The Web Never Forgets, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.674-689, 2014. ,
DOI : 10.1007/978-3-642-31284-7_25
FPDetective, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1129-1140, 2013. ,
DOI : 10.1145/2508859.2516674
Disguised Chromium Browser, Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, WPES'16, pp.37-46, 2016. ,
DOI : 10.1145/1124772.1124863
User Tracking on the Web via Cross-Browser Fingerprinting, Lecture Notes in Computer Science, vol.7161, pp.31-46, 2012. ,
DOI : 10.1007/978-3-642-29615-4_4
(Cross-)Browser Fingerprinting via OS and Hardware Level Features, Proceedings 2017 Network and Distributed System Security Symposium, 2017. ,
DOI : 10.14722/ndss.2017.23152
How Unique Is Your Web Browser?, Proceedings of the 10th International Conference on Privacy Enhancing Technologies (PETS'10), 2010. ,
DOI : 10.1109/TDSC.2005.26
URL : http://www.freehaven.net/anonbib/cache/pets2010:eckersley2010unique.pdf
Online Tracking, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1388-1401, 2016. ,
DOI : 10.1145/2663716.2663719
FPGuard: Detection and Prevention of Browser Fingerprinting, Lecture Notes in Computer Science, vol.9149, pp.293-308, 0721. ,
DOI : 10.1007/978-3-319-20810-7_21
Fingerprinting Web Users Through Font Metrics, Proceedings of the 19th international conference on Financial Cryptography and Data Security, 2015. ,
DOI : 10.1007/978-3-662-47854-7_7
URL : https://www.icsi.berkeley.edu/pubs/networking/fingerprintingweb15.pdf
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome, 2014 17th International Conference on Network-Based Information Systems, pp.355-360, 2014. ,
DOI : 10.1109/NBiS.2014.102
FPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques, 9th International Symposium on Engineering Secure Software and Systems, 2017. ,
DOI : 10.14722/ndss.2017.23152
URL : https://hal.archives-ouvertes.fr/hal-01527580
Mitigating Browser Fingerprint Tracking: Multi-level Reconfiguration and Diversification, 2015 IEEE/ACM 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2015. ,
DOI : 10.1109/SEAMS.2015.18
URL : https://hal.archives-ouvertes.fr/hal-01121108
Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints, 2016 IEEE Symposium on Security and Privacy (SP), 2016. ,
DOI : 10.1109/SP.2016.57
URL : https://hal.archives-ouvertes.fr/hal-01285470
The Hawthorne Effect: a randomised, controlled trial, BMC Medical Research Methodology, vol.344, issue.3, p.30, 2007. ,
DOI : 10.1056/NEJM200105243442106
Fingerprinting Information in JavaScript Implementations, Proceedings of W2SP 2011, 2011. ,
Pixel Perfect: Fingerprinting Canvas in HTML5, Proceedings of W2SP 2012, 2012. ,
Edgar Weippl, and FH Campus Wien. 2013. Fast and reliable browser identification with javascript engine fingerprinting, Web 2.0 Workshop on Security and Privacy (W2SP) ,
PriVaricator, Proceedings of the 24th International Conference on World Wide Web, WWW '15, pp.820-830, 2015. ,
DOI : 10.1109/SP.2011.23
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy, pp.541-555, 2013. ,
DOI : 10.1109/SP.2013.43
The Leaking Battery, pp.254-263, 2016. ,
DOI : 10.1109/SP.2013.43
Battery Status Not Included: Assessing Privacy in Web Standards, 3rd International Workshop on Privacy Engineering (IWPE'17), 2017. ,
Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies, 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, 2017. ,
Saying Goodbye to Our Old Friend NPAPI, 2013. ,
Discovering Browser Extensions via Web Accessible Resources, Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY '17, 2017. ,
DOI : 10.1145/2701126.2701210
Mobile device fingerprinting considered harmful for risk-based authentication, Proceedings of the Eighth European Workshop on System Security, EuroSec '15, 2015. ,
DOI : 10.1007/978-3-642-19125-1_7
XHOUND: Quantifying the Fingerprintability of Browser Extensions, 2017 IEEE Symposium on Security and Privacy (SP), 2017. ,
DOI : 10.1109/SP.2017.18
FP-STALKER: Tracking Browser Fingerprint Evolutions, 39th IEEE Symposium on Security and Privacy, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01652021
Efficient Fingerprinting-Based Android Device Identification With Zero-Permission Identifiers, IEEE Access, vol.4, pp.8073-8083, 2016. ,
DOI : 10.1109/ACCESS.2016.2626395