{"id":"https://openalex.org/W4412027019","doi":"https://doi.org/10.1186/s42400-024-00349-y","title":"XFP-recognizer: detecting cross-file browser fingerprinting","display_name":"XFP-recognizer: detecting cross-file browser fingerprinting","publication_year":2025,"publication_date":"2025-07-05","ids":{"openalex":"https://openalex.org/W4412027019","doi":"https://doi.org/10.1186/s42400-024-00349-y"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00349-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00349-y","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00349-y","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00349-y","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100719973","display_name":"Xiaoxi Wang","orcid":"https://orcid.org/0000-0003-2678-9217"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoxi Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, 100085, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, 100085, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045118622","display_name":"Z. J. Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenxu Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, 100085, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, 100085, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115444400","display_name":"Chunyang Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunyang Zheng","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, 100085, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, 100085, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093406304","display_name":"Xinyu Liu","orcid":"https://orcid.org/0000-0002-8449-839X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyu Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, 100085, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, 100085, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115602460","display_name":"Wei Liu","orcid":"https://orcid.org/0000-0003-2018-7004"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, 100085, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, 100085, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100672383","display_name":"Yuling Liu","orcid":"https://orcid.org/0000-0002-5127-0882"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuling Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, 100085, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, 100085, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018009227","display_name":"Qinhuo Liu","orcid":"https://orcid.org/0000-0002-3713-9511"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qixu Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, 100085, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, 100085, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100719973"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18361901,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7493094205856323},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.42290258407592773}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7493094205856323},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.42290258407592773}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00349-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00349-y","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00349-y","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1e62efd6b4cd450a8efd9cca423077a5","is_oa":true,"landing_page_url":"https://doaj.org/article/1e62efd6b4cd450a8efd9cca423077a5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-20 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00349-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00349-y","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00349-y","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G529307786","display_name":null,"funder_award_id":"2019163","funder_id":"https://openalex.org/F4320322847","funder_display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences"},{"id":"https://openalex.org/G7022926726","display_name":null,"funder_award_id":"No. 5700-202352606A-3-2-ZN","funder_id":"https://openalex.org/F4320335967","funder_display_name":"Science and Technology Project of State Grid"},{"id":"https://openalex.org/G8701658582","display_name":null,"funder_award_id":"No.2019163","funder_id":"https://openalex.org/F4320322847","funder_display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences"}],"funders":[{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320322847","display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","ror":"https://ror.org/031141b54"},{"id":"https://openalex.org/F4320335892","display_name":"Youth Innovation Promotion Association","ror":null},{"id":"https://openalex.org/F4320335967","display_name":"Science and Technology Project of State Grid","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4412027019.pdf","grobid_xml":"https://content.openalex.org/works/W4412027019.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W1146624807","https://openalex.org/W1451156941","https://openalex.org/W1525967479","https://openalex.org/W1659880361","https://openalex.org/W1966175380","https://openalex.org/W1972524097","https://openalex.org/W1995443851","https://openalex.org/W2045726900","https://openalex.org/W2115248674","https://openalex.org/W2193112429","https://openalex.org/W2520877058","https://openalex.org/W2535603283","https://openalex.org/W2561608512","https://openalex.org/W2594545251","https://openalex.org/W2602351626","https://openalex.org/W2723746209","https://openalex.org/W2771446126","https://openalex.org/W2844827066","https://openalex.org/W2891928976","https://openalex.org/W2911964244","https://openalex.org/W2944306435","https://openalex.org/W2970323597","https://openalex.org/W3008279942","https://openalex.org/W3015975623","https://openalex.org/W3092891978","https://openalex.org/W3094180604","https://openalex.org/W3137713441","https://openalex.org/W3147673361","https://openalex.org/W3154012499","https://openalex.org/W3176913510","https://openalex.org/W4205420911","https://openalex.org/W4229012485","https://openalex.org/W4285140041","https://openalex.org/W4288057716","https://openalex.org/W4320713315","https://openalex.org/W4388858951","https://openalex.org/W4400489652","https://openalex.org/W4405183095","https://openalex.org/W6681943478"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Abstract":[0],"In":[1,74],"recent":[2],"years,":[3],"the":[4,118,148,160,171,213],"evolving":[5],"browser":[6,49,53,196],"fingerprinting":[7,54],"technology":[8,47],"has":[9],"posed":[10],"significant":[11],"challenges":[12],"and":[13,60,93,106,116,121,140,189,204,212],"constant":[14],"demands":[15],"on":[16,71,125],"detection":[17,37,66,83,210],"methods.":[18,38],"Research":[19],"related":[20],"to":[21,109,127,146,169],"malicious":[22],"code":[23,30,91],"shows":[24],"that":[25,68,178],"cross-file":[26,45,52,143,205],"techniques,":[27],"which":[28],"disperse":[29],"into":[31,48],"multiple":[32],"files,":[33,120],"can":[34],"resist":[35],"current":[36],"To":[39,131],"address":[40,147],"this":[41,75,157],"challenge,":[42],"we":[43,77,135],"introduce":[44],"tracking":[46,144],"fingerprinting,":[50,197],"constructing":[51,97],"(XFP).":[55],"The":[56,175],"dispersion":[57],"of":[58,150,162,173,183,187,192],"files":[59,92],"features":[61,108],"in":[62,152,166,194,201],"XFP":[63,87,151],"effectively":[64],"circumvents":[65],"methods":[67],"primarily":[69],"focus":[70],"single-file":[72,203],"tracking.":[73,206],"paper,":[76],"propose":[78],"XFP-Recognizer,":[79],"a":[80,137,142,185,220],"Random":[81],"Forest-based":[82],"method":[84],"for":[85,114,223],"identifying":[86],"behaviors.":[88],"XFP-Recognizer":[89,179,207],"aggregates":[90],"dynamic":[94,105],"APIs":[95],"by":[96],"function":[98],"call":[99],"relationship":[100],"graphs":[101],"(FCRgraphs).":[102],"It":[103],"extracts":[104],"static":[107],"train":[110],"random":[111],"forest":[112],"models":[113],"detecting":[115],"classifying":[117],"aggregated":[119],"then":[122],"backtracks":[123],"based":[124],"FCRgraphs":[126],"mark":[128],"original":[129],"scripts.":[130],"validate":[132],"our":[133],"method,":[134],"implement":[136],"code-splitting":[138],"algorithm":[139],"constructed":[141,214],"dataset":[145,158,161,216],"lack":[149],"real-world":[153],"scenarios.":[154],"We":[155],"combine":[156],"with":[159],"Alexa":[163],"Top-10K":[164],"websites":[165],"different":[167],"proportions":[168],"verify":[170],"effectiveness":[172],"XFP-Recognizer.":[174],"results":[176],"show":[177],"achieved":[180],"an":[181,190],"Accuracy":[182],"92.25%,":[184],"Precision":[186],"97.01%":[188],"AUC":[191],"0.9152":[193],"recognizing":[195],"demonstrating":[198],"superior":[199],"performance":[200],"both":[202],"complements":[208],"existing":[209],"methods,":[211],"split":[215],"also":[217],"serves":[218],"as":[219],"foundational":[221],"resource":[222],"future":[224],"research.":[225]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
