NDSS 2017: (Cross-)Browser Fingerprinting via OS and Hardware Level Features
Video taken during the Network and Distributed System Security (NDSS) Symposium 2017, held February 26 through March 1, 2017, at Catamaran Resort Hotel & Spa in San Diego, California.
(Cross-)Browser Fingerprinting via OS and Hardware Level Features
In this paper, we propose a browser fingerprinting technique that can track users not only within a single browser but also across different browsers on the same machine. Specifically, our approach utilizes many novel OS and hardware level features, such as those from graphics cards, CPU, and installed writing scripts. We extract these features by asking browsers to perform tasks that rely on corresponding OS and hardware functionalities.
Our evaluation shows that our approach can successfully identify 99.24% of users as opposed to 90.84% for state of the art on single-browser fingerprinting against the same dataset. Further, our approach can achieve higher uniqueness rate than the only cross-browser approach in the literature with similar stability.
Authors: Yinzhi Cao (Lehigh University), Song Li (Lehigh University), Erik Wijmans (Washington University in St. Louis)
Видео NDSS 2017: (Cross-)Browser Fingerprinting via OS and Hardware Level Features канала NDSS Symposium
(Cross-)Browser Fingerprinting via OS and Hardware Level Features
In this paper, we propose a browser fingerprinting technique that can track users not only within a single browser but also across different browsers on the same machine. Specifically, our approach utilizes many novel OS and hardware level features, such as those from graphics cards, CPU, and installed writing scripts. We extract these features by asking browsers to perform tasks that rely on corresponding OS and hardware functionalities.
Our evaluation shows that our approach can successfully identify 99.24% of users as opposed to 90.84% for state of the art on single-browser fingerprinting against the same dataset. Further, our approach can achieve higher uniqueness rate than the only cross-browser approach in the literature with similar stability.
Authors: Yinzhi Cao (Lehigh University), Song Li (Lehigh University), Erik Wijmans (Washington University in St. Louis)
Видео NDSS 2017: (Cross-)Browser Fingerprinting via OS and Hardware Level Features канала NDSS Symposium
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![NDSS 2021 Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy](https://i.ytimg.com/vi/iscv9UDM90g/default.jpg)
![NDSS 2020 SPEECHMINER Framework Investigating and Measuring Speculative Execution Vulnerabilities](https://i.ytimg.com/vi/Wr4OLMorRzQ/default.jpg)
![NDSS 2021 NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces](https://i.ytimg.com/vi/gGtGWH-NA6w/default.jpg)
![NDSS 2021 WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning](https://i.ytimg.com/vi/h7P65RJXd3c/default.jpg)
![NDSS 2018 Settling Payments: Efficient Decentralized Routing for Path-Based Transactions](https://i.ytimg.com/vi/kaRjWBvEXGs/default.jpg)
![NDSS 2020 Genotype Extraction and False Relative Attacks: Security Risks to Genealogy Services](https://i.ytimg.com/vi/W6bH6PFgXSA/default.jpg)
![NDSS 2018 - A Longitudinal Study of PII Leaks Across Android App Versions](https://i.ytimg.com/vi/5inu8tMuAc8/default.jpg)
![NDSS 2020 Compliance Cautions: Security Issues Associated with U.S. Digital-Security Standards](https://i.ytimg.com/vi/9-yZ_gzUN1A/default.jpg)
![NDSS 2020 Measuring the Deployment of Network Censorship Filters at Global Scale](https://i.ytimg.com/vi/R8VlHOwakQk/default.jpg)
![NDSS 2018 - ZeroTrace : Oblivious Memory Primitives from Intel SGX](https://i.ytimg.com/vi/bzIedAsGMkk/default.jpg)
![NDSS 2021 SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Learning](https://i.ytimg.com/vi/79HBRlKkjUU/default.jpg)
![NDSS 2021 WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics](https://i.ytimg.com/vi/tnZllY3W3to/default.jpg)
![NDSS 2019 DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems](https://i.ytimg.com/vi/6xSH-V686dk/default.jpg)
![NDSS 2017 Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations...](https://i.ytimg.com/vi/Jb5J4SfwlSk/default.jpg)
![NDSS 2021 All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers](https://i.ytimg.com/vi/s90RL0kfmd8/default.jpg)
![NDSS 2021 As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service](https://i.ytimg.com/vi/_2AfIjlqEOo/default.jpg)
![NDSS 2018 Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing](https://i.ytimg.com/vi/7_wh9gBvisM/default.jpg)
![NDSS 2020 Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors](https://i.ytimg.com/vi/6O1fUx9O-j0/default.jpg)
![NDSS 2022 AutoSec Demo #14: In-Vehicle Communication Using Named Data Networking](https://i.ytimg.com/vi/HUkAyOBDXYc/default.jpg)
![NDSS 2022 LASER - “Mind your own cryptocurrency!”](https://i.ytimg.com/vi/B9ftyJM-jIw/default.jpg)
![NDSS 2021 Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages](https://i.ytimg.com/vi/WM6S5paxueA/default.jpg)