The Most Addictive Python and SQL Courses
MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the evolution of browser fingerprinting techniques and their implications for user tracking in this IEEE conference talk. Delve into the FP-STALKER approach, which links browser fingerprint evolutions to enable long-term tracking despite frequent changes. Learn about the rule-based and hybrid variants of FP-STALKER, and examine the results of an empirical study involving nearly 100,000 fingerprints from over 1,900 distinct browser instances. Discover how this innovative method can track browsers for an average of 54.48 days, with some browsers being trackable for more than 100 days. Gain insights into the broader implications of fingerprinting, fingerprint uniqueness, and the challenges of maintaining user privacy in the face of evolving tracking technologies.
Syllabus
Introduction
Browser fingerprinting
Broader fingerprint
Fingerprint uniqueness
Fingerprint Tracking
Rulebased Algorithm
Random Forest
Vectorization
Random Forest Model
Evaluation
Fingerprint Sequence
Chains
Tracking Duration
Ownership
Average Ownership
IP Version
Conclusion
Taught by
IEEE Symposium on Security and Privacy