Assuring Privacy in Surfing the Internet

  • Stefan Bodoarca
  • Mihai-Lica PuraEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11359)


On-line security is a very important aspect of Internet browsing, so a lot of research has been targeting confidentiality, integrity, authentication, non-repudiation and availability of on-line services. But another aspect that is at least equally important has been rather neglected: Internet privacy. On-line tracking can be used for legitimate purposes (e.g. preventing illegitimate login attempts), but it also invades the privacy of the users. This paper focuses on browser fingerprinting, which is the least known threat to privacy among Internet users, presenting it in detail, from definition to the possible countermeasures. Some software models built inside the so called crypto-for-privacy are also described. The paper also presents a Chrome extension that has been developed in order to obfuscate third party tracking. The browser fingerprint of a device has been consistently changed, assuring a balanced trade-off between privacy and usability.


Privacy Internet security Browser fingerprinting 


  1. 1.
    Rogaway, P.: Department of Computer Science University of California, Davis, USA The Moral Character of Cryptographic Work, December 2015Google Scholar
  2. 2.
    Narayanan, A.: What happened to the crypto dream? Part 1. IEEE Secur. Privacy Mag. 11(2), 75–76 (2013). Part 2 in IEEE Secur. Privacy Mag. 11(3), 68–71 (2013)CrossRefGoogle Scholar
  3. 3.
    Laperdrix, P.: Browser Fingerprinting: Exploring Device Diversity to Augment Authentication and Build Client-Side Countermeasures. Computer Science [cs]. INSA Rennes (2017)Google Scholar
  4. 4.
    Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1–18. Springer, Heidelberg (2010). Scholar
  5. 5.
    Soltani, A., Canty, S., Mayo, Q., Thomas, L., Hoofnagle, C.J.: Flash cookies and privacy. In: AAAI Spring Symposium: Intelligent Information Privacy Management, vol. 2010, pp. 158–163 (2010)Google Scholar
  6. 6.
    Ayenson, M.D., Wambach, D.J., Soltani, A., Good, N., Hoofnagle, C.J.: Flash cookies and privacy II: Now with HTML5 and ETag respawning (2011)Google Scholar
  7. 7.
    Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A., Diaz, C.: The web never forgets: persistent tracking mechanisms in the wild. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 674–689. ACM, New York (2014)Google Scholar
  8. 8.
    Baumann, P., Katzenbeisser, S., Stopczynski, M., Tews, E.: Disguised chromium browser: robust browser, flash and canvas fingerprinting protection. In: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, WPES 2016, pp. 37–46. ACM, New York (2016)Google Scholar
  9. 9.
    Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: exploring the ecosystem of web-based device fingerprinting. In: Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP 2013, pp. 541–555. IEEE Computer Society, Washington, DC (2013)Google Scholar
  10. 10.
    Torres, C.F., Jonker, H., Mauw, S.: FP-Block: usable web privacy by controlling browser fingerprinting. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 3–19. Springer, Cham (2015). Scholar
  11. 11.
    Gómez-Boix, A., Laperdrix, P., Baudry, B.: Hiding in the crowd: an analysis of the effectiveness of browser fingerprinting at large scale. In: WWW2018 - TheWebConf 2018: 27th International World Wide Web Conference, Lyon, France, April 2018, pp. 1–10 (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Military Technical AcademyBucharestRomania

Personalised recommendations