4.5 Article

A Large-scale Empirical Analysis of Browser Fingerprints Properties forWeb Authentication

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
News Item Computer Science, Hardware & Architecture

Dark Web's Doppelgangers Aim to Dupe Antifraud Systems

Paul Marks

COMMUNICATIONS OF THE ACM (2020)

Article Computer Science, Information Systems

Browser Fingerprinting

Pierre Laperdrix et al.

ACM Transactions on the Web (2020)

Proceedings Paper Computer Science, Information Systems

FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms

Nampoina Andriamilanto et al.

36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020) (2020)

Proceedings Paper Computer Science, Information Systems

Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting

Soroush Karami et al.

27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) (2020)

Article Computer Science, Theory & Methods

Security of Distance-Bounding: A Survey

Gildas Avoine et al.

ACM COMPUTING SURVEYS (2019)

Proceedings Paper Computer Science, Information Systems

Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild

Stephan Wiefling et al.

ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019 (2019)

Proceedings Paper Computer Science, Theory & Methods

A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks

Francesco Marcantoni et al.

WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019) (2019)

Proceedings Paper Computer Science, Theory & Methods

SWAT: Seamless Web Authentication Technology

Florentin Rochet et al.

WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019) (2019)

Proceedings Paper Computer Science, Software Engineering

Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting

Pierre Laperdrix et al.

DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT (DIMVA 2019) (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Hiding in the Crowd: an Analysis of the Effectiveness of Browser Fingerprinting at Large Scale

Alejandro Gomez-Boix et al.

WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018) (2018)

Proceedings Paper Computer Science, Theory & Methods

The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors

Anupam Das et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Information Systems

A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites

Bo Lu et al.

34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018) (2018)

Article Computer Science, Information Systems

Leveraging Battery Usage from Mobile Devices for Active Authentication

Jan Spooren et al.

MOBILE INFORMATION SYSTEMS (2017)

Proceedings Paper Computer Science, Information Systems

FPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques

Pierre Laperdrix et al.

ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2017 (2017)

Proceedings Paper Computer Science, Information Systems

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

Kurt Thomas et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Theory & Methods

Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability

Nasser Mohammed Al-Fannah et al.

ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017 (2017)

Proceedings Paper Computer Science, Information Systems

(Cross-)Browser Fingerprinting via OS and Hardware Level Features

Yinzhi Cao et al.

24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017) (2017)

Article Computer Science, Information Systems

Efficient Fingerprinting-Based Android Device Identification With Zero-Permission Identifiers

Wenjia Wu et al.

IEEE ACCESS (2016)

Proceedings Paper Computer Science, Information Systems

Targeted Online Password Guessing: An Underestimated Threat

Ding Wang et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Proceedings Paper Computer Science, Theory & Methods

Beauty and the Beast: Diverting modern web browsers to build unique browser fingerprints

Pierre Laperdrix et al.

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)

Proceedings Paper Computer Science, Theory & Methods

Picasso: Lightweight Device Class Fingerprinting for Web Clients

Elie Bursztein et al.

PROCEEDINGS OF THE 6TH WORKSHOP ON SECURITY AND PRIVACY IN SMARTPHONES AND MOBILE DEVICES (SPSM'16) (2016)

Proceedings Paper Computer Science, Theory & Methods

Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection

Peter Baumann et al.

PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'16) (2016)

Article Computer Science, Hardware & Architecture

Passwords and the Evolution of Imperfect Authentication

Joseph Bonneau et al.

COMMUNICATIONS OF THE ACM (2015)

Editorial Material Computer Science, Software Engineering

An Empirical Evaluation of Web-Based Fingerprinting

Amin Faiz Khademi et al.

IEEE SOFTWARE (2015)

Proceedings Paper Computer Science, Software Engineering

Mitigating browser fingerprint tracking: multi-level reconfiguration and diversification

Pierre Laperdrix et al.

2015 IEEE/ACM 10TH INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS (2015)

Proceedings Paper Computer Science, Information Systems

FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting

Christof Ferreira Torres et al.

COMPUTER SECURITY - ESORICS 2015, PT II (2015)

Proceedings Paper Computer Science, Information Systems

Fingerprinting Web Users Through Font Metrics

David Fifield et al.

Financial Cryptography and Data Security (FC 2015) (2015)

Proceedings Paper Computer Science, Information Systems

The Tangled Web of Password Reuse

Anupam Das et al.

21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014) (2014)

Proceedings Paper Computer Science, Theory & Methods

The Web Never Forgets: Persistent Tracking Mechanisms in the Wild

Gunes Acar et al.

CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2014)

Proceedings Paper Computer Science, Theory & Methods

The science of guessing: analyzing an anonymized corpus of 70 million passwords

Joseph Bonneau

2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)

Article Engineering, Electrical & Electronic

Quality assessment of biometric systems: A comprehensive perspective based on accuracy and performance measurement

M Gamassi et al.

IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT (2005)