WebRTC provides browsers and mobile apps with rich realtime communications capabilities, without the need for further software components. Recently, however, it has been shown that WebRTC can be triggered to fingerprint a web visitor, which may compromise the user's privacy. We evaluate the feasibility of exploiting a WebRTC IP leak to scan a user's private network ports and IP addresses from outside their local network. We propose a web-based network scanner that is both browser- and network-independent, and performs nearly as well as system-based scanners. We experiment with various popular mobile and desktop browsers on several platforms and show that adversaries not only can exploit WebRTC to identify the real user identity behind a web...
Analysis of three commercial companies' browser-fi ngerprinting code reveals the techniques that all...
We present a novel web page fingerprinting attack that is able to defeat several recently proposed d...
Website fingerprinting attacks use statistical analysis on network traffic to compromise user privac...
Recent work in traffic analysis has shown that traffic patterns leaked through side channels can be ...
WebRTC is a Google-developed project that allows users to communicate directly. It is an open-source...
The web has become an essential part of our society and is currently the main medium of information ...
Online tracking and fingerprinting is becoming increasingly more prevalent and pervasive. The privac...
Abstract—The web has become an essential part of our society and is currently the main medium of inf...
Many modern websites are built on a "mash-up " of numerous web technologies and libraries....
In this paper, we show how to exploit real-time communica-tion applications to determine the IP addr...
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amoun...
Abstract—This paper develops a high-performance, In-ternet-wide service discovery tool, which we cal...
Analysing security assumptions taken for the WebRTC and postMessage APIs led us to find a novel atta...
Webbrowser fingerprinting is a powerful tool to identify an Internet end-user. Previous research has...
© International Financial Cryptography Association 2017. Over the last decade, mobile devices and mo...
Analysis of three commercial companies' browser-fi ngerprinting code reveals the techniques that all...
We present a novel web page fingerprinting attack that is able to defeat several recently proposed d...
Website fingerprinting attacks use statistical analysis on network traffic to compromise user privac...
Recent work in traffic analysis has shown that traffic patterns leaked through side channels can be ...
WebRTC is a Google-developed project that allows users to communicate directly. It is an open-source...
The web has become an essential part of our society and is currently the main medium of information ...
Online tracking and fingerprinting is becoming increasingly more prevalent and pervasive. The privac...
Abstract—The web has become an essential part of our society and is currently the main medium of inf...
Many modern websites are built on a "mash-up " of numerous web technologies and libraries....
In this paper, we show how to exploit real-time communica-tion applications to determine the IP addr...
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amoun...
Abstract—This paper develops a high-performance, In-ternet-wide service discovery tool, which we cal...
Analysing security assumptions taken for the WebRTC and postMessage APIs led us to find a novel atta...
Webbrowser fingerprinting is a powerful tool to identify an Internet end-user. Previous research has...
© International Financial Cryptography Association 2017. Over the last decade, mobile devices and mo...
Analysis of three commercial companies' browser-fi ngerprinting code reveals the techniques that all...
We present a novel web page fingerprinting attack that is able to defeat several recently proposed d...
Website fingerprinting attacks use statistical analysis on network traffic to compromise user privac...