Igor Bilogrevic
YOU?
Author Swipe
View article: Byte by Byte: Unmasking Browser Fingerprinting at the Function Level using V8 Bytecode Transformers
Byte by Byte: Unmasking Browser Fingerprinting at the Function Level using V8 Bytecode Transformers Open
Browser fingerprinting enables persistent cross-site user tracking via subtle techniques that often evade conventional defenses or cause website breakage when script-level blocking countermeasures are applied. Addressing these challenges r…
View article: The WASM Cloak: Evaluating Browser Fingerprinting Defenses Under WebAssembly based Obfuscation
The WASM Cloak: Evaluating Browser Fingerprinting Defenses Under WebAssembly based Obfuscation Open
Browser fingerprinting defenses have historically focused on detecting JavaScript(JS)-based tracking techniques. However, the widespread adoption of WebAssembly (WASM) introduces a potential blind spot, as adversaries can convert JS to WAS…
View article: Beyond the Crawl: Unmasking Browser Fingerprinting in Real User Interactions
Beyond the Crawl: Unmasking Browser Fingerprinting in Real User Interactions Open
Browser fingerprinting is a pervasive online tracking technique used increasingly often for profiling and targeted advertising. Prior research on the prevalence of fingerprinting heavily relied on automated web crawls, which inherently str…
View article: Assessing Web Fingerprinting Risk
Assessing Web Fingerprinting Risk Open
Modern Web APIs allow developers to provide extensively customized experiences for website visitors, but the richness of the device information they provide also make them vulnerable to being abused to construct browser fingerprints, devic…
View article: The Double Edged Sword: Identifying Authentication Pages and their Fingerprinting Behavior
The Double Edged Sword: Identifying Authentication Pages and their Fingerprinting Behavior Open
status: Published
View article: Shorts vs. Regular Videos on YouTube: A Comparative Analysis of User Engagement and Content Creation Trends
Shorts vs. Regular Videos on YouTube: A Comparative Analysis of User Engagement and Content Creation Trends Open
YouTube introduced the Shorts video format in 2021, allowing users to upload\nshort videos that are prominently displayed on its website and app. Despite\nhaving such a large visual footprint, there are no studies to date that have\nlooked…
View article: Assessing Web Fingerprinting Risk
Assessing Web Fingerprinting Risk Open
Modern Web APIs allow developers to provide extensively customized experiences for website visitors, but the richness of the device information they provide also make them vulnerable to being abused to construct browser fingerprints, devic…
View article: Don't Interrupt Me - A Large-Scale Study of On-Device Permission Prompt Quieting in Chrome
Don't Interrupt Me - A Large-Scale Study of On-Device Permission Prompt Quieting in Chrome Open
A recent large-scale experiment conducted by Chrome [4] has demonstrated that a "quieter" web permission prompt can reduce unwanted interruptions while only marginally affecting grant rates.However, the experiment and the partial roll-out …
View article: FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting
FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting Open
Browser fingerprinting often provides an attractive alternative to third-party cookies for tracking users across the web.In fact, the increasing restrictions on third-party cookies placed by common web browsers and recent regulations like …
View article: FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting
FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting Open
Browser fingerprinting often provides an attractive alternative to third-party cookies for tracking users across the web. In fact, the increasing restrictions on third-party cookies placed by common web browsers and recent regulations like…
View article: A Study on the Use of Checksums for Integrity Verification of Web Downloads
A Study on the Use of Checksums for Integrity Verification of Web Downloads Open
App stores provide access to millions of different programs that users can download on their computers. Developers can also make their programs available for download on their websites and host the program files either directly on their we…
View article: Reducing Permission Requests in Mobile Apps
Reducing Permission Requests in Mobile Apps Open
Users of mobile apps sometimes express discomfort or concerns with what they see as unnecessary or intrusive permission requests by certain apps. However encouraging mobile app developers to request fewer permissions is challenging because…
View article: Towards Usable Checksums
Towards Usable Checksums Open
Internet users can download software for their computers from app stores (e.g., Mac App Store and Windows Store) or from other sources, such as the developers' websites. Most Internet users in the US rely on the latter, according to our re…
View article: Side-Channel Inference Attacks on Mobile Keypads using Smartwatches
Side-Channel Inference Attacks on Mobile Keypads using Smartwatches Open
Smartwatches enable many novel applications and are fast gaining popularity. However, the presence of a diverse set of on-board sensors provides an additional attack surface to malicious software and services on these devices. In this pape…
View article: A Predictive Model for User Motivation and Utility Implications of Privacy-Protection Mechanisms in Location Check-Ins
A Predictive Model for User Motivation and Utility Implications of Privacy-Protection Mechanisms in Location Check-Ins Open
Location check-ins contain both geographical and semantic information about the visited venues. Semantic information is usually represented by means of tags (e.g., “restaurant”). Such data can reveal some personal information about users b…
View article: "If You Put All The Pieces Together..."
"If You Put All The Pieces Together..." Open
Online services often rely on processing users' data, which can be either provided directly by the users or combined from other services. Although users are aware of the latter, it is unclear whether they are comfortable with such data com…
View article: SecureRun: Cheat-Proof and Private Summaries for Location-Based Activities
SecureRun: Cheat-Proof and Private Summaries for Location-Based Activities Open
Activity-tracking applications, where people record and upload information about their location-based activities (e.g., the routes of their activities), are increasingly popular. Such applications enable users to share information and comp…
View article: A machine-learning based approach to privacy-aware information-sharing in mobile social networks
A machine-learning based approach to privacy-aware information-sharing in mobile social networks Open
Contextual information about users is increasingly shared on mobile social networks. Examples of such information include users' locations, events, activities, and the co-presence of others in proximity. When disclosing personal informatio…
View article: Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms
Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms Open
Location check-ins contain both geographical and semantic information about the visited venues, in the form of tags (e.g., ârestaurantâ). Such data might reveal some personal information about users beyond what they actually want to di…
View article: (Smart)watch your taps
(Smart)watch your taps Open
In this paper, we investigate the feasibility of keystroke inference attacks on handheld numeric touchpads by using smartwatch motion sensors as a side-channel. The proposed attack approach employs supervised learning techniques to accurat…