, Pale Moon browser -Version 25.6.0 adds a canvas poisoning feature, 2015.
, Ship an emoji font on Windows XP-7, 2017.
, Canvas Defender -Firefox add-on that adds noise to a canvas element, 2018.
, Over a billion people's data was compromised, NordVPN, 2018.
, Two Factor Auth List -List of websites supporting two-factor authentication and the methods they use, 2018.
, User Authentication with OAuth, vol.2, issue.0, 2018.
The web never forgets: Persistent tracking mechanisms in the wild, CCS'14 ,
FPDetective: dusting the web for fingerprinters, CCS'13 ,
Device fingerprinting for augmenting web authentication: Classification and analysis of methods ,
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes, S&P'12 ,
Picasso: Lightweight device class fingerprinting for web clients, SPSM'16 ,
Cross-)Browser Fingerprinting via OS and Hardware Level Features, NDSS'17 ,
On Numbers and Games, 1976. ,
, Duo Labs: State of the Auth: Experiences and Perceptions of Multi-Factor Authentication
, How unique is your web browser? In: PETS'10
Online tracking: A 1-million-site measurement and analysis, CCS'16 ,
Hiding in the crowd: An analysis of the effectiveness of browser fingerprinting at large scale ,
FPRandom: Randomizing core browser objects to break advanced device fingerprinting techniques, ESSoS'17 ,
URL : https://hal.archives-ouvertes.fr/hal-01527580
Beauty and the Beast: Diverting modern web browsers to build unique browser fingerprints, S&P'16 ,
URL : https://hal.archives-ouvertes.fr/hal-01285470
Mitigating browser fingerprint tracking: multi-level reconfiguration and diversification, SEAMS'15 ,
URL : https://hal.archives-ouvertes.fr/hal-01121108
, Anatomy of Account Takeover, 2018.
Pixel perfect: Fingerprinting canvas in HTML5 ,
Fast and reliable browser identification with javascript engine fingerprinting, W2SP'13 ,
Privaricator: Deceiving fingerprinters with little white lies ,
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting, S&P'13 ,
LATEX GLOVES: Protecting Browser Extensions from Probing and Revelation Attacks, NDSS'19 ,
, What Is Morellian Analysis, 2016.
Clock Around the Clock: Time-Based Device Fingerprinting, CCS'18 ,
Extension breakdown: Security analysis of browsers extension resources control policies, USENIX Security'17 ,
A mathematical theory of communication, Bell system technical journal, vol.27, issue.3, pp.379-423, 1948. ,
Discovering Browser Extensions via Web Accessible Resources, CODASPY'17 ,
Mobile device fingerprinting considered harmful for risk-based authentication, EuroSec'15 ,
Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat ,
XHOUND: Quantifying the Fingerprintability of Browser Extensions, S&P'17 ,
FP-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies, USENIX Security'18 ,
URL : https://hal.archives-ouvertes.fr/hal-01820197
FP-STALKER: Tracking Browser Fingerprint Evolutions, S&P'18 ,
URL : https://hal.archives-ouvertes.fr/hal-01652021