Anti-Fingerprinting Technique : (Record no. 8865)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 06995nam a22002537a 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 210125b2018 a|||f mb|| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| 041 0# - Language Code | |
| Language code of text | eng |
| Language code of abstract | eng |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 658 |
| 100 0# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Amr El-Banna |
| 245 1# - TITLE STATEMENT | |
| Title | Anti-Fingerprinting Technique : |
| Remainder of title | NONYM!ZER / |
| Statement of responsibility, etc. | Amr El-Banna |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Date of publication, distribution, etc. | 2018 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 59 p. |
| Other physical details | ill. |
| Dimensions | 21 cm. |
| 500 ## - GENERAL NOTE | |
| Materials specified | Supervisor: Nashwa Abd El-Baki |
| 502 ## - Dissertation Note | |
| Dissertation type | Thesis (M.A.)—Nile University, Egypt, 2018 . |
| 504 ## - Bibliography | |
| Bibliography | "Includes bibliographical references" |
| 505 0# - Contents | |
| Formatted contents note | Contents:<br/>Abstract.......................................................................................................................XII<br/>How Web Tracking has started?.....................................................................................1<br/>Web Tracking Dynamics................................................................................................4<br/>Techniques & Methods:.............................................................................................6<br/>1. TCP/IP stack......................................................................................................7<br/>2. User-Agent........................................................................................................8<br/>3. FlashPlayer........................................................................................................8<br/>4. ServerLight.....................................................................................................10<br/>5. WebGL............................................................................................................10<br/>6. JavaApplet.......................................................................................................11<br/>7. Canvas.............................................................................................................13<br/>8. Fonts................................................................................................................14<br/>9. Cascade Style Sheet - CSS..............................................................................14<br/>10. Social Media Login.......................................................................................15<br/>11. geoLocation API...........................................................................................16<br/>Countermeasures and preventive actions.....................................................................17<br/>1. Less verbosity of User-Agent String and Plugins................................................17<br/>2. Canvas blocker.....................................................................................................17<br/>3. Flash Blocker.......................................................................................................17<br/>4. Applications in the middle...................................................................................17<br/>5. Social Media Protection.......................................................................................18<br/>6. Do Not Track – DNT Header...............................................................................18<br/>7. Universal Fonts list usage....................................................................................18<br/>NONYM!ZER – Anti-Fingerprinting Tool..................................................................21<br/>Anoymize UA String...............................................................................................22<br/>Anoymize Canvas....................................................................................................25<br/>How does Canvas fingerprinting happen?..........................................................25<br/>Experiment...................................................................................................................29<br/>Test Environment Preparations................................................................................29<br/>Detailed steps on how to setup each environment:.............................................31<br/>Performance Evaluation...............................................................................................33<br/>VIII<br/>Test Results Comparison.........................................................................................33<br/>Individual environment evaluation:.........................................................................35<br/>Across environments evaluation:.............................................................................36<br/>Conclusion....................................................................................................................37<br/>Future Work..................................................................................................................38<br/>Appendix A...................................................................................................................39<br/>NONYM!ZER Web Extension Code.......................................................................39<br/>References.................................................................................................................... |
| 520 3# - Abstract | |
| Abstract | Abstract:<br/>Back in the early days of the Internet, web content (for example web site) was<br/>designed and hosted by a single entity or organization. Web pages were mainly<br/>developed to share knowledge, news, data to the public. The main objective of the<br/>Internet was to connect the world. It was never meant to target third-parties. With the<br/>continuous and aggressive competition in advertising businesses, uncontrollably<br/>desires have emerged to identify and classify consumers. It is proven that companies<br/>must have a clear definition of its target market. Based on this we have seen different<br/>ways to identify, analyze, and track consumers, either voluntarily or without their<br/>consent.<br/>Not only recent compelled regulations have radically restrained Cookies usage but<br/>also increased people knowledge and awareness have been playing a fundamental<br/>part. This have put lots of pressure on enterprises to find alternatives to bridge this<br/>gap and satisfy business demands. Since then fingerprinting have gained enormous<br/>popularity. Browser fingerprinting techniques have evolved from being privacyfriendly<br/>to privacy intrusive to serve these demands. This also has pushed privacy<br/>concerned people to save no effort to advance countermeasures.<br/>In this thesis we introduce different browser fingerprinting techniques and their<br/>relevant technologies in the wild. It additionally elaborates widely known<br/>countermeasures. we introduce “nonym!zer” as a mitigation framework for browser<br/>fingerprinting. It helps to hinder or impede browser fingerprinting on desktop<br/>browsers that web servers use such as WebGL or Canvas technologies. |
| 546 ## - Language Note | |
| Language Note | Text in English, abstracts in English. |
| 650 #4 - Subject | |
| Subject | Information Security |
| 655 #7 - Index Term-Genre/Form | |
| Source of term | NULIB |
| focus term | Dissertation, Academic |
| 690 ## - Subject | |
| School | Information Security |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Thesis |
| 650 #4 - Subject | |
| -- | 294 |
| 655 #7 - Index Term-Genre/Form | |
| -- | 187 |
| 690 ## - Subject | |
| -- | 294 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Full call number | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Not For Loan | Main library | Main library | 01/25/2021 | 658 /A.B.A/ 2018 | 01/25/2021 | 01/25/2021 | Thesis |