{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:57:10Z","timestamp":1725656230855},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["70NANB18H207"],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]},{"name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","award":["854188"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1145\/3314058.3314062","type":"proceedings-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T12:45:07Z","timestamp":1561121107000},"page":"1-9","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Browser fingerprinting using combinatorial sequence testing"],"prefix":"10.1145","author":[{"given":"Bernhard","family":"Garn","sequence":"first","affiliation":[{"name":"SBA Research, Vienna, Austria"}]},{"given":"Dimitris E.","family":"Simos","sequence":"additional","affiliation":[{"name":"SBA Research, Vienna, Austria"}]},{"given":"Stefan","family":"Zauner","sequence":"additional","affiliation":[{"name":"FH Campus Wien, Vienna, Austria"}]},{"given":"Rick","family":"Kuhn","sequence":"additional","affiliation":[{"name":"NIST"}]},{"given":"Raghu","family":"Kacker","sequence":"additional","affiliation":[{"name":"NIST"}]}],"member":"320","published-online":{"date-parts":[[2019,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1137\/120894099"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.6"},{"key":"e_1_3_2_1_4_1","unstructured":"Tim Dierks and Eric Rescorla. 2008. RFC 5246 - The Transport Layer Security (TLS) Protocol Version 1.2. https:\/\/tools.ietf.org\/html\/rfc5246. (2008). Accessed: 2019-01-07. Tim Dierks and Eric Rescorla. 2008. RFC 5246 - The Transport Layer Security (TLS) Protocol Version 1.2. https:\/\/tools.ietf.org\/html\/rfc5246. (2008). Accessed: 2019-01-07."},{"volume-title":"How Unique Is Your Web Browser?","author":"Eckersley Peter","key":"e_1_3_2_1_5_1","unstructured":"Peter Eckersley . 2010. How Unique Is Your Web Browser? . In Privacy Enhancing Technologies, Mikhail J. Atallah and Nicholas J. Hopper (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 1--18. Peter Eckersley. 2010. How Unique Is Your Web Browser?. In Privacy Enhancing Technologies, Mikhail J. Atallah and Nicholas J. Hopper (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1--18."},{"key":"e_1_3_2_1_6_1","unstructured":"Esra Erdem Katsumi Inoue Johannes Oetsch J\u00f6rg P\u00fchrer Hans Tompits and Cemal Yilmaz. 2011. Answer-set programming as a new approach to event-sequence testing. (2011). Esra Erdem Katsumi Inoue Johannes Oetsch J\u00f6rg P\u00fchrer Hans Tompits and Cemal Yilmaz. 2011. Answer-set programming as a new approach to event-sequence testing. (2011)."},{"volume-title":"Fingerprinting Web Users Through Font Metrics","author":"Fifield David","key":"e_1_3_2_1_7_1","unstructured":"David Fifield and Serge Egelman . 2015. Fingerprinting Web Users Through Font Metrics . In Financial Cryptography and Data Security, Rainer B\u00f6hme and Tatsuaki Okamoto (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 107--124. David Fifield and Serge Egelman. 2015. Fingerprinting Web Users Through Font Metrics. In Financial Cryptography and Data Security, Rainer B\u00f6hme and Tatsuaki Okamoto (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 107--124."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCI.2012.6222671"},{"volume-title":"Combinatorial Methods for Event Sequence Testing. In 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation. 601--609","author":"Kuhn D. R.","key":"e_1_3_2_1_9_1","unstructured":"D. R. Kuhn , J. M. Higdon , J. F. Lawrence , R. N. Kacker , and Y. Lei . 2012 . Combinatorial Methods for Event Sequence Testing. In 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation. 601--609 . D. R. Kuhn, J. M. Higdon, J. F. Lawrence, R. N. Kacker, and Y. Lei. 2012. Combinatorial Methods for Event Sequence Testing. In 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation. 601--609."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2014.34"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2847247"},{"volume-title":"Proceedings of W2SP","year":"2012","author":"Mowery Keaton","key":"e_1_3_2_1_12_1","unstructured":"Keaton Mowery and Hovav Shacham . 2012 . Pixel perfect: Fingerprinting canvas in HTML5 . Proceedings of W2SP (2012), 1--12. Keaton Mowery and Hovav Shacham. 2012. Pixel perfect: Fingerprinting canvas in HTML5. Proceedings of W2SP (2012), 1--12."},{"volume-title":"Web 2.0 Workshop on Security and Privacy (W2SP)","author":"Mulazzani Martin","key":"e_1_3_2_1_13_1","unstructured":"Martin Mulazzani , Philipp Reschl , Markus Huber , Manuel Leithner , Sebastian Schrittwieser , Edgar Weippl , and FC Wien . 