dark-knowledge
dark-knowledge copied to clipboard
ππ A curated library of research papers and presentations for counter-detection and web privacy enthusiasts.

Dark Knowledge
ππ A curated library of research papers and presentations for counter-detection and web privacy enthusiasts.
Contributing
Found an interesting paper you think might fit? Feel free to open an issue or PR! If anyone has time, would be awesome to get PRs adding context to meta.json
| Year | Title | HTML | Topics | Authors | |
|---|---|---|---|---|---|
| 2022 | DRAWNAPART - A Device Identification Technique based on Remote GPU Fingerprinting | HTML | |||
| 2021 | Your Phone is My Proxy - Detecting and Understanding Mobile Proxy Networks | HTML | |||
| 2021 | TypeNet - Deep Learning Keystrong Biometrics | HTML | |||
| 2021 | The CNAME of the Game - Large - scale Analysis of DNS - based Tracking Evasion | HTML | |||
| 2021 | Tales of FAVICONS and Caches - Persistent Tracking in Modern Browsers | HTML | |||
| 2021 | On Reliability of JA3 Hashes for Fingerprinting Mobile Applications | HTML | |||
| 2021 | OS Fingerprinting and Tethering Detection in Mobile Networks | HTML | |||
| 2021 | ML - CB - Machine Learning Canvas Block | HTML | |||
| 2021 | JARM Randomizer - Evading JARM Fingerprinting | HTML | |||
| 2021 | JA3cury - A New Approach to TLS Fingerprinting by Merging Fingerprinting Methods | HTML | |||
| 2021 | Fingerprinting in Style - Detecting Browser Extensions via Injected Style Sheets | HTML | Fingerprint, Extensions | Pierre Laperdrix | |
| 2020 | Web Runner 2049 - Evaluating Third - Party Anti - Bot Services | HTML | |||
| 2020 | Web Browser Privacy - What Do Browsers Say When They Phone Home | HTML | |||
| 2020 | Web Applications Security and Privacy | HTML | |||
| 2020 | Using TLS Fingerprints for OS Identification in Encrypted Traffic | HTML | |||
| 2020 | Using Generative Adversarial Networks to Break and Protect Text CAPTCHAs | HTML | |||
| 2020 | Timeless Timing Attacks - Exploiting Concurrency to Leak Secrets over Remote Connections | HTML | |||
| 2020 | Taming the Shape Shifter - Detecting Anti - Fingerprinting Browsers | HTML | |||
| 2020 | TLS Fingerprinting Techniques | HTML | |||
| 2020 | SenCAPTCHA - A Mobile - First CAPTCHA Using Orientation Sensors | HTML | |||
| 2020 | Remote physical device fingerprinting | HTML | |||
| 2020 | Poking a Hole in the Wall - Censorship - Resistant Internet Communications by Parasitizing on WebRTC | HTML | |||
| 2020 | Neither Denied nor Exposed Fixing WebRTC | HTML | |||
| 2020 | Leveraging Frequency Analysis for Deep Fake Image Recognition | HTML | |||
| 2020 | Inside The Black Box - A Glimpse Of Googleβs Internal Data Free - For - All | HTML | |||
| 2020 | Guess Who - Large - Scale Data - Centric Study of the Adequacy of Browser Fingerprints for Web Authentication | HTML | |||
| 2020 | Fingerprinting the Fingerprinters - Learning to Detect Browser Fingerprinting Behaviors | HTML | |||
| 2020 | Fingerprinting With Atomic Counters in Upcoming Web Graphics Compute APIs | HTML | |||
| 2020 | FPSelect - Low - Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms | HTML | |||
| 2020 | FP - Crawlers - Studying the Resilience of Browser Fingerprinting to Block Crawlers | HTML | |||
| 2020 | EssentialFP - Exposing the Essence of Browser Fingerprinting | HTML | |||
| 2020 | Donβt count me out - On the relevance of IP addresses in the tracking ecosystem | HTML | |||
| 2020 | Deobfuscation, Unpacking, And Decoding of Obfuscated Malicious JavaScript For Machine Learning Models Detection Performance Improvement | HTML | |||
