{"id":"https://openalex.org/W4384948683","doi":"https://doi.org/10.1109/sp46215.2023.10179385","title":"Only Pay for What You Leak: Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense","display_name":"Only Pay for What You Leak: Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense","publication_year":2023,"publication_date":"2023-05-01","ids":{"openalex":"https://openalex.org/W4384948683","doi":"https://doi.org/10.1109/sp46215.2023.10179385"},"language":"en","primary_location":{"id":"doi:10.1109/sp46215.2023.10179385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46215.2023.10179385","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092512431","display_name":"Ryan Torok","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ryan Torok","raw_affiliation_strings":["Princeton University,Department of Computer Science,Princeton,New Jersey,USA","Department of Computer Science, Princeton University, Princeton, New Jersey, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University,Department of Computer Science,Princeton,New Jersey,USA","institution_ids":["https://openalex.org/I20089843"]},{"raw_affiliation_string":"Department of Computer Science, Princeton University, Princeton, New Jersey, USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078224627","display_name":"Amit Levy","orcid":"https://orcid.org/0000-0003-1479-8917"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amit Levy","raw_affiliation_strings":["Princeton University,Department of Computer Science,Princeton,New Jersey,USA","Department of Computer Science, Princeton University, Princeton, New Jersey, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University,Department of Computer Science,Princeton,New Jersey,USA","institution_ids":["https://openalex.org/I20089843"]},{"raw_affiliation_string":"Department of Computer Science, Princeton University, Princeton, New Jersey, USA","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5092512431"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":0.2038,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.42447574,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1023","last_page":"1040"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6738698482513428},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.534939706325531},{"id":"https://openalex.org/keywords/leak","display_name":"Leak","score":0.5265073180198669},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.45233771204948425},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.36707836389541626},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15190762281417847}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6738698482513428},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.534939706325531},{"id":"https://openalex.org/C2780378346","wikidata":"https://www.wikidata.org/wiki/Q1349983","display_name":"Leak","level":2,"score":0.5265073180198669},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.45233771204948425},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.36707836389541626},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15190762281417847},{"id":"https://openalex.org/C87717796","wikidata":"https://www.wikidata.org/wiki/Q146326","display_name":"Environmental engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sp46215.2023.10179385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46215.2023.10179385","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1496462336","https://openalex.org/W1972524097","https://openalex.org/W1973482401","https://openalex.org/W1995875735","https://openalex.org/W2135930857","https://openalex.org/W2159764755","https://openalex.org/W2256284630","https://openalex.org/W2598363046","https://openalex.org/W2620476287","https://openalex.org/W2723746209","https://openalex.org/W2744628735","https://openalex.org/W2885285030","https://openalex.org/W2944306435","https://openalex.org/W3008279942","https://openalex.org/W3046761316","https://openalex.org/W3091663654","https://openalex.org/W3122076682","https://openalex.org/W3154012499","https://openalex.org/W4288057732","https://openalex.org/W6688460728","https://openalex.org/W6743752906","https://openalex.org/W6756040472","https://openalex.org/W6766436387","https://openalex.org/W6768333702"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4232561318","https://openalex.org/W3202245533","https://openalex.org/W4253977752","https://openalex.org/W4224941017"],"abstract_inverted_index":{"We":[0],"present":[1],"Sandcastle,":[2],"an":[3,78],"entropy-based":[4,127],"browser":[5,35],"fingerprinting":[6,128,151],"defense":[7],"that":[8,24,81,90,170],"aims":[9],"to":[10,21,31,33,60,93,100,109,147,164,174],"minimize":[11],"its":[12],"interference":[13],"with":[14],"legitimate":[15],"web":[16,145,176],"applications.":[17],"Sandcastle":[18,76,99],"allows":[19,82,137],"developers":[20],"partition":[22],"code":[23],"operates":[25],"on":[26,54],"identifiable":[27,52,113,135],"information":[28,37,53,136],"into":[29],"sandboxes":[30,46],"prove":[32],"the":[34,36,55,64,86,94,106,110,120,124,166,175],"cannot":[38],"be":[39,172],"sent":[40],"in":[41,126],"any":[42],"network":[43],"request.":[44],"Meanwhile,":[45],"may":[47],"make":[48],"full":[49],"use":[50,133],"of":[51,63,88,105,112,123,134,144,168],"client":[56],"side,":[57],"including":[58],"writing":[59],"dedicated":[61],"regions":[62],"Document":[65],"Object":[66],"Model.":[67],"For":[68],"applications":[69,146],"where":[70],"this":[71],"policy":[72],"is":[73,91],"too":[74],"strict,":[75],"provides":[77,161],"expressive":[79],"cashier":[80],"precise":[83],"control":[84],"over":[85],"granularity":[87],"data":[89],"leaked":[92],"network.":[95],"These":[96],"features":[97],"allow":[98],"eliminate":[101],"most":[102],"or":[103],"all":[104],"noise":[107],"added":[108],"outputs":[111],"APIs":[114,169],"by":[115],"Chrome\u2019s":[116],"Privacy":[117],"Budget":[118],"framework,":[119],"current":[121],"state":[122],"art":[125],"defenses.":[129],"Enabling":[130],"unlimited":[131],"client-side":[132],"for":[138],"a":[139,150,162],"much":[140],"more":[141],"comprehensive":[142],"set":[143],"run":[148],"under":[149],"defense,":[152],"such":[153],"as":[154],"3D":[155],"games":[156],"and":[157,160],"video":[158],"streaming,":[159],"mechanism":[163],"expand":[165],"space":[167],"can":[171],"introduced":[173],"ecosystem":[177],"without":[178],"sacrificing":[179],"privacy.":[180]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
