[go: up one dir, main page]

Rizzo et al., 2021 - Google Patents

Unveiling web fingerprinting in the wild via code mining and machine learning

Rizzo et al., 2021

View PDF
Document ID
17527816624240089100
Author
Rizzo V
Traverso S
Mellia M
Publication year
Publication venue
Proceedings on Privacy Enhancing Technologies

External Links

Snippet

Fueled by advertising companies' need of accurately tracking users and their online habits, web fingerprinting practice has grown in recent years, with severe implications for users' privacy. In this paper, we design, engineer and evaluate a methodology which combines the …
Continue reading at petsymposium.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/875Monitoring of systems including the internet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce

Similar Documents

Publication Publication Date Title
Rizzo et al. Unveiling web fingerprinting in the wild via code mining and machine learning
Aliero et al. An algorithm for detecting SQL injection vulnerability using black-box testing
Melicher et al. Riding out domsday: Towards detecting and preventing dom cross-site scripting
Starov et al. Extended tracking powers: Measuring the privacy diffusion enabled by browser extensions
Englehardt et al. Online tracking: A 1-million-site measurement and analysis
Mughees et al. Detecting anti ad-blockers in the wild
Kim et al. WebMon: ML-and YARA-based malicious webpage detection
IL265518B2 (en) Management of security vulnerabilities
Naderi-Afooshteh et al. Malmax: Multi-aspect execution for automated dynamic web server malware analysis
Kim et al. AIBFT: artificial intelligence browser forensic toolkit
US20240054215A1 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
US20240054210A1 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
Englehardt Automated discovery of privacy violations on the web
Singh et al. A survey on different phases of web usage mining for anomaly user behavior investigation
Yang et al. {TRIDENT}: Towards Detecting and Mitigating Web-based Social Engineering Attacks
Liu et al. Traffickstop: Detecting and measuring illicit traffic monetization through large-scale dns analysis
NL2031256B1 (en) Method and computing device for detection of target malicious web resource
Tian et al. FrameHanger: Evaluating and classifying iframe injection at large scale
Roopak et al. On effectiveness of source code and SSL based features for phishing website detection
Ngan et al. Nowhere to hide: Detecting obfuscated fingerprinting scripts
US20250028818A1 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
US20230252146A1 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
Wang et al. Minedetector: Javascript browser-side cryptomining detection using static methods
Takata et al. Identifying evasive code in malicious websites by analyzing redirection differences
Munir et al. {PURL}: Safe and Effective Sanitization of Link Decoration