Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Entropy-based Thresholds

View through CrossRef
Browser fingerprinting is an effective technique to track web users by building a fingerprint from their browser attributes. It is also stealthy because the tracker uses legitimate JavaScript API calls offered by the browser engine, which can be obfuscated before they are sent to a (third-party) server. Current browser fingerprinting methodologies employ coarse-grained collection and classification techniques, such as binary classification of fingerprinters based on the number of non-obfuscated exfiltrated attributes. As a result, they produce inconsistent findings. Meanwhile, the privacy of millions of web users is at risk daily. We address this gap by presenting FP-tracer, a novel methodology to detect and classify browser fingerprinters based on dynamic taint tracking and joint entropy classification. Our methodology enables detecting first- and third-party fingerprinters even when they use obfuscation by tainting attributes, propagating them, and logging when they are leaked (via 62 sources and 25 sinks). Moreover, it discriminates the invasiveness of fingerprinting activities, even from the same service, by measuring the joint entropy of the collected attributes and clustering them. We implement FP-tracer by extending Foxhound, a privacy-oriented Firefox fork with numeric type tainting, more taint tracking sources and sinks, support for multiple sources, and better logging capabilities. We embed our implementation in our automated crawling infrastructure, which is capable of testing websites in parallel using programmable and reproducible logic. We will open-source our implementation. We evaluate FP-tracer by performing a large-scale crawl over the Tranco Top 100K, and detect, amongst others, audio, canvas, and storage fingerprinting on the web. Among others, we find high fingerprinting activities in 8% of domains, with more moderate activity reaching 75%. Notably, fingerprinting is almost five times more likely to be performed by third-party scripts for high activity levels. In addition, we measure that the most severe category of fingerprinting obfuscates 46% of transmitted attributes, and 38% of fingerprinters involve two or more domains. Finally, we find that existing consent banners do not provide an effective defense against browser fingerprinting
Title: FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Entropy-based Thresholds
Description:
Browser fingerprinting is an effective technique to track web users by building a fingerprint from their browser attributes.
It is also stealthy because the tracker uses legitimate JavaScript API calls offered by the browser engine, which can be obfuscated before they are sent to a (third-party) server.
Current browser fingerprinting methodologies employ coarse-grained collection and classification techniques, such as binary classification of fingerprinters based on the number of non-obfuscated exfiltrated attributes.
As a result, they produce inconsistent findings.
Meanwhile, the privacy of millions of web users is at risk daily.
We address this gap by presenting FP-tracer, a novel methodology to detect and classify browser fingerprinters based on dynamic taint tracking and joint entropy classification.
Our methodology enables detecting first- and third-party fingerprinters even when they use obfuscation by tainting attributes, propagating them, and logging when they are leaked (via 62 sources and 25 sinks).
Moreover, it discriminates the invasiveness of fingerprinting activities, even from the same service, by measuring the joint entropy of the collected attributes and clustering them.
We implement FP-tracer by extending Foxhound, a privacy-oriented Firefox fork with numeric type tainting, more taint tracking sources and sinks, support for multiple sources, and better logging capabilities.
We embed our implementation in our automated crawling infrastructure, which is capable of testing websites in parallel using programmable and reproducible logic.
We will open-source our implementation.
We evaluate FP-tracer by performing a large-scale crawl over the Tranco Top 100K, and detect, amongst others, audio, canvas, and storage fingerprinting on the web.
Among others, we find high fingerprinting activities in 8% of domains, with more moderate activity reaching 75%.
Notably, fingerprinting is almost five times more likely to be performed by third-party scripts for high activity levels.
In addition, we measure that the most severe category of fingerprinting obfuscates 46% of transmitted attributes, and 38% of fingerprinters involve two or more domains.
Finally, we find that existing consent banners do not provide an effective defense against browser fingerprinting.

Related Results

XFP-recognizer: detecting cross-file browser fingerprinting
XFP-recognizer: detecting cross-file browser fingerprinting
Abstract In recent years, the evolving browser fingerprinting technology has posed significant challenges and constant demands on detection methods. Research related to m...
PERBANDINGAN KINERJA BROWSER PADA PEMANFAATAN ANIMASI SVG (SCALABLE VECTOR GRAPHIC)
PERBANDINGAN KINERJA BROWSER PADA PEMANFAATAN ANIMASI SVG (SCALABLE VECTOR GRAPHIC)
Penggunaan Motion Graphic (MG) tidak hanya dugunakan sebagai sarana media seni, namun perkembanganya MG dapat dimanfaatakan di berbagai bidang. Baik bidang pendidikan, periklanan, ...
Reservoir Architecture and Fluid Connectivity in an Abu Dhabi Oil Accumulation
Reservoir Architecture and Fluid Connectivity in an Abu Dhabi Oil Accumulation
Summary Developing an understanding of reservoir architecture and fluid connectivity is a challenging, but essential task for well, reservoir and facilities manageme...
Diffusion and Ion Conduction in Cation-Conducting Oxide Glasses
Diffusion and Ion Conduction in Cation-Conducting Oxide Glasses
In this Chapter we review knowledge about diffusion and cation conduction in oxide glasses. We first remind the reader in Section 1 of major aspects of the glassy state and recall ...
Web Service Access Control Based on Browser Fingerprint Detection
Web Service Access Control Based on Browser Fingerprint Detection
Web services have covered all areas of social life, and various browsers have become necessary software on computers and mobile phones, and they are also the entrances to Web servi...
Is a Fitbit a Diary? Self-Tracking and Autobiography
Is a Fitbit a Diary? Self-Tracking and Autobiography
Data becomes something of a mirror in which people see themselves reflected. (Sorapure 270)In a 2014 essay for The New Yorker, the humourist David Sedaris recounts an obsession spu...
EGFR TKI PET/CT in advanced stage non-small cell lung cancer patients
EGFR TKI PET/CT in advanced stage non-small cell lung cancer patients
An overview of biomarker development is provided in chapter 2.PET tracer-based biomarkers can be used to monitor different biological or clinical metrics. A clinically important bi...

Back to Top