Skip to main content

Showing 1–8 of 8 results for author: Laperdrix, P

.
  1. Free Proxies Unmasked: A Vulnerability and Longitudinal Analysis of Free Proxy Services

    Authors: Naif Mehanna, Walter Rudametkin, Pierre Laperdrix, Antoine Vastel

    Abstract: Free-proxies have been widespread since the early days of the Web, hel** users bypass geo-blocked content and conceal their IP addresses. Various proxy providers promise faster Internet or increased privacy while advertising their lists comprised of hundreds of readily available free proxies. However, while paid proxy services advertise the support of encrypted connections and high stability, fr… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb'24)

  2. UA-Radar: Exploring the Impact of User Agents on the Web

    Authors: Jean Luc Intumwayase, Imane Fouad, Pierre Laperdrix, Romain Rouvoy

    Abstract: In the early days of the web, giving the same web page to different browsers could provide very different results. As the rendering engine behind each browser would differ, some elements of a page could break or be positioned in the wrong location. At that time, the User Agent (UA) string was introduced for content negotiation. By knowing the browser used to connect to the server, a developer coul… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

    Comments: ACM CCS 2023, Nov 2023, Copenhagen, Denmark

  3. Breaking Bad: Quantifying the Addiction of Web Elements to JavaScript

    Authors: Romain Fouquet, Pierre Laperdrix, Romain Rouvoy

    Abstract: While JavaScript established itself as a cornerstone of the modern web, it also constitutes a major tracking and security vector, thus raising critical privacy and security concerns. In this context, some browser extensions propose to systematically block scripts reported by crowdsourced trackers lists. However, this solution heavily depends on the quality of these built-in lists, which may be dep… ▽ More

    Submitted 25 January, 2023; originally announced January 2023.

    Comments: ACM Transactions on Internet Technology, In press

  4. JSRehab: Weaning Common Web Interface Components from JavaScript Addiction

    Authors: Romain Fouquet, Pierre Laperdrix, Romain Rouvoy

    Abstract: Leveraging JavaScript (JS) for User Interface (UI) interactivity has been the norm on the web for many years. Yet, using JS increases bandwidth and battery consumption as scripts need to be downloaded and processed by the browser. Plus, client-side JS may expose visitors to security vulnerabilities such as Cross-Site Scripting (XSS).This paper introduces a new server-side plugin, called JSRehab, t… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

    Comments: WWW '22 Companion, May 2022, Lyon, France

  5. DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting

    Authors: Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom

    Abstract: Browser fingerprinting aims to identify users or their devices, through scripts that execute in the users' browser and collect information on software or hardware characteristics. It is used to track users or as an additional means of identification to improve security. In this paper, we report on a new technique that can significantly extend the tracking time of fingerprint-based tracking methods… ▽ More

    Submitted 24 January, 2022; originally announced January 2022.

    Comments: Network and Distributed System Security Symposium, Feb 2022, San Diego, United States

  6. Multi-Variant Execution at the Edge

    Authors: Javier Cabrera-Arteaga, Pierre Laperdrix, Martin Monperrus, Benoit Baudry

    Abstract: Edge-cloud computing offloads parts of the computations that traditionally occurs in the cloud to edge nodes,e.g., CDN servers, in order to get closer to the users and reduce latency. To improve performance even further, WebAssembly is increasingly used in this context. Edge-cloud computing providers, such as Fastly or Cloudflare, let their clients deploy stateless services in the form of WebAssem… ▽ More

    Submitted 16 December, 2022; v1 submitted 18 August, 2021; originally announced August 2021.

    Journal ref: Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022

  7. arXiv:2103.00590  [pdf, other

    cs.CR

    An iterative technique to identify browser fingerprinting scripts

    Authors: Antonin Durey, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy

    Abstract: Browser fingerprinting is a stateless identification technique based on browser properties. Together, they form an identifier that can be collected without users' notice and has been studied to be unique and stable. As this technique relies on browser properties that serve legitimate purposes, the detection of this technique is challenging. While several studies propose classification techniques,… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

  8. arXiv:1905.01051  [pdf, other

    cs.CR cs.CY cs.SE

    Browser Fingerprinting: A survey

    Authors: Pierre Laperdrix, Nataliia Bielova, Benoit Baudry, Gildas Avoine

    Abstract: With this paper, we survey the research performed in the domain of browser fingerprinting, while providing an accessible entry point to newcomers in the field. We explain how this technique works and where it stems from. We analyze the related work in detail to understand the composition of modern fingerprints and see how this technique is currently used online. We systematize existing defense sol… ▽ More

    Submitted 4 November, 2019; v1 submitted 3 May, 2019; originally announced May 2019.