Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting

The web has become an essential part of our society and is currently the main medium of information delivery. Billions of users browse the web on a daily basis, and there are single websites that have reached over one billion user accounts. In this environment, the ability to track users and their o...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 555
container_issue
container_start_page 541
container_title
container_volume
creator Nikiforakis, N.
Kapravelos, A.
Joosen, W.
Kruegel, C.
Piessens, F.
Vigna, G.
description The web has become an essential part of our society and is currently the main medium of information delivery. Billions of users browse the web on a daily basis, and there are single websites that have reached over one billion user accounts. In this environment, the ability to track users and their online habits can be very lucrative for advertising companies, yet very intrusive for the privacy of users. In this paper, we examine how web-based device fingerprinting currently works on the Internet. By analyzing the code of three popular browser-fingerprinting code providers, we reveal the techniques that allow websites to track users without the need of client-side identifiers. Among these techniques, we show how current commercial fingerprinting approaches use questionable practices, such as the circumvention of HTTP proxies to discover a user's real IP address and the installation of intrusive browser plugins. At the same time, we show how fragile the browser ecosystem is against fingerprinting through the use of novel browser-identifying techniques. With so many different vendors involved in browser development, we demonstrate how one can use diversions in the browsers' implementation to distinguish successfully not only the browser-family, but also specific major and minor versions. Browser extensions that help users spoof the user-agent of their browsers are also evaluated. We show that current commercial approaches can bypass the extensions, and, in addition, take advantage of their shortcomings by using them as additional fingerprinting features.
doi_str_mv 10.1109/SP.2013.43
format Conference Proceeding
fullrecord <record><control><sourceid>ieee</sourceid><recordid>TN_cdi_ieee_primary_6547132</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6547132</ieee_id><sourcerecordid>6547132</sourcerecordid><originalsourceid>FETCH-LOGICAL-c318t-4317b35b23aa5a2b669100d76318a5908d6cf232360414ca22553544e7bfa9933</originalsourceid><addsrcrecordid>eNotjUlPwzAQhc0mUUovXLn4D6TMeLzE3KC0gFQWCRDHykknEEibKo4Q_fdYwOk96XuLECcIY0TwZ0-PYwVIY007YuRdDs56o71zelcMFDmToQK398tQW0cWrc33xQAhx8wC4qE4ivEDQAF5PRD3k7b9rLnhGOVdu449d-dy-r1p2q5ev8n-neW0bOM2gZVsK_nKRXYZIi_lFX_VJctZinG3Sek-uWNxUIUm8uhfh-JlNn2e3GTzh-vbycU8KwnzPtOEriBTKArBBFVY6xFg6WyiwXjIl7asFCmyoFGXQSljyGjNrqiC90RDcfq3WzPzIr2vQrddWKMdptYP13pQFg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><source>IEEE Electronic Library (IEL)</source><creator>Nikiforakis, N. ; Kapravelos, A. ; Joosen, W. ; Kruegel, C. ; Piessens, F. ; Vigna, G.</creator><creatorcontrib>Nikiforakis, N. ; Kapravelos, A. ; Joosen, W. ; Kruegel, C. ; Piessens, F. ; Vigna, G.</creatorcontrib><description>The web has become an essential part of our society and is currently the main medium of information delivery. Billions of users browse the web on a daily basis, and there are single websites that have reached over one billion user accounts. In this environment, the ability to track users and their online habits can be very lucrative for advertising companies, yet very intrusive for the privacy of users. In this paper, we examine how web-based device fingerprinting currently works on the Internet. By analyzing the code of three popular browser-fingerprinting code providers, we reveal the techniques that allow websites to track users without the need of client-side identifiers. Among these techniques, we show how current commercial fingerprinting approaches use questionable practices, such as the circumvention of HTTP proxies to discover a user's real IP address and the installation of intrusive browser plugins. At the same time, we show how fragile the browser ecosystem is against fingerprinting through the use of novel browser-identifying techniques. With so many different vendors involved in browser development, we demonstrate how one can use diversions in the browsers' implementation to distinguish successfully not only the browser-family, but also specific major and minor versions. Browser extensions that help users spoof the user-agent of their browsers are also evaluated. We show that current commercial approaches can bypass the extensions, and, in addition, take advantage of their shortcomings by using them as additional fingerprinting features.