skip to main content
10.1145/2660267.2660347acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

The Web Never Forgets: Persistent Tracking Mechanisms in the Wild

Published:03 November 2014Publication History

ABSTRACT

We present the first large-scale studies of three advanced web tracking mechanisms - canvas fingerprinting, evercookies and use of "cookie syncing" in conjunction with evercookies. Canvas fingerprinting, a recently developed form of browser fingerprinting, has not previously been reported in the wild; our results show that over 5% of the top 100,000 websites employ it. We then present the first automated study of evercookies and respawning and the discovery of a new evercookie vector, IndexedDB. Turning to cookie syncing, we present novel techniques for detection and analysing ID flows and we quantify the amplification of privacy-intrusive tracking practices due to cookie syncing.

Our evaluation of the defensive techniques used by privacy-aware users finds that there exist subtle pitfalls --- such as failing to clear state on multiple browsers at once - in which a single lapse in judgement can shatter privacy defenses. This suggests that even sophisticated users face great difficulties in evading tracking techniques.

References

  1. Privacychoice - get a free privacy scan of your site. http://privacychoice.org/assessment.Google ScholarGoogle Scholar
  2. Bug 757726 - disallow enumeration of navigator.plugins. https://bugzilla.mozilla.org/show_bug.cgi?id=757726, May 2012.Google ScholarGoogle Scholar
  3. Manage, disable Local Shared Objects j Flash Player. http://helpx.adobe.com/flash-player/kb/disable-local-shared-objects-flash.html, 2014.Google ScholarGoogle Scholar
  4. Doubleclick ad exchange real-time bidding protocol: Cookie matching. https://developers.google.com/ad-exchange/rtb/cookie-guide, February 2014.Google ScholarGoogle Scholar
  5. Selenium - Web Browser Automation. http://docs.seleniumhq.org/, 2014. 24In fact, there is a fledgling commercial market for such tools {1}, but they are not very sophisticated.Google ScholarGoogle Scholar
  6. G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gurses, F. Piessens, and B. Preneel. FPDetective: Dusting the Web for fingerprinters. In ACM Conference on Computer and Communications Security (CCS), pages 1129--1140. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Ayenson, D. J. Wambach, A. Soltani, N. Good, and C. J. Hoofnagle. Flash cookies and privacy II: Now with HTML5 and ETag respawning. World Wide Web Internet and Web Information Systems, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  8. M. Backes, A. Kate, M. Maffei, and K. Pecina. Obliviad: Provably secure and practical online behavioral advertising. In IEEE Security and Privacy (S&P), pages 257--271. IEEE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Balebako, P. Leon, R. Shay, B. Ur, Y. Wang, and L. Cranor. Measuring the effectiveness of privacy tools for limiting behavioral advertising. In Web 2.0 Workshop on Security and Privacy (W2SP). IEEE, 2012.Google ScholarGoogle Scholar
  10. F. Besson, N. Bielova, T. Jensen, et al. Enforcing Browser Anonymity with Quantitative Information Flow. 2014.Google ScholarGoogle Scholar
  11. M. Bilenko, M. Richardson, and J. Y. Tsai. Targeted, not tracked: Client-side solutions for privacy-friendly behavioral advertising. In Privacy Enhancing Technologies (PETS). Springer, 2011.Google ScholarGoogle Scholar
  12. P. E. Black. Ratcliff/Obershelp pattern recognition. http://xlinux.nist.gov/dads/HTML/ratcliffObershelp.html, December 2004.Google ScholarGoogle Scholar
  13. K. Brade. gitweb.torproject.org - torbrowser.git/blob - src/current-patches/refox/0019-add-canvas-imageextraction- prompt.patch. https://gitweb.torproject.org/torbrowser.git/blob/HEAD:/src/current-patches/firefox/0019-Add-canvas-image-extraction-prompt.patch, November 2012.Google ScholarGoogle Scholar
  14. W. Davis. KISSmetrics Finalizes Supercookies Settlement. http://www.mediapost.com/ publications/article/191409/kissmetrics- finalizes-supercookies-settlement.html, 2013. {Online; accessed 12-May-2014}.Google ScholarGoogle Scholar