| 2020 | Combining Behavioural Biometrics and Session Context Analytics to Enhance Risk Based Static Authentication in Web Applications | HTML | |||
| 2020 | Clash of the Trackers - Measuring the Evolution of the Online Tracking Ecosystem | HTML | |||
| 2020 | Characterizing Anomalies in Malware - Generated HTTP Traffic | HTML | |||
| 2020 | Carnus - Exploring the Privacy Threats of Browser Extension Fingerprinting | HTML | |||
| 2020 | Browser Fingerprint Standardization Using Rule Based Algorithm and Multi - Class Entropy | HTML | |||
| 2020 | BeCAPTCHA - Mouse - Synthetic Mouse Trajectories and Improved Bot Detection | HTML | |||
| 2020 | Awakening the Webβs Sleeper Agents - Misusing Service Workers for Privacy Leakage | HTML | |||
| 2020 | Accurate TLS Fingerprinting using Destination Context and Knowledge Bases | HTML | |||
| 2020 | 3d Red Pill - A Guest - to - Host Escape on QEMUKVM Virtio Devices | HTML | |||
| 2019 | VisibleV8 - In - browser Monitoring of JavaScript in the Wild | HTML | |||
| 2019 | Tracking Versus Security - Investigating the Two Facets of Browser Fingerprinting | HTML | |||
| 2019 | The Generation and Use of TLS Fingerprints | HTML | |||
| 2019 | Talon - An Automated Framework for Cross - Device Tracking Detection | HTML | |||
| 2019 | SoK - In Search of Lost Time - A Review of JavaScript Timers in Browsers | HTML | |||
| 2019 | Resident Evil - Understanding Residential IP Proxy as a Dark Service | HTML | |||
| 2019 | Rendered Private - Making GLSL Execution Uniform to Prevent WebGL - based Browser Fingerprinting | HTML | |||
| 2019 | Preventing Browser Fingerprinting by Randomizing Canvas | HTML | |||
| 2019 | Passive OS Fingerprinting by DNS Traffic Analysis | HTML | |||
| 2019 | Morelian Analysis for Browsers - Making Web Authentication Stronger with Canvas Fingerprinting | HTML | |||
| 2019 | Monsters in the Middleboxes - Building Tools for Detecting HTTPS Interception | HTML | |||
| 2019 | Leveraging WebAssembly for Numerical JavaScript Code Virtualization | HTML | |||
| 2019 | JavaScript Template Attacks - Automatically Inferring Host Information for Targeted Exploits | HTML | |||
| 2019 | Improving the Testing Efficiency of Selenium - based Load Tests | HTML | |||
| 2019 | Hacking Google reCAPTCHA v3 using Reinforcement Learning | HTML | |||
| 2019 | From IP ID To Device ID and KASLR Bypass | HTML | |||
| 2019 | Fourier Spectrum Discrepancies in Deep Network Generated Images | HTML | |||
| 2019 | Even Turing Should Sometimes Not Be Able To Tell - Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services | HTML | |||
| 2019 | Browser Fingerprinting - Exploring Device Diversity to Augment Authentication and Build Client - Side Countermeasures | HTML | |||
| 2019 | Browser Fingerprinting - A Survey | HTML | |||
| 2019 | Analyzing and Improving the Image Quality of StyleGAN | HTML | |||
| 2019 | An Investigation on Information Leakage of DNS over TLS | HTML | |||
| 2019 | After You, Please - Browser Extensions Order Attacks and Countermeasures | HTML | |||
| 2018 | Who Left Open the Cookie Jar - A Comprehensive Evaluation of Third - Party Cookie Policies | HTML | |||
| 2018 | Who Changed my Browser Settings | HTML | |||
| 2018 | Rendered Insecure - GPU Side Channel Attacks are Practical | HTML | |||
| 2018 | Pride and Prejudice in Progressive Web Apps - Abusing Native App - like Features in Web Applications | HTML | |||
| 2018 | JavaScript Zero - Real JavaScript and Zero Side - Channel Attacks | HTML | |||
| 2018 | Hiding in The Crowd - An Analysis of the Effectiveness of Browser Fingerprinting At Large Scale | HTML | |||
| 2018 | Fingerprinting Mobile Browsers | HTML | |||
| 2018 | FP - STALKER - Tracking Browser Fingerprint Evolutions | HTML | |||