</description><identifier>ISSN: 1081-6011</identifier><identifier>ISBN: 9781467361668</identifier><identifier>ISBN: 1467361666</identifier><identifier>EISSN: 2375-1207</identifier><identifier>EISBN: 9780769549774</identifier><identifier>EISBN: 0769549772</identifier><identifier>DOI: 10.1109/SP.2013.43</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>browser extensions ; Browsers ; Companies ; device identification ; Feature extraction ; Fingerprint recognition ; fingerprinting ; Internet ; IP networks ; Servers</subject><ispartof>2013 IEEE Symposium on Security and Privacy, 2013, p.541-555</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c318t-4317b35b23aa5a2b669100d76318a5908d6cf232360414ca22553544e7bfa9933</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6547132$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>309,310,776,780,785,786,792,2052,27902,54733,54895</link.rule.ids></links><search><creatorcontrib>Nikiforakis, N.</creatorcontrib><creatorcontrib>Kapravelos, A.</creatorcontrib><creatorcontrib>Joosen, W.</creatorcontrib><creatorcontrib>Kruegel, C.</creatorcontrib><creatorcontrib>Piessens, F.</creatorcontrib><creatorcontrib>Vigna, G.</creatorcontrib><title>Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting</title><title>2013 IEEE Symposium on Security and Privacy</title><addtitle>SECPRI</addtitle><description>The web has become an essential part of our society and is currently the main medium of information delivery. Billions of users browse the web on a daily basis, and there are single websites that have reached over one billion user accounts. In this environment, the ability to track users and their online habits can be very lucrative for advertising companies, yet very intrusive for the privacy of users. In this paper, we examine how web-based device fingerprinting currently works on the Internet. By analyzing the code of three popular browser-fingerprinting code providers, we reveal the techniques that allow websites to track users without the need of client-side identifiers. Among these techniques, we show how current commercial fingerprinting approaches use questionable practices, such as the circumvention of HTTP proxies to discover a user's real IP address and the installation of intrusive browser plugins. At the same time, we show how fragile the browser ecosystem is against fingerprinting through the use of novel browser-identifying techniques. With so many different vendors involved in browser development, we demonstrate how one can use diversions in the browsers' implementation to distinguish successfully not only the browser-family, but also specific major and minor versions. Browser extensions that help users spoof the user-agent of their browsers are also evaluated. We show that current commercial approaches can bypass the extensions, and, in addition, take advantage of their shortcomings by using them as additional fingerprinting features.</description><subject>browser extensions</subject><subject>Browsers</subject><subject>Companies</subject><subject>device identification</subject><subject>Feature extraction</subject><subject>Fingerprint recognition</subject><subject>fingerprinting</subject><subject>Internet</subject><subject>IP networks</subject><subject>Servers</subject><issn>1081-6011</issn><issn>2375-1207</issn><isbn>9781467361668</isbn><isbn>1467361666</isbn><isbn>9780769549774</isbn><isbn>0769549772</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><recordid>eNotjUlPwzAQhc0mUUovXLn4D6TMeLzE3KC0gFQWCRDHykknEEibKo4Q_fdYwOk96XuLECcIY0TwZ0-PYwVIY007YuRdDs56o71zelcMFDmToQK398tQW0cWrc33xQAhx8wC4qE4ivEDQAF5PRD3k7b9rLnhGOVdu449d-dy-r1p2q5ev8n-neW0bOM2gZVsK_nKRXYZIi_lFX_VJctZinG3Sek-uWNxUIUm8uhfh-JlNn2e3GTzh-vbycU8KwnzPtOEriBTKArBBFVY6xFg6WyiwXjIl7asFCmyoFGXQSljyGjNrqiC90RDcfq3WzPzIr2vQrddWKMdptYP13pQFg</recordid><startdate>201305</startdate><enddate>201305</enddate><creator>Nikiforakis, N.</creator><creator>Kapravelos, A.</creator><creator>Joosen, W.</creator><creator>Kruegel, C.</creator><creator>Piessens, F.</creator><creator>Vigna, G.