020-0041_ref_008_w2aab3b7c56b1b6b1ab1ab8Aa","doi-asserted-by":"crossref","unstructured":"[8] Y. Cao, S. Li, and E. Wijmans, \u201c(Cross-)Browser Fingerprinting via OS and Hardware Level Features,\u201d in 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017, 2017.10.14722\/ndss.2017.23152","DOI":"10.14722\/ndss.2017.23152"},{"key":"2022043007191655847_j_popets-2020-0041_ref_009_w2aab3b7c56b1b6b1ab1ab9Aa","doi-asserted-by":"crossref","unstructured":"[9] A. Cooper, H. Tschofenig, B. Aboba, J. Peterson, J. Morris, M. Hansen and R. Smith, \u201cRFC 6973: Privacy Considerations for Internet Protocols,\u201d 2013. https:\/\/tools.ietf.org\/html\/rfc6973, accessed on August 7, 2019.","DOI":"10.17487\/rfc6973"},{"key":"2022043007191655847_j_popets-2020-0041_ref_010_w2aab3b7c56b1b6b1ab1ac10Aa","doi-asserted-by":"crossref","unstructured":"[10] J. R. Mayer and J. C. Mitchell, \u201cThird-Party Web Tracking: Policy and Technology,\u201d in IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA, pp. 413\u2013427, 2012.10.1109\/SP.2012.47","DOI":"10.1109\/SP.2012.47"},{"key":"2022043007191655847_j_popets-2020-0041_ref_011_w2aab3b7c56b1b6b1ab1ac11Aa","unstructured":"[11] C. D\u00edaz, S. Seys, J. Claessens, and B. Preneel, \u201cTowards Measuring Anonymity,\u201d in Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, pp. 54\u201368, 2002.10.1007\/3-540-36467-6_5"},{"key":"2022043007191655847_j_popets-2020-0041_ref_012_w2aab3b7c56b1b6b1ab1ac12Aa","doi-asserted-by":"crossref","unstructured":"[12] P. Laperdrix, B. Baudry, and V. Mishra, \u201cFPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques,\u201d in Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings, pp. 97\u2013114, 2017.10.1007\/978-3-319-62105-0_7","DOI":"10.1007\/978-3-319-62105-0_7"},{"key":"2022043007191655847_j_popets-2020-0041_ref_013_w2aab3b7c56b1b6b1ab1ac13Aa","doi-asserted-by":"crossref","unstructured":"[13] A. Vastel, W. Rudametkin, and R. Rouvoy, \u201cFP-TESTER: Automated Testing of Browser Fingerprint Resilience,\u201d in 2018 IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2018, London, United Kingdom, April 23-27, 2018, pp. 103\u2013107, 2018.10.1109\/EuroSPW.2018.00020","DOI":"10.1109\/EuroSPW.2018.00020"},{"key":"2022043007191655847_j_popets-2020-0041_ref_014_w2aab3b7c56b1b6b1ab1ac14Aa","unstructured":"[14] A. Vastel, P. Laperdrix, W. Rudametkin, and R. Rouvoy, \u201cFP-SCANNER: The Privacy Implications of Browser Fingerprint Inconsistencies,\u201d in 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018., pp. 135\u2013150, 2018."},{"key":"2022043007191655847_j_popets-2020-0041_ref_015_w2aab3b7c56b1b6b1ab1ac15Aa","unstructured":"[15] P. Kumaraguru and L. F. Cranor, Privacy Indexes: A Survey of Westin\u2019s Studies. 2005."},{"key":"2022043007191655847_j_popets-2020-0041_ref_016_w2aab3b7c56b1b6b1ab1ac16Aa","unstructured":"[16] J. B. Lovins, \u201cDevelopment of a Stemming Algorithm,\u201d Mech. Translat. & Comp. Linguistics, vol. 11, no. 1-2, pp. 22\u201331, 1968."},{"key":"2022043007191655847_j_popets-2020-0041_ref_017_w2aab3b7c56b1b6b1ab1ac17Aa","unstructured":"[17] L. Molina, L. Belanche, and A. Nebot, \u201cFeature Selection Algorithms: A Survey and Experimental Evaluation,\u201d in IEEE International Conference on Data Mining, pp. 306\u2013313, 2002."},{"key":"2022043007191655847_j_popets-2020-0041_ref_018_w2aab3b7c56b1b6b1ab1ac18Aa","unstructured":"[18] A. C. Cameron and P. K. Trivedi, \u201cMicroeconometrics using Stata, revised edition,\u201d StataCorp LP, 2010."},{"key":"2022043007191655847_j_popets-2020-0041_ref_019_w2aab3b7c56b1b6b1ab1ac19Aa","doi-asserted-by":"crossref","unstructured":"[19] M. Schreier, Qualitative Content Analysis in Practice. Sage Publications, 2012.","DOI":"10.4135\/9781529682571"},{"key":"2022043007191655847_j_popets-2020-0041_ref_020_w2aab3b7c56b1b6b1ab1ac20Aa","doi-asserted-by":"crossref","unstructured":"[20] J. Cohen, \u201cA Coefficient of Agreement for Nominal Scales,\u201d Educational and psychological measurement, vol. 20, no. 1, pp. 37\u201346, 1960.10.1177\/001316446002000104","DOI":"10.1177\/001316446002000104"},{"key":"2022043007191655847_j_popets-2020-0041_ref_021_w2aab3b7c56b1b6b1ab1ac21Aa","doi-asserted-by":"crossref","unstructured":"[21] M. Banerjee, M. Capozzoli, L. McSweeney, and D. Sinha, \u201cBeyond Kappa: A Review of Interrater Agreement Measures,\u201d Canadian journal of statistics, vol. 27, no. 1, pp. 3\u201323, 1999.10.2307\/3315487","DOI":"10.2307\/3315487"},{"key":"2022043007191655847_j_popets-2020-0041_ref_022_w2aab3b7c56b1b6b1ab1ac22Aa","doi-asserted-by":"crossref","unstructured":"[22] A. Datta, J. Lu, and M. C. Tschantz, \u201cEvaluating Anti-Fingerprinting Privacy Enhancing Technologies,\u201d in The World Wide Web Conference, WWW 2019, San Francisco, CA, USA, May 13-17, 2019, pp. 351\u2013362, 2019.10.1145\/3308558.3313703","DOI":"10.1145\/3308558.3313703"}],"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/content.sciendo.com\/view\/journals\/popets\/2020\/2\/article-p558.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/popets-2020-0041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T11:36:31Z","timestamp":1722944191000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2020\/popets-2020-0041.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":22,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2020,5,8]]},"published-print":{"date-parts":[[2020,4,1]]}},"alternative-id":["10.2478\/popets-2020-0041"],"URL":"https:\/\/doi.org\/10.2478\/popets-2020-0041","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}