Estimating CPU Features by Browser Fingerprinting

2016 
Browser fingerprinting is getting popular in cutting edge Web developers. It typically uses the header information, such as user-agent and plugins. However, the header information can easily be modified or altered by configuration or a browser's extensions. Unlike the header information, hardware information is difficult to be changed, and is regarded as valuable information in browser fingerprinting. Therefore, in this paper, we propose a method that infers the presence or absence of a CPU extension called Advanced Encryption Standard New Instructions (AES-NI) and Intel Turbo Boost Technology (Turbo Boost). Theoretic analysis and experimental results indicate that this method is efficient and feasible for browser fingerprinting.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    3
    References
    5
    Citations
    NaN
    KQI
    []