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>ESBDL</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201305</creationdate><title>Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting</title><author>Nikiforakis, N. ; Kapravelos, A. ; Joosen, W. ; Kruegel, C. ; Piessens, F. ; Vigna, G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c318t-4317b35b23aa5a2b669100d76318a5908d6cf232360414ca22553544e7bfa9933</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>browser extensions</topic><topic>Browsers</topic><topic>Companies</topic><topic>device identification</topic><topic>Feature extraction</topic><topic>Fingerprint recognition</topic><topic>fingerprinting</topic><topic>Internet</topic><topic>IP networks</topic><topic>Servers</topic><toplevel>online_resources</toplevel><creatorcontrib>Nikiforakis, N.</creatorcontrib><creatorcontrib>Kapravelos, A.</creatorcontrib><creatorcontrib>Joosen, W.</creatorcontrib><creatorcontrib>Kruegel, C.</creatorcontrib><creatorcontrib>Piessens, F.</creatorcontrib><creatorcontrib>Vigna, G.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Open Access Journals</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nikiforakis, N.</au><au>Kapravelos, A.</au><au>Joosen, W.</au><au>Kruegel, C.</au><au>Piessens, F.</au><au>Vigna, G.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting</atitle><btitle>2013 IEEE Symposium on Security and Privacy</btitle><stitle>SECPRI</stitle><date>2013-05</date><risdate>2013</risdate><spage>541</spage><epage>555</epage><pages>541-555</pages><issn>1081-6011</issn><eissn>2375-1207</eissn><isbn>9781467361668</isbn><isbn>1467361666</isbn><eisbn>9780769549774</eisbn><eisbn>0769549772</eisbn><coden>IEEPAD</coden><abstract>The web has become an essential part of our society and is currently the main medium of information delivery. Billions of users browse the web on a daily basis, and there are single websites that have reached over one billion user accounts. In this environment, the ability to track users and their online habits can be very lucrative for advertising companies, yet very intrusive for the privacy of users. In this paper, we examine how web-based device fingerprinting currently works on the Internet. By analyzing the code of three popular browser-fingerprinting code providers, we reveal the techniques that allow websites to track users without the need of client-side identifiers. Among these techniques, we show how current commercial fingerprinting approaches use questionable practices, such as the circumvention of HTTP proxies to discover a user's real IP address and the installation of intrusive browser plugins. At the same time, we show how fragile the browser ecosystem is against fingerprinting through the use of novel browser-identifying techniques. With so many different vendors involved in browser development, we demonstrate how one can use diversions in the browsers' implementation to distinguish successfully not only the browser-family, but also specific major and minor versions. Browser extensions that help users spoof the user-agent of their browsers are also evaluated. We show that current commercial approaches can bypass the extensions, and, in addition, take advantage of their shortcomings by using them as additional fingerprinting features.</abstract><pub>IEEE</pub><doi>10.1109/SP.2013.43</doi><tpages>15</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1081-6011
ispartof 2013 IEEE Symposium on Security and Privacy, 2013, p.541-555
issn 1081-6011
2375-1207
language eng
recordid cdi_ieee_primary_6547132
source IEEE Electronic Library (IEL) Conference Proceedings; IEEE Electronic Library (IEL)
subjects browser extensions
Browsers
Companies
device identification
Feature extraction
Fingerprint recognition
fingerprinting
Internet
IP networks
Servers
title Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T06%3A21%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Cookieless%20Monster:%20Exploring%20the%20Ecosystem%20of%20Web-Based%20Device%20Fingerprinting&rft.btitle=2013%20IEEE%20Symposium%20on%20Security%20and%20Privacy&rft.au=Nikiforakis,%20N.&rft.date=2013-05&rft.spage=541&rft.epage=555&rft.pages=541-555&rft.issn=1081-6011&rft.eissn=2375-1207&rft.isbn=9781467361668&rft.isbn_list=1467361666&rft.coden=IEEPAD&rft_id=info:doi/10.1109/SP.2013.43&rft_dat=%3Cieee%3E6547132%3C/ieee%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780769549774&rft.eisbn_list=0769549772&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6547132&rfr_iscdi=true