dark-knowledge icon indicating copy to clipboard operation
dark-knowledge copied to clipboard

πŸ˜ˆπŸ“š A curated library of research papers and presentations for counter-detection and web privacy enthusiasts.

image

Dark Knowledge

πŸ˜ˆπŸ“š A curated library of research papers and presentations for counter-detection and web privacy enthusiasts.

Contributing

Found an interesting paper you think might fit? Feel free to open an issue or PR! If anyone has time, would be awesome to get PRs adding context to meta.json

Year Title PDF HTML Topics Authors
2022 DRAWNAPART - A Device Identification Technique based on Remote GPU Fingerprinting PDF HTML
2021 Your Phone is My Proxy - Detecting and Understanding Mobile Proxy Networks PDF HTML
2021 TypeNet - Deep Learning Keystrong Biometrics PDF HTML
2021 The CNAME of the Game - Large - scale Analysis of DNS - based Tracking Evasion PDF HTML
2021 Tales of FAVICONS and Caches - Persistent Tracking in Modern Browsers PDF HTML
2021 On Reliability of JA3 Hashes for Fingerprinting Mobile Applications PDF HTML
2021 OS Fingerprinting and Tethering Detection in Mobile Networks PDF HTML
2021 ML - CB - Machine Learning Canvas Block PDF HTML
2021 JARM Randomizer - Evading JARM Fingerprinting PDF HTML
2021 JA3cury - A New Approach to TLS Fingerprinting by Merging Fingerprinting Methods PDF HTML
2021 Fingerprinting in Style - Detecting Browser Extensions via Injected Style Sheets PDF HTML Fingerprint, Extensions Pierre Laperdrix
2020 Web Runner 2049 - Evaluating Third - Party Anti - Bot Services PDF HTML
2020 Web Browser Privacy - What Do Browsers Say When They Phone Home PDF HTML
2020 Web Applications Security and Privacy PDF HTML
2020 Using TLS Fingerprints for OS Identification in Encrypted Traffic PDF HTML
2020 Using Generative Adversarial Networks to Break and Protect Text CAPTCHAs PDF HTML
2020 Timeless Timing Attacks - Exploiting Concurrency to Leak Secrets over Remote Connections PDF HTML
2020 Taming the Shape Shifter - Detecting Anti - Fingerprinting Browsers PDF HTML
2020 TLS Fingerprinting Techniques PDF HTML
2020 SenCAPTCHA - A Mobile - First CAPTCHA Using Orientation Sensors PDF HTML
2020 Remote physical device fingerprinting PDF HTML
2020 Poking a Hole in the Wall - Censorship - Resistant Internet Communications by Parasitizing on WebRTC PDF HTML
2020 Neither Denied nor Exposed Fixing WebRTC PDF HTML
2020 Leveraging Frequency Analysis for Deep Fake Image Recognition PDF HTML
2020 Inside The Black Box - A Glimpse Of Google’s Internal Data Free - For - All PDF HTML
2020 Guess Who - Large - Scale Data - Centric Study of the Adequacy of Browser Fingerprints for Web Authentication PDF HTML
2020 Fingerprinting the Fingerprinters - Learning to Detect Browser Fingerprinting Behaviors PDF HTML
2020 Fingerprinting With Atomic Counters in Upcoming Web Graphics Compute APIs PDF HTML
2020 FPSelect - Low - Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms PDF HTML
2020 FP - Crawlers - Studying the Resilience of Browser Fingerprinting to Block Crawlers PDF HTML
2020 EssentialFP - Exposing the Essence of Browser Fingerprinting PDF HTML
2020 Don’t count me out - On the relevance of IP addresses in the tracking ecosystem PDF HTML
2020 Deobfuscation, Unpacking, And Decoding of Obfuscated Malicious JavaScript For Machine Learning Models Detection Performance Improvement PDF HTML
2020 Combining Behavioural Biometrics and Session Context Analytics to Enhance Risk Based Static Authentication in Web Applications PDF HTML
2020 Clash of the Trackers - Measuring the Evolution of the Online Tracking Ecosystem PDF HTML
2020 Characterizing Anomalies in Malware - Generated HTTP Traffic PDF HTML
2020 Carnus - Exploring the Privacy Threats of Browser Extension Fingerprinting PDF HTML
2020 Browser Fingerprint Standardization Using Rule Based Algorithm and Multi - Class Entropy PDF HTML
2020 BeCAPTCHA - Mouse - Synthetic Mouse Trajectories and Improved Bot Detection PDF HTML
2020 Awakening the Web’s Sleeper Agents - Misusing Service Workers for Privacy Leakage PDF HTML
2020 Accurate TLS Fingerprinting using Destination Context and Knowledge Bases PDF HTML
2020 3d Red Pill - A Guest - to - Host Escape on QEMUKVM Virtio Devices PDF HTML
2019 VisibleV8 - In - browser Monitoring of JavaScript in the Wild PDF HTML
2019 Tracking Versus Security - Investigating the Two Facets of Browser Fingerprinting PDF HTML
2019 The Generation and Use of TLS Fingerprints PDF HTML
2019 Talon - An Automated Framework for Cross - Device Tracking Detection PDF HTML
2019 SoK - In Search of Lost Time - A Review of JavaScript Timers in Browsers PDF HTML
2019 Resident Evil - Understanding Residential IP Proxy as a Dark Service PDF HTML
2019 Rendered Private - Making GLSL Execution Uniform to Prevent WebGL - based Browser Fingerprinting PDF HTML
2019 Preventing Browser Fingerprinting by Randomizing Canvas PDF HTML
2019 Passive OS Fingerprinting by DNS Traffic Analysis PDF HTML
2019 Morelian Analysis for Browsers - Making Web Authentication Stronger with Canvas Fingerprinting PDF HTML