  15. N. Doty. Fingerprinting Guidance for Web Specification Authors. http://w3c.github.io/fingerprinting-guidance/, 2014.Google ScholarGoogle Scholar
  16. P. Eckersley. How unique is your web browser? In Privacy Enhancing Technologies (PETs), pages 1{18. Springer, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. C. Eubank, M. Melara, D. Perez-Botero, and A. Narayanan. Shining the floodlights on mobile web tracking - a privacy survey. In "Web 2.0 Security and Privacy", May 2013.Google ScholarGoogle Scholar
  18. E. W. Felten. If You're Going to Track Me, Please Use Cookies. https://freedom-to-tinker.com/blog/felten/if-youre-going-track-me-please-use-cookies/, 2009.Google ScholarGoogle Scholar
  19. M. Fredrikson and B. Livshits. Repriv: Re-imagining content personalization and in-browser privacy. In IEEE Security and Privacy (S&P), pages 131--146. IEEE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Guha, B. Cheng, and P. Francis. Privad: practical privacy in online advertising. In USENIX Conference on Networked Systems Design and Implementation, pages 169{182. USENIX Association, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Kamkar. Evercookie - virtually irrevocable persistent cookies. http://samy.pl/evercookie/, Sep 2010.Google ScholarGoogle Scholar
  22. M. Kerrisk. strace(1) - linux manual page. http://man7.org/linux/man-pages/man1/strace.1.html, May 2014.Google ScholarGoogle Scholar
  23. T. Kohno, A. Broido, and K. C. Claffy. Remotephysical device fingerprinting. IEEE Transactions on Dependable and Secure Computing, 2(2):93--108, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. Kotcher, Y. Pei, P. Jumde, and C. Jackson. Cross-origin pixel stealing: timing attacks using CSS filters. In ACM Conference on Computer and Communications Security (CCS), pages 1055--1062. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. B. Krishnamurthy and C. Wills. Privacy diffusion on the Web: a longitudinal perspective. In International Conference on World Wide Web, pages 541--550. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. B. Krishnamurthy and C. E. Wills. On the leakage of personally identifiable information via online social networks. In ACM Workshop on Online Social Networks, pages 7--12. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. B. Liu, A. Sheth, U. Weinsberg, J. Chandrashekar, and R. Govindan. AdReveal: Improving transparency into online targeted advertising. In ACM Workshop on Hot Topics in Networks, page 12. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Mayer. Tracking the trackers: Self-help tools. https://cyberlaw.stanford.edu/blog/2011/09/tracking-trackers-self-help-tools, September 2011.Google ScholarGoogle Scholar
  29. J. R. Mayer and J. C. Mitchell. Third-party web tracking: Policy and technology. In IEEE Symposium on Security and Privacy (S&P)), pages 413--427. IEEE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. A. M. McDonald and L. F. Cranor. Survey of the Use of Adobe Flash Local Shared Objects to Respawn HTTP Cookies, A. ISJLP, 7:639, 2011.Google ScholarGoogle Scholar
  31. K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham. Fingerprinting information in JavaScript implementations. In Web 2.0 Workshop on Security and Privacy (W2SP), volume 2. IEEE, 2011.Google ScholarGoogle Scholar
  32. K. Mowery and H. Shacham. Pixel perfect: Fingerprinting canvas in HTML5. In Web 2.0 Workshop on Security and Privacy (W2SP). IEEE, 2012.Google ScholarGoogle Scholar
  33. M. Mulazzani, P. Reschl, M. Huber, M. Leithner, S. Schrittwieser, E. Weippl, and F. C. Wien. Fast and reliable browser identification with JavaScript engine fingerprinting. In Web 2.0 Workshop on Security and Privacy (W2SP), volume 1. IEEE, 2013.Google ScholarGoogle Scholar
  34. A. Narayanan, J. Mayer, and S. Iyengar. Tracking Not Required: Behavioral Targeting. http://33bits.org/2012/06/11/tracking-not-required-behavioral-targeting/, 2012.Google ScholarGoogle Scholar
