Analysis of Paradoxes in Fingerprint Countermeasures

Show simple item record

dc.contributor University of Helsinki, Department of Computer Science en
dc.contributor University of Helsinki, Empirical Software Engineering research group / Tomi Männistö en
dc.contributor.author Andalibi, Vafa
dc.contributor.author Christophe, Francois
dc.contributor.author Mikkonen, Tommi
dc.date.accessioned 2018-02-09T19:02:02Z
dc.date.available 2018-02-09T19:02:02Z
dc.date.issued 2017-11-10
dc.identifier.citation Andalibi , V , Christophe , F & Mikkonen , T 2017 , Analysis of Paradoxes in Fingerprint Countermeasures . in Proceedings of the 21st Conference of Open Innovations Association FRUCT, University of Helsinki, Helsinki, Finland . FRUCT Oy , pp. 398-401 , Conference of Open Innovations Association , Helsinki , Finland , 06/11/2017 . en
dc.identifier.citation conference en
dc.identifier.isbn 978-952-68653-2-4
dc.identifier.other PURE: 94381443
dc.identifier.other PURE UUID: 22a5d2d5-9267-4e77-871d-2c900d1ed044
dc.identifier.other ORCID: /0000-0002-8540-9918/work/80947022
dc.identifier.uri http://hdl.handle.net/10138/232259
dc.description.abstract The widespread usage of new user tracking methods, i.e. web-based fingerprinting, is becoming a serious privacy concern as third parties try to track users across different websites. Meanwhile, it is usually difficult or impossible for users to opt-out fingerprinting if they want to fully benefit the services provided by the application or website. Several studies tried to address the privacy issue in browser fingerprinting, mostly by faking attribute values. However, such configuration spoofing may lead to inconsistencies that paradoxically make the user stand out even more. This study analyzes these paradoxes in browser configuration with the creation of a Markov model based on a test dataset. Given a target spoofed attribute, the implemented tool in this study outputs the other attributes that must be consequently altered, not to cause paradoxical configuration. Similarly, this tool can suggest a set of random attributes to be spoofed with suggested values, not creating a paradoxical configuration. The tool Implemented in this study can be used by browser extension developers and should help them spoof browser attributes more sophistically, thus preservingusers' privacy against cross-site web-based browser fingerprinting. en
dc.language.iso eng
dc.publisher FRUCT Oy
dc.relation.ispartof Proceedings of the 21st Conference of Open Innovations Association FRUCT, University of Helsinki, Helsinki, Finland
dc.rights en
dc.subject 113 Computer and information sciences en
dc.title Analysis of Paradoxes in Fingerprint Countermeasures en
dc.type Conference contribution
dc.type.uri info:eu-repo/semantics/other
dc.contributor.pbl
dc.contributor.pbl

Files in this item

Total number of downloads: Loading...

Files Size Format View
And.pdf 569.0Kb PDF View/Open

This item appears in the following Collection(s)

Show simple item record