Digitala Vetenskapliga Arkivet

Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A collaborative strategy for mitigating tracking through browser fingerprinting
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.ORCID iD: 0000-0002-4015-4640
2019 (English)In: Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery , 2019, p. 67-78Conference paper, Published paper (Refereed)
Abstract [en]

Browser fingerprinting is a technique that collects information about the browser configuration and the environment in which it is running. This information is so diverse that it can partially or totally identify users online. Over time, several countermeasures have emerged to mitigate tracking through browser fingerprinting. However, these measures do not offer full coverage in terms of privacy protection, as some of them may introduce inconsistencies or unusual behaviors, making these users stand out from the rest. We address these limitations by proposing a novel approach that minimizes both the identifiability of users and the required changes to browser configuration. To this end, we exploit clustering algorithms to identify the devices that are prone to share the same or similar fingerprints and to provide them with a new non-unique fingerprint. We then use this fingerprint to automatically assemble and run web browsers through virtualization within a docker container. Thus all the devices in the same cluster will end up running a web browser with an indistinguishable and consistent fingerprint.

Place, publisher, year, edition, pages
Association for Computing Machinery , 2019. p. 67-78
Keywords [en]
Clustering algorithms, Network security, Palmprint recognition, Collaborative strategies, Identifiability, Privacy protection, Unusual behaviors, Web browsers
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:kth:diva-268021DOI: 10.1145/3338468.3356828Scopus ID: 2-s2.0-85076095599ISBN: 9781450368285 (print)OAI: oai:DiVA.org:kth-268021DiVA, id: diva2:1417335
Conference
6th ACM Workshop on Moving Target Defense, MTD 2019, co-located with the 26th ACM Conference on Computer and Communications Security, CCS 2019, London, UK, November 11, 2019
Note

QC 20200327

Available from: 2020-03-27 Created: 2020-03-27 Last updated: 2020-03-27Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopusConference proceedingsConference website

Search in DiVA

By author/editor
Baudry, Benoit
By organisation
Software and Computer systems, SCS
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 17 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf