Thursday, May 22, 2025
HomeNetwork SecurityDrawnApart - A New Fingerprinting Technique Used to Track Your Activities Online

DrawnApart – A New Fingerprinting Technique Used to Track Your Activities Online

Published on

SIEM as a Service

Follow Us on Google News

Recently to create unique digital fingerprints and use them for web surveillance purposes, the cyber security analysts from Ben Gurion University, the University of Lille, and the University of Adelaide have examined the possibility of using GPUs.

To know and demonstrate the outcomes, the researchers tested 2550 devices with 1605 individual CPU configs, and they dubbed this method “DrawnApart.”

While testing this method, it has been noticed that by up to 67%, median tracking duration can be increased with DrawnApart as compared to current methods.

- Advertisement - Google News

Here, using WebGL (It’s a cross-platform API for rendering 3D graphics in the browser), the researchers explained and tested the possibility to generate distinctive GPU-based digital fingerprints of tracked systems.

Abilities of DrawnApart

The DrawnApart tracking system can do several tasks by using the WebGL, and here we have mentioned the key ones below:-

  • Count the number and speed of execution units in the GPU.
  • Measure the time it takes for vertex rendering to complete.
  • Handle stop functions.
  • Hardware configuration.
  • OS Data.
  • Timezones.
  • Screen resolution.
  • Language using. 
  • Fonts using. 

As part of the vertex shader to fix the problem of having random execution units handling calculations, the DrawnApart uses the short GLSL programs that are executed by the target GPU, and due to this, the workload distribution could be predicted.

An on-screen measurement method and an off-screen method has been developed to perform two tests:-

  • A small number of computationally intensive operations.
  • Less intensive test that subjects the GPU to a longer.

For the creation of a digital fingerprint, 176 measurements were taken at 16 points generated by the process.

Not only that, even when other hardware on the systems were swapped to see if the footprints would still be visible or not, it’s also been discovered that on the GPU only the digital fingerprints depend.

Considerations

However, if a set of integrated circuits is built using an identical manufacturing process, it would have the:-

  • Same processing power rating.
  • The number of processor units.
  • Same cores.
  • Same architecture.

While in normal day-to-day operations, all these are indistinguishable, and this becomes useful for DrawnApart, and by highlighting them, it triggers functional aspects. 

Moreover, the offline tracking algorithm can provide an average tracking time of 17.5 days, but with the help of GPU digital fingerprints, this time is increased to 28 days. 

And here, the assessment was based on the testing conditions where the GPU with no voltage fluctuation operates the temperature range between 26.4°C and 37°C.

Apart from this, other conditions don’t affect the DrawnApart, and here are the conditions that don’t affect:-

  • Workload changes.
  • GPU payloads from other browser tabs.
  • System reboots.
  • Other run-time changes.

While the Khronos Group, which develop the WebGL API, has already formed a technical team to discuss all the possible solutions after receiving the researchers’ report.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Target Mobile Users Using PWA JavaScript to Bypass Browser Security

A sophisticated new injection campaign has been uncovered, targeting mobile users through malicious third-party...

Docker Zombie Malware Infects Containers for Crypto Mining and Self-Replication

A novel malware campaign targeting containerized infrastructures has emerged, exploiting insecurely exposed Docker APIs...

Hackers Masquerade as Organizations to Steal Payroll Logins and Redirect Payments from Employees

ReliaQuest, hackers have deployed a cunning search engine optimization (SEO) poisoning scheme to orchestrate...

PupkinStealer Exploits Web Browser Passwords and App Tokens to Exfiltrate Data Through Telegram

A newly identified .NET-based information-stealing malware, dubbed PupkinStealer (also known as PumpkinStealer in some...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Europol Launches Taskforce to Combat Violence-as-a-Service Networks

Europol has announced the launch of a powerful new Operational Taskforce (OTF), codenamed GRIMM, to...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Detecting And Blocking DNS Tunneling Techniques Using Network Analytics

DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security...