Skip to main content

Showing 1–7 of 7 results for author: Rudametkin, W

  1. Free Proxies Unmasked: A Vulnerability and Longitudinal Analysis of Free Proxy Services

    Authors: Naif Mehanna, Walter Rudametkin, Pierre Laperdrix, Antoine Vastel

    Abstract: Free-proxies have been widespread since the early days of the Web, helping users bypass geo-blocked content and conceal their IP addresses. Various proxy providers promise faster Internet or increased privacy while advertising their lists comprised of hundreds of readily available free proxies. However, while paid proxy services advertise the support of encrypted connections and high stability, fr… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb'24)

  2. arXiv:2309.11871  [pdf, other

    cs.HC cs.NI cs.SI

    A critical review of mobile device-to-device communication

    Authors: Lauric Desauw, Adrien Luxey-Bitri, Rémy Raes, Romain Rouvoy, Olivier Ruas, Walter Rudametkin

    Abstract: Since the advent of mobile devices, both end-users and the IT industry have been longing for direct device-to-device (D2D) communication capabilities, expecting new kinds of interactive, personalized, and collaborative services. Fifteen years later, many D2D solutions have been implemented and deployed, but their availability and functionality are underwhelming. Arguably, the most widely-adopted D… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

  3. arXiv:2304.14791  [pdf, other

    cs.CY

    Caught in the Game: On the History and Evolution of Web Browser Gaming

    Authors: Naif Mehanna, Walter Rudametkin

    Abstract: Web browsers have come a long way since their inception, evolving from a simple means of displaying text documents over the network to complex software stacks with advanced graphics and network capabilities. As personal computers grew in popularity, developers jumped at the opportunity to deploy cross-platform games with centralized management and a low barrier to entry. Simply going to the right… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

    Journal ref: TheWebConference 2023, Apr 2023, Austin (TX), United States

  4. DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting

    Authors: Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom

    Abstract: Browser fingerprinting aims to identify users or their devices, through scripts that execute in the users' browser and collect information on software or hardware characteristics. It is used to track users or as an additional means of identification to improve security. In this paper, we report on a new technique that can significantly extend the tracking time of fingerprint-based tracking methods… ▽ More

    Submitted 24 January, 2022; originally announced January 2022.

    Comments: Network and Distributed System Security Symposium, Feb 2022, San Diego, United States

  5. arXiv:2103.00590  [pdf, other

    cs.CR

    An iterative technique to identify browser fingerprinting scripts

    Authors: Antonin Durey, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy

    Abstract: Browser fingerprinting is a stateless identification technique based on browser properties. Together, they form an identifier that can be collected without users' notice and has been studied to be unique and stable. As this technique relies on browser properties that serve legitimate purposes, the detection of this technique is challenging. While several studies propose classification techniques,… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

  6. arXiv:2003.04463  [pdf, other

    cs.CR

    Actions speak louder than words: Semi-supervised learning for browser fingerprinting detection

    Authors: Sarah Bird, Vikas Mishra, Steven Englehardt, Rob Willoughby, David Zeber, Walter Rudametkin, Martin Lopatka

    Abstract: As online tracking continues to grow, existing anti-tracking and fingerprinting detection techniques that require significant manual input must be augmented. Heuristic approaches to fingerprinting detection are precise but must be carefully curated. Supervised machine learning techniques proposed for detecting tracking require manually generated label-sets. Seeking to overcome these challenges, we… ▽ More

    Submitted 9 March, 2020; originally announced March 2020.

  7. An Approach and Benchmark to Detect Behavioral Changes of Commits in Continuous Integration

    Authors: Benjamin Danglot, Martin Monperrus, Walter Rudametkin, Benoit Baudry

    Abstract: When a developer pushes a change to an application's codebase, a good practice is to have a test case specifying this behavioral change. Thanks to continuous integration (CI), the test is run on subsequent commits to check that they do no introduce a regression for that behavior. In this paper, we propose an approach that detects behavioral changes in commits. As input, it takes a program, its tes… ▽ More

    Submitted 16 December, 2019; v1 submitted 22 February, 2019; originally announced February 2019.

    Journal ref: Empirical Software Engineering, Springer Verlag, 2019