Analysis of Paradoxes in Fingerprint Countermeasures

Show simple item record

dc.contributor.author Andalibi, Vafa
dc.contributor.author Christophe, Francois
dc.contributor.author Mikkonen, Tommi
dc.date.accessioned 2018-02-09T19:02:02Z
dc.date.available 2018-02-09T19:02:02Z
dc.date.issued 2017-11-10
dc.identifier.citation Andalibi , V , Christophe , F & Mikkonen , T 2017 , Analysis of Paradoxes in Fingerprint Countermeasures . in Proceedings of the 21st Conference of Open Innovations Association FRUCT, University of Helsinki, Helsinki, Finland . FRUCT Oy , pp. 398-401 , Conference of Open Innovations Association , Helsinki , Finland , 06/11/2017 .
dc.identifier.citation conference
dc.identifier.other PURE: 94381443
dc.identifier.other PURE UUID: 22a5d2d5-9267-4e77-871d-2c900d1ed044
dc.identifier.other ORCID: /0000-0002-8540-9918/work/80947022
dc.identifier.uri http://hdl.handle.net/10138/232259
dc.description.abstract The widespread usage of new user tracking methods, i.e. web-based fingerprinting, is becoming a serious privacy concern as third parties try to track users across different websites. Meanwhile, it is usually difficult or impossible for users to opt-out fingerprinting if they want to fully benefit the services provided by the application or website. Several studies tried to address the privacy issue in browser fingerprinting, mostly by faking attribute values. However, such configuration spoofing may lead to inconsistencies that paradoxically make the user stand out even more. This study analyzes these paradoxes in browser configuration with the creation of a Markov model based on a test dataset. Given a target spoofed attribute, the implemented tool in this study outputs the other attributes that must be consequently altered, not to cause paradoxical configuration. Similarly, this tool can suggest a set of random attributes to be spoofed with suggested values, not creating a paradoxical configuration. The tool Implemented in this study can be used by browser extension developers and should help them spoof browser attributes more sophistically, thus preservingusers' privacy against cross-site web-based browser fingerprinting. en
dc.language.iso eng
dc.publisher FRUCT Oy
dc.relation.ispartof Proceedings of the 21st Conference of Open Innovations Association FRUCT, University of Helsinki, Helsinki, Finland
dc.relation.isversionof 978-952-68653-2-4
dc.rights cc_by_nd
dc.rights.uri info:eu-repo/semantics/openAccess
dc.subject 113 Computer and information sciences
dc.title Analysis of Paradoxes in Fingerprint Countermeasures en
dc.type Conference contribution
dc.contributor.organization Department of Computer Science
dc.contributor.organization Empirical Software Engineering research group / Tomi Männistö
dc.description.reviewstatus Peer reviewed
dc.rights.accesslevel openAccess
dc.type.version publishedVersion

Files in this item

Total number of downloads: Loading...

Files Size Format View
And.pdf 569.0Kb PDF View/Open

This item appears in the following Collection(s)

Show simple item record