2019 Monsters in the Middleboxes - Building Tools for Detecting HTTPS Interception PDF HTML
2019 Leveraging WebAssembly for Numerical JavaScript Code Virtualization PDF HTML
2019 JavaScript Template Attacks - Automatically Inferring Host Information for Targeted Exploits PDF HTML
2019 Improving the Testing Efficiency of Selenium - based Load Tests PDF HTML
2019 Hacking Google reCAPTCHA v3 using Reinforcement Learning PDF HTML
2019 From IP ID To Device ID and KASLR Bypass PDF HTML
2019 Fourier Spectrum Discrepancies in Deep Network Generated Images PDF HTML
2019 Even Turing Should Sometimes Not Be Able To Tell - Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services PDF HTML
2019 Browser Fingerprinting - Exploring Device Diversity to Augment Authentication and Build Client - Side Countermeasures PDF HTML
2019 Browser Fingerprinting - A Survey PDF HTML
2019 Analyzing and Improving the Image Quality of StyleGAN PDF HTML
2019 An Investigation on Information Leakage of DNS over TLS PDF HTML
2019 After You, Please - Browser Extensions Order Attacks and Countermeasures PDF HTML
2018 Who Left Open the Cookie Jar - A Comprehensive Evaluation of Third - Party Cookie Policies PDF HTML
2018 Who Changed my Browser Settings PDF HTML
2018 Rendered Insecure - GPU Side Channel Attacks are Practical PDF HTML
2018 Pride and Prejudice in Progressive Web Apps - Abusing Native App - like Features in Web Applications PDF HTML
2018 JavaScript Zero - Real JavaScript and Zero Side - Channel Attacks PDF HTML
2018 Hiding in The Crowd - An Analysis of the Effectiveness of Browser Fingerprinting At Large Scale PDF HTML
2018 Fingerprinting Mobile Browsers PDF HTML
2018 FP - STALKER - Tracking Browser Fingerprint Evolutions PDF HTML
2018 Evaluating Server - Side Internet Proxy Detection Methods PDF HTML
2018 Detecting Social Spamming on Facebook Platform PDF HTML
2018 Clock Around the Clock - Time - Based Device Fingerprinting PDF HTML
2018 Browser Fingerprinting - Exploring Device Diversity to Augment Authentification and Build Client - Side Countermeasures PDF HTML
2017 Tracking You through DNS Traffic - Linking User Sessions by Clustering with Dirichlet Mixture Model PDF HTML
2017 The Security Impact of HTTPS Interception PDF HTML
2017 The All Seeing Eye - Web to App Intercommunication for Session Fingerprinting in Android PDF HTML
2017 Most Websites Don’t Need to Vibrate - A Cost–Benefit Approach to Improving Browser Security PDF HTML
2017 FpRandom - Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques PDF HTML
2017 Fantastic Timers and Where to Find Them - High - Resolution Microarchitectural Attacks in JavaScript PDF HTML
2017 Deterministic Browser PDF HTML
2017 DECANTeR - DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting PDF HTML
2017 (Cross - )Browser Fingerprinting via OS and Hardware Level Features PDF HTML
2016 Web browser fingerprinting a framework for measuring the web browser PDF HTML
2016 Tunneling for Transparency A Large - Scale Analysis of End - to - End Violations in the Internet PDF HTML
2016 Trusted Browsers For Uncertain Times PDF HTML
2016 The Security of WebRTC PDF HTML
2016 Picasso - Lightweight Device Class Fingerprinting For Web Clients PDF HTML
2016 I’m not a human - Breaking the Google reCAPTCHA PDF HTML
2016 I Am Robot - (Deep) Learning to Break Semantic Image CAPTCHAs PDF HTML
2016 Cloud Fingerprinting - Using Clock Skews To Determine Co - Location of Virtual Machines PDF HTML
2016 Browser Fingerprinting - Hraska PDF HTML
2016 Beauty and the Beast - Diverting Modern Web Browsers To Build Unique Browser Fingerprints PDF HTML
2016 A 1 - million - site Measurement and Analysis PDF HTML
2015 You Are How You Query - Deriving Behavioral Fingerprints From DNS Traffic PDF HTML
2015 Tick Tock - Building Browser Red Pills from Timing Side Channels PDF HTML
2015 The Clock is Still Ticking - Timing Attacks in the Modern Web PDF HTML
2015 Network - based HTTPS Client Identification Using SSL TLS Fingerprinting PDF HTML
2015 Mitigating browser fingerprint tracking PDF HTML
2015 FpGuard - Detection and Prevention of Browser Fingerprinting PDF HTML
2015 Deterministically Deterring Timing Attacks in Deterland PDF HTML
2014 The Web Never Forgets - Persistent Tracking Mechanisms in The Wild PDF HTML
2014 Mobile Device Identification Via Sensor Fingerprinting PDF HTML
2014 Markov Chain Fingerprinting to Classify Encrypted Traffic PDF HTML
2013 WebGL Programming Guide PDF HTML
2013 Mitigating Access - Driven Timing Channels in Clouds using StopWatch PDF HTML
2013 Cookieless Monster - Exploring the Ecosystem of Web - based Device Fingerprinting PDF HTML
2012 Pixel Perfect - Fingerprinting Canvas in HTML5 PDF HTML
2012 Combining Mouse and Keystroke Dynamics Biometrics for Risk Based Authentication in Web Environments PDF HTML
2010 On the Reliability of Wireless Fingerprinting using Clock Skews PDF HTML
2009 Cache Missing For Fun and Profit PDF HTML
2008 An Improved Clock - skew Measurement Technique for Revealing Hidden Services PDF HTML