Show simple item record

dc.contributorBarlet Ros, Pere
dc.contributor.authorFallace, Federico
dc.date.accessioned2017-12-01T13:06:54Z
dc.date.available2017-12-01T13:06:54Z
dc.date.issued2017-06
dc.identifier.urihttp://hdl.handle.net/2117/111450
dc.description.abstractIn the last years, web tracking has became a fast-growing phenomenon. Pro- filing users to provide targeted advertisement is a business that counts hundreds of companies and billions of dollars. On the other hand, communities, researchers and other companies are building countermeasures to prevent tracking practices, so the techniques are becoming more sophisticated and hidden. This work has the goal of uncovering the obfuscation that is becoming common in web tracking methods and, in particular a popular tracking method called canvas fingerprinting. The proposed approach could also be used in the future for other tracking techniques. Our tests seek also to uncover web tracking methods not situated in the home pages, but in the sub links, in order to discover if there is a substantial difference. We crawled more than 830K links presents in the home pages of the first 5K most visited web sites according to Alexa’s ranking. Our tool uncovered the real calls of the canvas fingerprinting method toDataURL(), making it impossible to hide by web trackers. The results showed that 12% of the analyzed domains have plain-text canvas fingerprinting methods in the home page, while 1,2% uses obfuscation and 86,8% is canvas free. On the other hand, when we analyzed the sub links, the percentage increased to 30,5% for plain-text canvas fingerprinting and to 10,5% for the obfuscated one, while only 59% of the domains were canvas free. In addition, we uncovered 2695 trackers and just the 3 most popular covered more than 20% of the visited domains. Finally we analyzed the files from where the tracking method was called, and we found out that the same tracking code is used in many different domains; the most widespread was tanxssp.js, present in 71 different domains.
dc.language.isoeng
dc.publisherUniversitat Politècnica de Catalunya
dc.subjectÀrees temàtiques de la UPC::Informàtica
dc.subject.lcshJavaScript (Computer program language)
dc.subject.lcshWorld Wide Web
dc.subject.otherweb tracking
dc.subject.othercanvas
dc.subject.othercanvas fingerprinting
dc.subject.otherobfuscation
dc.subject.otherobfuscated programming
dc.subject.otherJavaScript
dc.titleAnalysis of the use of obfusctated web tracking
dc.typeMaster thesis
dc.subject.lemacJavaScript (Llenguatge de programació)
dc.subject.lemacWeb
dc.identifier.slug128030
dc.rights.accessOpen Access
dc.date.updated2017-07-11T04:00:24Z
dc.audience.educationlevelMàster


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

All rights reserved. This work is protected by the corresponding intellectual and industrial property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public communication or transformation of this work are prohibited without permission of the copyright holder