Nowhere to Hide: Detecting Obfuscated Fingerprinting Scripts

06/27/2022
by   Ray Ngan, et al.
0

As the web moves away from stateful tracking, browser fingerprinting is becoming more prevalent. Unfortunately, existing approaches to detect browser fingerprinting do not take into account potential evasion tactics such as code obfuscation. To address this gap, we investigate the robustness of a state-of-the-art fingerprinting detection approach against various off-the-shelf obfuscation tools. Overall, we find that the combination of static and dynamic analysis is robust against different types of obfuscation. While some obfuscators are able to induce false negatives in static analysis, dynamic analysis is still able detect these cases. Since obfuscation does not induce significant false positives, the combination of static and dynamic analysis is still able to accurately detect obfuscated fingerprinting scripts.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/08/2022

Learning to Reduce False Positives in Analytic Bug Detectors

Due to increasingly complex software design and rapid iterative developm...
research
05/13/2021

Gradual Program Analysis for Null Pointers

Static analysis tools typically address the problem of excessive false p...
research
10/14/2022

Learning Algorithms in Static Analysis of Web Applications

Web applications are distributed applications, they are programs that ru...
research
02/15/2023

Path-sensitive Type Analysis with Backward Analysis for Quality Assurance of Dynamic Typed Language Code

Precise and fast static type analysis for dynamically typed language is ...
research
03/30/2021

IFDS Taint Analysis with Access Paths

Over the years, static taint analysis emerged as the analysis of choice ...
research
09/24/2021

Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis

Although the importance of using static analysis to detect taint-style v...
research
09/07/2022

AutoPruner: Transformer-Based Call Graph Pruning

Constructing a static call graph requires trade-offs between soundness a...

Please sign up or login with your details

Forgot password? Click here to reset