, 2) height, 3) availWidth, 4) availHeight, 5) availTop, 6) availLeft, 7) colorDepth, 8) pixelDepth

. Activexobject, 2) webdriver, 3) domAutomation, 4) domAutomationController, 5) callPhantom, 6) spawn, 7) emit, 8) Buffer, 9) awesomium

I. Selenium and . Recorder,

, 2) createOscillator, 3) createGain, 4) createScriptProcessor, 5) createDynamicsCompressor, 6) copyFromChannel, 7) getChannelData, 8) getFloatFrequencyData, 9) getByteFrequencyData

, getParameter, 2) getSupportedExtensions, 3) getContextAttributes, 4) getShaderPrecisionFormat, 5) getExtension, 6) readPixels, 7) getUniformLocation

, toDataURL, 2) toBlob, 3) getImageData, 4) getLineDash, 5) measureText, 6) isPointInPath

, WebRTC methods

, createOffer, 2) createAnswer, 3) setLocalDescription

, Date.getTimezoneOffset, 2) SVGTextContentElement.getComputedTextLength REFERENCES

, Online captcha solving and image recognition service, 2018.

G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gürses et al., Fpdetective: dusting the web for fingerprinters, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp.1129-1140, 2013.

F. Alaca and P. C. Van-oorschot, Device fingerprinting for augmenting web authentication: classification and analysis of methods, Proceedings of the 32nd Annual Conference on Computer Security Applications, pp.289-301, 2016.

B. Anderson and D. Mcgrew, Os fingerprinting: New techniques and a study of information gain and obfuscation, 2017 IEEE Conference on Communications and Network Security (CNS), pp.1-9, 2017.

A. Balla, A. Stassopoulou, and M. D. Dikaiakos, Real-time web crawler detection, Telecommunications (ICT), 2011 18th International Conference on, pp.428-432, 2011.

B. Bernard, Web scraping and crawling are perfectly legal, right?, 2018.

K. Bock, D. Patel, G. Hughey, and D. Levin, uncaptcha: a low-resource defeat of recaptcha's audio challenge, Proceedings of the 11th USENIX Conference on Offensive Technologies. USENIX Association, pp.7-7, 2017.

L. Brotherson, Tls fingerprinting, 2015.

E. Bursztein, A. Malyshev, T. Pietraszek, and K. Thomas, Picasso: Lightweight device class fingerprinting for web clients, Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, pp.93-102, 2016.

A. C. , Anti captcha: captcha solving service. bypass recaptcha, funcaptcha, image captcha, 2018.

Z. Chu, S. Gianvecchio, A. Koehl, H. Wang, and S. Jajodia, Blog or block: Detecting blog bots through behavioral biometrics, Computer Networks, vol.57, issue.3, pp.634-646, 2013.

S. C. Commons, Complaint for violation of the computer fraud and abuse act, 2016.

A. Deveria, Support of advanced audio coding format, 2019.

-. , Support of mp3 audio format, 2019.

-. , Support of mutation observers, 2019.

-. , Support of ogg vorbis audio format, 2019.

-. , Support of typed arrays, 2019.

-. , Support of waveform audio file format, 2019.

M. W. Docs, Permissions api, 2018.

P. Eckersley, How unique is your web browser, in International Symposium on Privacy Enhancing Technologies Symposium, pp.1-18, 2010.

E. Eelmaa, Can a website detect when you are using selenium with chromedriver?, 2016.

S. Englehardt and A. Narayanan, Online tracking: A 1-million-site measurement and analysis, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.1388-1401, 2016.

D. Fifield and S. Egelman, Fingerprinting web users through font metrics, International Conference on Financial Cryptography and Data Security, pp.107-124, 2015.

S. Frolov and E. Wustrow, The use of TLS in censorship circumvention, Network and Distributed System Security. The Internet Society, 2019.

A. Gómez-boix, P. Laperdrix, and B. Baudry, Hiding in the crowd: an analysis of the effectiveness of browser fingerprinting at large scale, WWW 2018: The 2018 Web Conference, 2018.

. Google, Issue 775911 in chromium: missing accept languages in request for headless mode, 2017.

-. , , 2019.

A. Hidayat, Phantomjs -scriptable headless browser, 2019.

G. Ho, D. Boneh, L. Ballard, and N. Provos, Tick tock: Building browser red pills from timing side channels, WOOT, 2014.

A. Inc, ios sdk release notes for ios 8.0 gm, 2014.

I. Incapsula, Bot traffic report, 2014.

, Bot traffic report, 2016.

G. Jacob and C. Kruegel, PUB CRAWL : Protecting Users and Businesses from CRAWLers, 2009.

H. Jonker, B. Krumnow, and G. Vlot, Fingerprint surface-based detection of web bot detectors, European Symposium on Research in Computer Security, pp.586-605, 2019.

J. Jueckstock and A. Kapravelos, Visiblev8: In-browser monitoring of javascript in the wild, Proceedings of the Internet Measurement Conference, pp.393-405, 2019.

P. Laperdrix, W. Rudametkin, and B. Baudry, Beauty and the beast: Diverting modern web browsers to build unique browser fingerprints, Security and Privacy (SP), 2016 IEEE Symposium on, pp.878-894, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01285470

X. Mi, Y. Liu, X. Feng, X. Liao, B. Liu et al., Resident evil: Understanding residential ip proxy as a dark service," in Resident Evil: Understanding Residential IP Proxy as a Dark Service, IEEE, p.0, 2019.

M. Monperrus, Crawler-user-agents, 2019.

K. Mowery and H. Shacham, Pixel perfect: Fingerprinting canvas in html5, Proceedings of W2SP, pp.1-12, 2012.

M. Mulazzani, P. Reschl, M. Huber, M. Leithner, S. Schrittwieser et al., Fast and reliable browser identification with javascript engine fingerprinting, Web 2.0 Workshop on Security and Privacy (W2SP), vol.5, 2013.

D. Networks, 2018 bad bot report, 2018.

N. Nikiforakis, W. Joosen, and B. Livshits, Privaricator: Deceiving fingerprinters with little white lies, Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, pp.820-830, 2015.

N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens et al., Cookieless monster: Exploring the ecosystem of webbased device fingerprinting, Security and privacy (SP), 2013 IEEE symposium on, pp.541-555, 2013.

D. Preuveneers and W. Joosen, Smartauth: dynamic context fingerprinting for continuous user authentication, Proceedings of the 30th Annual ACM Symposium on Applied Computing, pp.2185-2191, 2015.

. Quora, Is scraping and crawling to collect data illegal?

T. Saito, K. Takahashi, K. Yasuda, T. Ishikawa, K. Takasu et al., OS and Application Identification by Installed Fonts, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp.684-689, 2016.

M. Schwarz, F. Lackner, and D. Gruss, Javascript template attacks: Automatically inferring host information for targeted exploits, NDSS, 2019.

S. Shekyan, Detecting phantomjs based visitors, 2015.

S. Sivakorn, J. Polakis, and A. D. Keromytis, I'm not a human: Breaking the google recaptcha

M. Smart, G. R. Malan, and F. Jahanian, Defeating tcp/ip stack fingerprinting, Usenix Security Symposium, 2000.

A. Stassopoulou and M. D. Dikaiakos, Web robot detection: A probabilistic reasoning approach, Computer Networks, vol.53, issue.3, pp.265-278, 2009.

D. Stevanovic, A. An, and N. Vlajic, Feature evaluation for web crawler detection with data mining techniques, Expert Systems with Applications, vol.39, issue.10, pp.8707-8717, 2012.

C. B. Tracker, Support webgl in headless, 2016.

T. Unger, M. Mulazzani, D. Fruhwirt, M. Huber, S. Schrittwieser et al., Shpf: Enhancing http (s) session security with browser fingerprinting, Availability, Reliability and Security, p.2013

, Eighth International Conference on, pp.255-261, 2013.

V. Vasilyev, Modern and flexible browser fingerprinting library, 2019.

A. Vastel, Detecting chrome headless, 2017.

A. Vastel, P. Laperdrix, W. Rudametkin, and R. Rouvoy, Fp-scanner: The privacy implications of browser fingerprint inconsistencies, Proceedings of the 27th USENIX Security Symposium, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01820197

, IEEE S&P 2018-39th IEEE Symposium on Security and Privacy, pp.1-14, 2018.

L. Von-ahn, M. Blum, N. J. Hopper, and J. Langford, Captcha: Using hard ai problems for security, International Conference on the Theory and Applications of Cryptographic Techniques, pp.294-311, 2003.

G. Wang, T. Konolige, C. Wilson, X. Wang, H. Zheng et al., You are how you click: Clickstream analysis for sybil detection, USENIX Security Symposium, vol.9, pp.1-008, 2013.

. Wikipedia, Craigslist inc. v. 3taps inc, 2013.

M. Zalewski, , pp.0-3, 2019.

J. Zhang, A. Chivukula, M. Bailey, M. Karir, and M. Liu, Characterization of blacklists and tainted network traffic, International Conference on Passive and Active Network Measurement, pp.218-228, 2013.