Загрузка страницы

NDSS 2017: (Cross-)Browser Fingerprinting via OS and Hardware Level Features

Video taken during the Network and Distributed System Security (NDSS) Symposium 2017, held February 26 through March 1, 2017, at Catamaran Resort Hotel & Spa in San Diego, California.

(Cross-)Browser Fingerprinting via OS and Hardware Level Features

In this paper, we propose a browser fingerprinting technique that can track users not only within a single browser but also across different browsers on the same machine. Specifically, our approach utilizes many novel OS and hardware level features, such as those from graphics cards, CPU, and installed writing scripts. We extract these features by asking browsers to perform tasks that rely on corresponding OS and hardware functionalities.
Our evaluation shows that our approach can successfully identify 99.24% of users as opposed to 90.84% for state of the art on single-browser fingerprinting against the same dataset. Further, our approach can achieve higher uniqueness rate than the only cross-browser approach in the literature with similar stability.

Authors: Yinzhi Cao (Lehigh University), Song Li (Lehigh University), Erik Wijmans (Washington University in St. Louis)

Видео NDSS 2017: (Cross-)Browser Fingerprinting via OS and Hardware Level Features канала NDSS Symposium
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
25 апреля 2017 г. 1:56:47
00:15:33
Другие видео канала
NDSS 2021 Practical Non-Interactive Searchable Encryption with Forward and Backward PrivacyNDSS 2021 Practical Non-Interactive Searchable Encryption with Forward and Backward PrivacyNDSS 2020 SPEECHMINER Framework  Investigating and Measuring Speculative Execution VulnerabilitiesNDSS 2020 SPEECHMINER Framework Investigating and Measuring Speculative Execution VulnerabilitiesNDSS 2021 NetPlier: Probabilistic Network Protocol Reverse Engineering from Message TracesNDSS 2021 NetPlier: Probabilistic Network Protocol Reverse Engineering from Message TracesNDSS 2021 WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast CloningNDSS 2021 WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast CloningNDSS 2018 Settling Payments: Efficient Decentralized Routing for Path-Based TransactionsNDSS 2018 Settling Payments: Efficient Decentralized Routing for Path-Based TransactionsNDSS 2020 Genotype Extraction and False Relative Attacks: Security Risks to Genealogy ServicesNDSS 2020 Genotype Extraction and False Relative Attacks: Security Risks to Genealogy ServicesNDSS 2018 -  A Longitudinal Study of PII Leaks Across Android App VersionsNDSS 2018 - A Longitudinal Study of PII Leaks Across Android App VersionsNDSS 2020 Compliance Cautions: Security Issues Associated with U.S. Digital-Security StandardsNDSS 2020 Compliance Cautions: Security Issues Associated with U.S. Digital-Security StandardsNDSS 2020 Measuring the Deployment of Network Censorship Filters at Global ScaleNDSS 2020 Measuring the Deployment of Network Censorship Filters at Global ScaleNDSS 2018  - ZeroTrace : Oblivious Memory Primitives from Intel SGXNDSS 2018 - ZeroTrace : Oblivious Memory Primitives from Intel SGXNDSS 2021 SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep LearningNDSS 2021 SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep LearningNDSS 2021 WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual SemanticsNDSS 2021 WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual SemanticsNDSS 2019 DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous SystemsNDSS 2019 DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous SystemsNDSS 2017 Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations...NDSS 2017 Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations...NDSS 2021 All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile MessengersNDSS 2021 All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile MessengersNDSS 2021  As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC ServiceNDSS 2021 As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC ServiceNDSS 2018 Enhancing Memory Error Detection for Large-Scale Applications and Fuzz TestingNDSS 2018 Enhancing Memory Error Detection for Large-Scale Applications and Fuzz TestingNDSS 2020 Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion SensorsNDSS 2020 Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion SensorsNDSS 2022 AutoSec  Demo #14: In-Vehicle Communication Using Named Data NetworkingNDSS 2022 AutoSec Demo #14: In-Vehicle Communication Using Named Data NetworkingNDSS 2022 LASER - “Mind your own cryptocurrency!”NDSS 2022 LASER - “Mind your own cryptocurrency!”NDSS 2021 Towards Measuring Supply Chain Attacks on Package Managers for Interpreted LanguagesNDSS 2021 Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages
Яндекс.Метрика