March 7, 2024, 5:11 a.m. | Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby

cs.CR updates on arXiv.org arxiv.org

arXiv:2308.03417v2 Announce Type: replace
Abstract: While privacy-focused browsers have taken steps to block third-party cookies and mitigate browser fingerprinting, novel tracking techniques that can bypass existing countermeasures continue to emerge. Since trackers need to share information from the client-side to the server-side through link decoration regardless of the tracking technique they employ, a promising orthogonal approach is to detect and sanitize tracking information in decorated links. To this end, we present PURL (pronounced purel-l), a machine-learning approach that leverages a …

arxiv block browser browser fingerprinting browsers bypass can client client-side continue cookies countermeasures cs.cr cs.lg fingerprinting information link novel party privacy safe server share share information taken techniques third third-party trackers tracking

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cybersecurity Engineer

@ Booz Allen Hamilton | USA, VA, Arlington (1550 Crystal Dr Suite 300) non-client

Invoice Compliance Reviewer

@ AC Disaster Consulting | Fort Myers, Florida, United States - Remote

Technical Program Manager II - Compliance

@ Microsoft | Redmond, Washington, United States

Head of U.S. Threat Intelligence / Senior Manager for Threat Intelligence

@ Moonshot | Washington, District of Columbia, United States

Customer Engineer, Security, Public Sector

@ Google | Virginia, USA; Illinois, USA