Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView (2208.01968v1)

Published 3 Aug 2022 in cs.CR and cs.SE

Abstract: Numerous studies demonstrated that browser fingerprinting is detrimental to users' security and privacy. However, little is known about the effects of browser fingerprinting on Android hybrid apps -- where a stripped-down Chromium browser is integrated into an app. These apps expand the attack surface by employing two-way communication between native apps and the web. This paper studies the impact of browser fingerprinting on these embedded browsers. To this end, we instrument the Android framework to record and extract information leveraged for fingerprinting. We study over 20,000 apps, including the most popular apps from the Google play store. We exemplify security flaws and severe information leaks in popular apps like Instagram. Our study reveals that fingerprints in hybrid apps potentially contain account-specific and device-specific information that identifies users across multiple devices uniquely. Besides, our results show that the hybrid app browser does not always adhere to standard browser-specific privacy policies.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (4)
  1. Abhishek Tiwari (17 papers)
  2. Jyoti Prakash (4 papers)
  3. Alimerdan Rahimov (1 paper)
  4. Christian Hammer (8 papers)
Citations (1)

Summary

We haven't generated a summary for this paper yet.