File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting

TitleEvaluating private modes in desktop and mobile browsers and their resistance to fingerprinting
Authors
Keywordsbrowsing history
fingerprint
private mode
statistics
Issue Date2017
Citation
2017 IEEE Conference on Communications and Network Security, CNS 2017, 2017, v. 2017-January, p. 1-9 How to Cite?
AbstractModern browsers implement private mode to protect user privacy. However, they do not agree on what protection private mode should provide. We performed the first study on comparing private modes in popular desktop and mobile browsers and found many inconsistencies between different browsers and between the desktop and mobile versions of the same browser. We show that some inconsistencies result from the tradeoff between security and privacy. However, even if private mode leaks no information about the user, the attacker could still track the user by fingerprinting the browser. Recent work suggested that a browser could report randomized configurations, such as font sizes and installed plugins, to defeat fingerprinting. To show that randomizing configuration reports is insecure, we propose an attack that estimates the true configuration based on statistical methods. We demonstrated that this attack was easy and effective.
Persistent Identifierhttp://hdl.handle.net/10722/346667

 

DC FieldValueLanguage
dc.contributor.authorWu, Yuanyi-
dc.contributor.authorMeng, Dongyu-
dc.contributor.authorChen, Hao-
dc.date.accessioned2024-09-17T04:12:27Z-
dc.date.available2024-09-17T04:12:27Z-
dc.date.issued2017-
dc.identifier.citation2017 IEEE Conference on Communications and Network Security, CNS 2017, 2017, v. 2017-January, p. 1-9-
dc.identifier.urihttp://hdl.handle.net/10722/346667-
dc.description.abstractModern browsers implement private mode to protect user privacy. However, they do not agree on what protection private mode should provide. We performed the first study on comparing private modes in popular desktop and mobile browsers and found many inconsistencies between different browsers and between the desktop and mobile versions of the same browser. We show that some inconsistencies result from the tradeoff between security and privacy. However, even if private mode leaks no information about the user, the attacker could still track the user by fingerprinting the browser. Recent work suggested that a browser could report randomized configurations, such as font sizes and installed plugins, to defeat fingerprinting. To show that randomizing configuration reports is insecure, we propose an attack that estimates the true configuration based on statistical methods. We demonstrated that this attack was easy and effective.-
dc.languageeng-
dc.relation.ispartof2017 IEEE Conference on Communications and Network Security, CNS 2017-
dc.subjectbrowsing history-
dc.subjectfingerprint-
dc.subjectprivate mode-
dc.subjectstatistics-
dc.titleEvaluating private modes in desktop and mobile browsers and their resistance to fingerprinting-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/CNS.2017.8228636-
dc.identifier.scopuseid_2-s2.0-85046545398-
dc.identifier.volume2017-January-
dc.identifier.spage1-
dc.identifier.epage9-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats