• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 471
Next 10 →

unique is your web browser

by Peter Eckersley - In Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin
"... Abstract. We investigate the degree to which modern web browsers are subject to “device fingerprinting ” via the version and configuration information that they will transmit to websites upon request. We implemented one possible fingerprinting algorithm, and collected these fingerprints from a large ..."
Abstract - Cited by 95 (1 self) - Add to MetaCart
Abstract. We investigate the degree to which modern web browsers are subject to “device fingerprinting ” via the version and configuration information that they will transmit to websites upon request. We implemented one possible fingerprinting algorithm, and collected these fingerprints from a

Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting

by Martin Mulazzani, Markus Huber, Manuel Leithner, Sebastian Schrittwieser
"... Abstract—Web browsers are crucial software components in today’s usage of the Internet, but the reliable detection of whether a client is using a specific browser can still be considered a nontrivial problem. Reliable browser identification is crucial for online security and privacy e.g., regarding ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
browsers based on the underlying Javascript engine, which can be executed on the client side within a fraction of a second. Our method is three orders of magnitude faster than previous work on Javascript engine fingerprinting, and can be implemented with well below a few hundred lines of code. We show

Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting

by Martin Mulazzani, Markus Huber
"... Abstract. While web browsers are becoming more and more important in everyday life, the reliable detection of whether a client is using a specific browser is still a hard problem. So far, the UserAgent string is used, which is a self-reported string provided by the client. It is, however, not a secu ..."
Abstract - Add to MetaCart
algorithms to calculate minimal fingerprints for each of a given set of browsers to make fingerprinting as fast as possible. We evaluate the feasibility of our method with a survey and discuss the consequences for user privacy and security. This technique can be used to enhance state-of-the-art session

Augmented reality browser survey

by Jens Grubert, Tobias Langlotz, Raphaël Grasset , 2011
"... While mobile Augmented Reality (AR) browsers have become one of the major commercial AR application, real-world usage behaviour with this technology is still a widely unexplored area. We report on our findings from an online survey that we conducted on the topic and an analysis of mobile distributio ..."
Abstract - Cited by 13 (8 self) - Add to MetaCart
While mobile Augmented Reality (AR) browsers have become one of the major commercial AR application, real-world usage behaviour with this technology is still a widely unexplored area. We report on our findings from an online survey that we conducted on the topic and an analysis of mobile

Verified security for browser extensions

by Arjun Guha, Matthew Fredrikson, Benjamin Livshits, Nikhil Swamy - In IEEE Symposium on Security and Privacy , 2011
"... Abstract—Popup blocking, form filling, and many other features of modern web browsers were first introduced as thirdparty extensions. New extensions continue to enrich browsers in unanticipated ways. However, powerful extensions require capabilities, such as cross-domain network access and local sto ..."
Abstract - Cited by 44 (10 self) - Add to MetaCart
storage, which, if used improperly, pose a security risk. Several browsers try to limit extension capabilities, but an empirical survey we conducted shows that many extensions are overprivileged under existing mechanisms. This paper presents IBEX, a new framework for authoring, analyzing, verifying

A Survey on TCP-Friendly Congestion Control

by Jörg Widmer, Robert Denda, Martin Mauve - IEEE Network , 2001
"... New trends in communication, in particular the deployment of multicast and real-time audio/video streaming applications, are likely to increase the percentage of non-TCP traffic in the Internet. These applications rarely perform congestion control in a TCP-friendly manner, i.e., they do not share th ..."
Abstract - Cited by 137 (1 self) - Add to MetaCart
the available bandwidth fairly with applications built on TCP, such as web browsers, FTP- or email-clients. The Internet community strongly fears that the current evolution could lead to a congestion collapse and starvation of TCP traffic. For this reason, TCP-friendly protocols are being developed that behave

Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications

by Ting-fang Yen, Fabian Monrose, Michaelk. Reiter
"... Abstract. We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and from that host. Our techniques utilize connection records containing only the source and destination addresses ..."
Abstract - Cited by 14 (1 self) - Add to MetaCart
Abstract. We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and from that host. Our techniques utilize connection records containing only the source and destination addresses

Browser Randomisation against Fingerprinting: a Quantitative Information Flow Approach

by Frédéric Besson, Nataliia Bielova, Thomas Jensen
"... Abstract. Web tracking companies use device fingerprinting to distin-guish the users of the websites by checking the numerous properties of their machines and web browsers. One way to protect the users ’ pri-vacy is to make them switch between different machine and browser configurations. We propose ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract. Web tracking companies use device fingerprinting to distin-guish the users of the websites by checking the numerous properties of their machines and web browsers. One way to protect the users ’ pri-vacy is to make them switch between different machine and browser configurations. We

An Analysis of Private Browsing Modes in Modern Browsers

by Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh
"... We study the security and privacy of private browsing modes recently added to all major browsers. We first propose a clean definition of the goals of private browsing and survey its implementation in different browsers. We conduct a measurement study to determine how often it is used and on what cat ..."
Abstract - Cited by 56 (3 self) - Add to MetaCart
We study the security and privacy of private browsing modes recently added to all major browsers. We first propose a clean definition of the goals of private browsing and survey its implementation in different browsers. We conduct a measurement study to determine how often it is used and on what

1XSS-FP: Browser Fingerprinting using HTML Parser Quirks

by Abgrall Erwan, Yves Le Traon, Martin Monperrus, Sylvain Gombault, Mario Heiderich, Alain Ribault
"... Abstract—There are many scenarios in which inferring the type of a client browser is desirable, for instance to fight against session stealing. This is known as browser fingerprinting. This paper presents and evaluates a novel fingerprinting technique to determine the exact nature (browser type and ..."
Abstract - Add to MetaCart
Abstract—There are many scenarios in which inferring the type of a client browser is desirable, for instance to fight against session stealing. This is known as browser fingerprinting. This paper presents and evaluates a novel fingerprinting technique to determine the exact nature (browser type
Next 10 →
Results 1 - 10 of 471
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University