| 2018 | Evaluating Server - Side Internet Proxy Detection Methods | HTML | |||
| 2018 | Detecting Social Spamming on Facebook Platform | HTML | |||
| 2018 | Clock Around the Clock - Time - Based Device Fingerprinting | HTML | |||
| 2018 | Browser Fingerprinting - Exploring Device Diversity to Augment Authentification and Build Client - Side Countermeasures | HTML | |||
| 2017 | Tracking You through DNS Traffic - Linking User Sessions by Clustering with Dirichlet Mixture Model | HTML | |||
| 2017 | The Security Impact of HTTPS Interception | HTML | |||
| 2017 | The All Seeing Eye - Web to App Intercommunication for Session Fingerprinting in Android | HTML | |||
| 2017 | Most Websites Donβt Need to Vibrate - A CostβBenefit Approach to Improving Browser Security | HTML | |||
| 2017 | FpRandom - Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques | HTML | |||
| 2017 | Fantastic Timers and Where to Find Them - High - Resolution Microarchitectural Attacks in JavaScript | HTML | |||
| 2017 | Deterministic Browser | HTML | |||
| 2017 | DECANTeR - DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting | HTML | |||
| 2017 | (Cross - )Browser Fingerprinting via OS and Hardware Level Features | HTML | |||
| 2016 | Web browser fingerprinting a framework for measuring the web browser | HTML | |||
| 2016 | Tunneling for Transparency A Large - Scale Analysis of End - to - End Violations in the Internet | HTML | |||
| 2016 | Trusted Browsers For Uncertain Times | HTML | |||
| 2016 | The Security of WebRTC | HTML | |||
| 2016 | Picasso - Lightweight Device Class Fingerprinting For Web Clients | HTML | |||
| 2016 | Iβm not a human - Breaking the Google reCAPTCHA | HTML | |||
| 2016 | I Am Robot - (Deep) Learning to Break Semantic Image CAPTCHAs | HTML | |||
| 2016 | Cloud Fingerprinting - Using Clock Skews To Determine Co - Location of Virtual Machines | HTML | |||
| 2016 | Browser Fingerprinting - Hraska | HTML | |||
| 2016 | Beauty and the Beast - Diverting Modern Web Browsers To Build Unique Browser Fingerprints | HTML | |||
| 2016 | A 1 - million - site Measurement and Analysis | HTML | |||
| 2015 | You Are How You Query - Deriving Behavioral Fingerprints From DNS Traffic | HTML | |||
| 2015 | Tick Tock - Building Browser Red Pills from Timing Side Channels | HTML | |||
| 2015 | The Clock is Still Ticking - Timing Attacks in the Modern Web | HTML | |||
| 2015 | Network - based HTTPS Client Identification Using SSL TLS Fingerprinting | HTML | |||
| 2015 | Mitigating browser fingerprint tracking | HTML | |||
| 2015 | FpGuard - Detection and Prevention of Browser Fingerprinting | HTML | |||
| 2015 | Deterministically Deterring Timing Attacks in Deterland | HTML | |||
| 2014 | The Web Never Forgets - Persistent Tracking Mechanisms in The Wild | HTML | |||
| 2014 | Mobile Device Identification Via Sensor Fingerprinting | HTML | |||
| 2014 | Markov Chain Fingerprinting to Classify Encrypted Traffic | HTML | |||
| 2013 | WebGL Programming Guide | HTML | |||
| 2013 | Mitigating Access - Driven Timing Channels in Clouds using StopWatch | HTML | |||
| 2013 | Cookieless Monster - Exploring the Ecosystem of Web - based Device Fingerprinting | HTML | |||
| 2012 | Pixel Perfect - Fingerprinting Canvas in HTML5 | HTML | |||
| 2012 | Combining Mouse and Keystroke Dynamics Biometrics for Risk Based Authentication in Web Environments | HTML | |||
| 2010 | On the Reliability of Wireless Fingerprinting using Clock Skews | HTML | |||
| 2009 | Cache Missing For Fun and Profit | HTML | |||
| 2008 | An Improved Clock - skew Measurement Technique for Revealing Hidden Services | HTML |