  35. N. Nikiforakis, L. Invernizzi, A. Kapravelos, S. Van Acker, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna. You are what you include: Large-scale evaluation of remote javascript inclusions. In ACM Conference on Computer and Communications Security (CCS), pages 736--747. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. N. Nikiforakis, W. Joosen, and B. Livshits. PriVaricator: Deceiving Fingerprinters with Little White Lies. Available at http://research.microsoft.com/en-us/um/people/livshits/papers%5Ctr%5Cprivaricator.pdf.Google ScholarGoogle Scholar
  37. N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna. Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In IEEE Symposium on Security and Privacy, pages 541--555. IEEE, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. L. Olejnik, T. Minh-Dung, and C. Castelluccia. Selling Off Privacy at Auction. In Annual Network and Distributed System Security Symposium (NDSS). IEEE, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  39. C. R. Orr, A. Chauhan, M. Gupta, C. J. Frisz, and C. W. Dunn. An approach for identifying JavaScript-loaded advertisements through static program analysis. In ACM Workshop on Privacy in the Electronic Society (WPES), pages 1--12. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. M. Perry, E. Clark, and S. Murdoch. The design and implementation of the Tor browser {draft}. https:// www.torproject.org/projects/torbrowser/design, 2013.Google ScholarGoogle Scholar
  41. F. Roesner, T. Kohno, and D. Wetherall. Detecting and Defending Against Third-Party Tracking on the Web. In Symposium on Networking Systems Design and Implementation. USENIX Association, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. N. Singer. Do Not Track? Advertisers Say 'Don't Tread on Us'. http://www.nytimes.com/2012/10/14/technology/do-not-track-movement-is-drawing- advertisers-fire.html, 2012.Google ScholarGoogle Scholar
  43. A. Soltani, S. Canty, Q. Mayo, L. Thomas, and C. J. Hoofnagle. Flash Cookies and Privacy. In AAAI Spring Symposium: Intelligent Information Privacy Management. AAAI, 2010.Google ScholarGoogle Scholar
  44. O. Sorensen. Zombie-cookies: Case studies and mitigation. In Internet Technology and Secured Transactions (ICITST), pages 321--326. IEEE, 2013.Google ScholarGoogle Scholar
  45. P. Stone. Pixel perfect timing attacks with HTML5. Context Information Security (White Paper), 2013.Google ScholarGoogle Scholar
  46. A. Taly, J. C. Mitchell, M. S. Miller, J. Nagra, et al. Automated analysis of security-critical javascript apis. In IEEE Security and Privacy (S&P), pages 363--378. IEEE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. J. Temple. Stale Cookies: How companies are tracking you online today. http://blog.sfgate.com/techchron/2013/10/02/stale-cookies-how-companies-are-tracking-you-online-today/, 2013.Google ScholarGoogle Scholar
  48. M. Tran, X. Dong, Z. Liang, and X. Jiang. Tracking the trackers: Fast and scalable dynamic analysis of web content for privacy violations. In Applied Cryptography and Network Security, pages 418--435. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. M.-D. Tran, G. Acs, and C. Castelluccia. Retargeting without tracking. arXiv preprint arXiv:1404.4533, 2014.Google ScholarGoogle Scholar
  50. T. Unger, M. Mulazzani, D. Fruhwirt, M. Huber, S. Schrittwieser, and E. Weippl. SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. In Availability, Reliability and Security (ARES), pages 255--261. IEEE, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. V. Vasilyev. Valve/fingerprintjs. https://github.com/Valve/fingerprintjs, 2012.Google ScholarGoogle Scholar

Index Terms

  1. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
                November 2014
                1592 pages
                ISBN:9781450329576
                DOI:10.1145/2660267

                Copyright © 2014 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 3 November 2014

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                CCS '14 Paper Acceptance Rate114of585submissions,19%Overall Acceptance Rate1,261of6,999submissions,18%

                Upcoming Conference

                CCS '24
                ACM SIGSAC Conference on Computer and Communications Security
                October 14 - 18, 2024
                Salt Lake City , UT , USA

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader