G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan et al., The Web Never Forgets, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.674-689, 2014.
DOI : 10.1007/978-3-642-31284-7_25

G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gürses et al., FPDetective, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1129-1140, 2013.
DOI : 10.1145/2508859.2516674

P. Baumann, S. Katzenbeisser, M. Stopczynski, and E. Tews, Disguised Chromium Browser, Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, WPES'16, pp.37-46, 2016.
DOI : 10.1145/1124772.1124863

K. Boda, Á. Máté-földes, G. György-gulyás, and S. Imre, User Tracking on the Web via Cross-Browser Fingerprinting, Lecture Notes in Computer Science, vol.7161, pp.31-46, 2012.
DOI : 10.1007/978-3-642-29615-4_4

Y. Cao, S. Li, and E. Wijmans, (Cross-)Browser Fingerprinting via OS and Hardware Level Features, Proceedings 2017 Network and Distributed System Security Symposium, 2017.
DOI : 10.14722/ndss.2017.23152

P. Eckersley, How Unique Is Your Web Browser?, Proceedings of the 10th International Conference on Privacy Enhancing Technologies (PETS'10), 2010.
DOI : 10.1109/TDSC.2005.26

URL : http://www.freehaven.net/anonbib/cache/pets2010:eckersley2010unique.pdf

S. Englehardt and A. Narayanan, Online Tracking, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1388-1401, 2016.
DOI : 10.1145/2663716.2663719

A. Faizkhademi, M. Zulkernine, and K. Weldemariam, FPGuard: Detection and Prevention of Browser Fingerprinting, Lecture Notes in Computer Science, vol.9149, pp.293-308, 0721.
DOI : 10.1007/978-3-319-20810-7_21

URL : https://hal.archives-ouvertes.fr/hal-01745817

D. Fifield and S. Egelman, Fingerprinting Web Users Through Font Metrics, Proceedings of the 19th international conference on Financial Cryptography and Data Security, 2015.
DOI : 10.1007/978-3-662-47854-7_7

URL : https://www.icsi.berkeley.edu/pubs/networking/fingerprintingweb15.pdf

U. Fiore, A. Castiglione, A. D. Santis, and F. Palmieri, Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome, 2014 17th International Conference on Network-Based Information Systems, pp.355-360, 2014.
DOI : 10.1109/NBiS.2014.102

P. Laperdrix, B. Baudry, and V. Mishra, FPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques, 9th International Symposium on Engineering Secure Software and Systems, 2017.
DOI : 10.14722/ndss.2017.23152

URL : https://hal.archives-ouvertes.fr/hal-01527580

P. Laperdrix, W. Rudametkin, and B. Baudry, Mitigating Browser Fingerprint Tracking: Multi-level Reconfiguration and Diversification, 2015 IEEE/ACM 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2015.
DOI : 10.1109/SEAMS.2015.18

URL : https://hal.archives-ouvertes.fr/hal-01121108

P. Laperdrix, W. Rudametkin, and B. Baudry, Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints, 2016 IEEE Symposium on Security and Privacy (SP), 2016.
DOI : 10.1109/SP.2016.57

URL : https://hal.archives-ouvertes.fr/hal-01285470

R. Mccarney, J. Warner, S. Iliffe, R. Van-haselen, M. Griffin et al., The Hawthorne Effect: a randomised, controlled trial, BMC Medical Research Methodology, vol.344, issue.3, p.30, 2007.
DOI : 10.1056/NEJM200105243442106

K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham, Fingerprinting Information in JavaScript Implementations, Proceedings of W2SP 2011, 2011.

K. Mowery and H. Shacham, Pixel Perfect: Fingerprinting Canvas in HTML5, Proceedings of W2SP 2012, 2012.

M. Mulazzani, P. Reschl, M. Huber, M. Leithner, and S. Schrittwieser, Edgar Weippl, and FH Campus Wien. 2013. Fast and reliable browser identification with javascript engine fingerprinting, Web 2.0 Workshop on Security and Privacy (W2SP)

N. Nikiforakis, W. Joosen, and B. Livshits, PriVaricator, Proceedings of the 24th International Conference on World Wide Web, WWW '15, pp.820-830, 2015.
DOI : 10.1109/SP.2011.23

N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens et al., Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy, pp.541-555, 2013.
DOI : 10.1109/SP.2013.43

?. Olejnik, G. Acar, C. Castelluccia, and C. Diaz, The Leaking Battery, pp.254-263, 2016.
DOI : 10.1109/SP.2013.43

L. Olejnik, S. Englehardt, and A. Narayanan, Battery Status Not Included: Assessing Privacy in Web Standards, 3rd International Workshop on Privacy Engineering (IWPE'17), 2017.

I. Sanchez-rola, I. Santos, and D. Balzarotti, Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies, 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, 2017.

J. Schuh, Saying Goodbye to Our Old Friend NPAPI, 2013.

A. Sjösten, S. Van-acker, and A. Sabelfeld, Discovering Browser Extensions via Web Accessible Resources, Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY '17, 2017.
DOI : 10.1145/2701126.2701210

J. Spooren, D. Preuveneers, and W. Joosen, Mobile device fingerprinting considered harmful for risk-based authentication, Proceedings of the Eighth European Workshop on System Security, EuroSec '15, 2015.
DOI : 10.1007/978-3-642-19125-1_7

O. Starov and N. Nikiforakis, XHOUND: Quantifying the Fingerprintability of Browser Extensions, 2017 IEEE Symposium on Security and Privacy (SP), 2017.
DOI : 10.1109/SP.2017.18

A. Vastel, P. Laperdrix, W. Rudametkin, and R. Rouvoy, FP-STALKER: Tracking Browser Fingerprint Evolutions, 39th IEEE Symposium on Security and Privacy, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01652021

W. Wu, J. Wu, Y. Wang, Z. Ling, and M. Yang, Efficient Fingerprinting-Based Android Device Identification With Zero-Permission Identifiers, IEEE Access, vol.4, pp.8073-8083, 2016.
DOI : 10.1109/ACCESS.2016.2626395