We present a simple yet potentially devastating and hard-to-detect threat, called Gummy Browsers, whereby the browser fingerprinting information can be collected and spoofed without the victim's awareness, thereby compromising the privacy and security of any application that uses browser fingerprinting. The idea is that attacker A first makes the user U connect to his website (or to a well-known site the attacker controls) and transparently collects the information from U that is used for fingerprinting purposes. Then, A orchestrates a browser on his own machine to replicate and transmit the same fingerprinting information when connecting to W, fooling W to think that U is the one requesting the service rather than A. This will allow the attacker to profile U and compromise U's privacy. We design and implement the Gummy Browsers attack using three orchestration methods based on script injection, browser settings and debugging tools, and script modification, that can successfully spoof a wide variety of fingerprinting features to mimic many different browsers (including mobile browsers and the Tor browser). We then evaluate the attack against two state-of-the-art browser fingerprinting systems, FPStalker and Panopticlick. Our results show that A can accurately match his own manipulated browser fingerprint with that of any targeted victim user U's fingerprint for a long period of time, without significantly affecting the tracking of U and when only collecting U's fingerprinting information only once. The TPR (true positive rate) for the tracking of the benign user in the presence of the attack is larger than 0.9 in most cases. The FPR (false positive rate) for the tracking of the attacker is also high, larger than 0.9 in all cases. We also argue that the attack can remain completely oblivious to the user and the website, thus making it extremely difficult to thwart in practice.
翻译:我们展示了一个简单但具有潜在破坏性且难以察觉的威胁,叫做 Gummy 浏览器,这样,浏览器指纹信息可以在没有受害者认识的情况下被收集并涂鸦,从而可以不经受害者认识而收集和涂抹,从而损害使用浏览器指纹的任何应用程序的隐私和安全。 我们的想法是,攻击者A首先让用户U连接到他的网站(或者到一个众所周知的网站攻击者控制器),并以透明的方式从U那里收集用于指纹目的的信息。然后,在他自己机器上设计一个浏览器,复制和传送相同的指纹信息,在连接W时,愚弄W,认为U是请求服务的人而不是A。这将使攻击者能够描述U的隐私和安全。我们设计和实施Gummy Blobers袭击时使用了三种基于脚本注入、浏览器设置和调试工具以及脚本修改的调控方法,这些方法能够成功地将许多不同的浏览器(包括移动浏览器和托尔浏览器)的指纹特征特征特征复制起来。我们随后评估了两个州对用户的指纹攻击事件进行攻击,而用户的准确浏览器跟踪记录系统也非常困难。