Skip to main content

Showing 1–5 of 5 results for author: Al-Fannah, N M

Searching in archive cs. Search in all archives.
.
  1. Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking

    Authors: Nasser Mohammed Al-Fannah, Wanpeng Li, Chris J Mitchell

    Abstract: Browser fingerprinting is a relatively new method of uniquely identifying browsers that can be used to track web users. In some ways it is more privacy-threatening than tracking via cookies, as users have no direct control over it. A number of authors have considered the wide variety of techniques that can be used to fingerprint browsers; however, relatively little information is available on how… ▽ More

    Submitted 23 May, 2019; originally announced May 2019.

  2. arXiv:1709.05395  [pdf, other

    cs.CR

    One Leak Will Sink A Ship: WebRTC IP Address Leaks

    Authors: Nasser Mohammed Al-Fannah

    Abstract: The introduction of the WebRTC API to modern browsers has brought about a new threat to user privacy. This API causes a range of client IP addresses to become available to a visited website via JavaScript even if a VPN is in use. This a potentially serious problem for users utilizing VPN services for anonymity. In order to better understand the magnitude of this issue, we tested widely used browse… ▽ More

    Submitted 15 September, 2017; originally announced September 2017.

  3. arXiv:1704.02972   

    cs.CR

    Using Aesthetic Judgements to Distinguish between Humans and Computers

    Authors: Nasser Mohammed Al-Fannah

    Abstract: As a result of continuing advances in computer capabilities, it is becoming increasingly difficult to distinguish between humans and computers in the digital world. We propose using the fundamental human ability to distinguish between things that are aesthetically pleasing and those that are not as the basis of a method to verify that a communicating party is human. We discuss one possible impleme… ▽ More

    Submitted 8 July, 2019; v1 submitted 8 April, 2017; originally announced April 2017.

    Comments: There are errors in the user trial described in 10.1.1 of the paper. Due to several reasons including that one of the described CAPTCHAs no longer exists, the author is unable to repeat the trial. However, it is important to note that the aforementioned trial only represents a small part of the results reported in the study. To the author's knowledge, the rest of the study is valid and sound

  4. arXiv:1704.02803  [pdf, other

    cs.CR

    Making Defeating CAPTCHAs Harder for Bots

    Authors: Nasser Mohammed Al-Fannah

    Abstract: For a number of years, many websites have used CAPTCHAs to filter out interactions by bots. However, attackers have found ways to circumvent CAPTCHAs by programming bots to solve or bypass them, or even relay them for humans to solve. In order to reduce the chances of success of such attacks, CAPTCHAs can be strengthened by the addition of certain safeguards. In this paper, we discuss seven existi… ▽ More

    Submitted 10 April, 2017; originally announced April 2017.

  5. arXiv:1703.05066  [pdf, other

    cs.CR

    Not All Browsers Are Created Equal: Comparing Web Browser Fingerprintability

    Authors: Nasser Mohammed Al-Fannah, Wanpeng Li

    Abstract: Browsers and their users can be tracked even in the absence of a persistent IP address or cookie. Unique and hence identifying pieces of information, making up what is known as a fingerprint, can be collected from browsers by a visited website, e.g. using JavaScript. However, browsers vary in precisely what information they make available, and hence their fingerprintability may also vary. In this… ▽ More

    Submitted 8 July, 2019; v1 submitted 15 March, 2017; originally announced March 2017.