2013. Fast and reliable browser identification with javascript engine fingerprinting . In Web 2.0 Workshop on Security and Privacy (W2SP) , Vol. 5 . Citeseer . Martin Mulazzani, Philipp Reschl, Markus Huber, Manuel Leithner, Sebastian Schrittwieser, Edgar Weippl, and FC Wien. 2013. Fast and reliable browser identification with javascript engine fingerprinting. In Web 2.0 Workshop on Security and Privacy (W2SP), Vol. 5. Citeseer."},{"key":"e_1_3_2_1_14_1","unstructured":"SQLite project. 2019. SQLite. https:\/\/www.sqlite.org\/index.html. (2019). Accessed: 2019-01-07. SQLite project. 2019. SQLite. https:\/\/www.sqlite.org\/index.html. (2019). Accessed: 2019-01-07."},{"key":"e_1_3_2_1_15_1","unstructured":"Python Software Foundation. 2019. Python. https:\/\/www.python.org\/. (2019). Accessed: 2019-01-07. Python Software Foundation. 2019. Python. https:\/\/www.python.org\/. (2019). Accessed: 2019-01-07."},{"key":"e_1_3_2_1_16_1","unstructured":"Research project of the Electronic Frontier Foundation. 2019. Panopticlick. https:\/\/panopticlick.eff.org\/. (2019). Accessed: 2019-01-07. Research project of the Electronic Frontier Foundation. 2019. Panopticlick. https:\/\/panopticlick.eff.org\/. (2019). Accessed: 2019-01-07."},{"volume-title":"Testing TLS using planning-based combinatorial methods and execution framework. Software Quality Journal","year":"2018","author":"Simos Dimitris E","key":"e_1_3_2_1_17_1","unstructured":"Dimitris E Simos , Josip Bozic , Bernhard Garn , Manuel Leithner , Feng Duan , Kristoffer Kleine , Yu Lei , and Franz Wotawa . 2018. Testing TLS using planning-based combinatorial methods and execution framework. Software Quality Journal ( 2018 ), 1--27. Dimitris E Simos, Josip Bozic, Bernhard Garn, Manuel Leithner, Feng Duan, Kristoffer Kleine, Yu Lei, and Franz Wotawa. 2018. Testing TLS using planning-based combinatorial methods and execution framework. Software Quality Journal (2018), 1--27."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.314"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978411"},{"volume-title":"Advances on Broadband and Wireless Computing, Communication and Applications, Leonard Barolli, Fang-Yie Leu, Tomoya Enokido, and Hsing-Chung Chen (Eds.)","author":"Tanabe Kazuhisa","key":"e_1_3_2_1_20_1","unstructured":"Kazuhisa Tanabe , Ryohei Hosoya , and Takamichi Saito . 2019. Combining Features in Browser Fingerprinting . In Advances on Broadband and Wireless Computing, Communication and Applications, Leonard Barolli, Fang-Yie Leu, Tomoya Enokido, and Hsing-Chung Chen (Eds.) . Springer International Publishing , Cham , 671--681. Kazuhisa Tanabe, Ryohei Hosoya, and Takamichi Saito. 2019. Combining Features in Browser Fingerprinting. In Advances on Broadband and Wireless Computing, Communication and Applications, Leonard Barolli, Fang-Yie Leu, Tomoya Enokido, and Hsing-Chung Chen (Eds.). Springer International Publishing, Cham, 671--681."},{"key":"e_1_3_2_1_21_1","unstructured":"The Perl Foundation. 2019. Perl. https:\/\/www.perl.org\/. (2019). Accessed: 2019-01-07. The Perl Foundation. 2019. Perl. https:\/\/www.perl.org\/. (2019). Accessed: 2019-01-07."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.33"},{"key":"e_1_3_2_1_23_1","unstructured":"Z. B. Ratliff. 2018. Black-box Testing Mobile Applications Using Sequence Covering Arrays. (2018). undergraduate thesis Texas A&M University. Z. B. Ratliff. 2018. Black-box Testing Mobile Applications Using Sequence Covering Arrays. (2018). undergraduate thesis Texas A&M University."},{"key":"e_1_3_2_1_24_1","unstructured":"Zachary Ratliff. 2019. CSCM-Tool. https:\/\/github.com\/zachratliff22\/CSCM-Tool. (2019). Accessed: 2019-01-07. Zachary Ratliff. 2019. CSCM-Tool. https:\/\/github.com\/zachratliff22\/CSCM-Tool. (2019). Accessed: 2019-01-07."}],"event":{"name":"HotSoS: Hot Topics in the Science of Security Symposium","sponsor":["National Security Agency National Security Agency"],"location":"Nashville Tennessee USA","acronym":"HotSoS"},"container-title":["Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314058.3314062","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314058.3314062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T05:58:00Z","timestamp":1673675880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3314062"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":24,"alternative-id":["10.1145\/3314058.3314062","10.1145\/3314058"],"URL":"https:\/\/doi.org\/10.1145\/3314058.3314062","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"2019-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}