761 Hits in 8.7 sec

On the Robustness of Mobile Device Fingerprinting

Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, Giorgio Giacinto
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robustness of tracking techniques.  ...  Fingerprinting of web clients is often seen as an offence to web users' privacy as it usually takes place without the users' knowledge, awareness, and consent.  ...  We would like to thank our shepherd Adam Aviv for his support in finalizing this paper and the anonymous reviewers for their constructive and valuable comments.  ... 
doi:10.1145/2818000.2818032 dblp:conf/acsac/HupperichMKHG15 fatcat:svdfsg6ip5brdces6ro2s3ow6q

Session Fingerprinting in Android via Web-to-App Intercommunication

Efthimios Alepis, Constantinos Patsakis
2018 Security and Communication Networks  
Having Android AOSP as our baseline, we prove that web pages, by using several inherent mechanisms, can cooperate with installed mobile apps to identify which sessions operate in specific devices and consequently  ...  This work introduces some novel user deanonymization approaches for device and user fingerprinting in Android.  ...  Acknowledgments This work was supported by the European Commission under the Horizon 2020 Programme (H2020), as part of the OPERANDO project (Grant Agreement no. 653704).  ... 
doi:10.1155/2018/7352030 fatcat:q2kjdcsukzcufbeanxggpezvrq

Fingerprinting Smart Devices Through Embedded Acoustic Components [article]

Anupam Das, Nikita Borisov, Matthew Caesar
2014 arXiv   pre-print
Fingerprinting smart devices can assist in authenticating physical devices, but it can also jeopardize privacy by allowing remote identification without user awareness.  ...  Our study identifies the prominent acoustic features capable of fingerprinting devices with high success rate and examines the effect of background noise and other variables on fingerprinting accuracy.  ...  Benjamin for his valuable input during the initial phase of the project. We would also like to thank the Computer Science department at UIUC and Google for providing us with the Motorola Droid phones.  ... 
arXiv:1403.3366v1 fatcat:qvpmddfwpzcqdg2ulxhwiuykve

Experience with heterogenous clock-skew based device fingerprinting

Swati Sharma, Alefiya Hussain, Huzur Saran
2012 Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results - LASER '12  
The goal of this research is to validate clock skew based device fingerprinting introduced in 2005 and explore the feasibility of its usage and/or modification to facilitate unique device identification  ...  Thus, for a moderate-size network, clock skew based fingerprints provide a stable and conclusive means of identification for desktops and laptops but show jumps for the handhelds.  ...  Clock skew based fingerprint identifies a device based on the negligible shift in system clocks and hence, provides a more robust alternative that is complex to spoof as it depends only on the system hardware  ... 
doi:10.1145/2379616.2379618 fatcat:bh37qdbmerhvbeumrav3ih3sae

Google Android: A State-of-the-Art Review of Security Mechanisms [article]

A. Shabtai, Y. Elovici Department of Information Systems Engineering Ben-Gurion University Israel, Department of Computer Science Ben-Gurion University Israel, Deutsche Telekom Laboratories at Ben-Gurion University Israel)
2009 arXiv   pre-print
The incorporation of integrated access services to the Internet on such mobile devices, however, increases their exposure to damages inflicted by various types of malware.  ...  Our review of current academic and commercial solutions in the area of smartphone security yields a list of applied and recommended defense mechanisms for hardening mobile devices in general and the Android  ...  ., fingerprint scanning or using a smartphone's camera) are also beginning to emerge for mobile devices.  ... 
arXiv:0912.5101v1 fatcat:lco6bcdjfffvdjaopqf24jmz2u

PMF (peptide-mass fingerprinting) [chapter]

2008 Encyclopedia of Genetics, Genomics, Proteomics and Informatics  
PCR amplification can be performed with a variety of mechanical devices, including chemical amplification on a microchip where the 20 cycles may be completed as fast as in 90 seconds.  ...  In biology, phase diagrams can shed light on the mechanisms of interaction within a system, e.g., in a genetic network.  ...  During the last three to four decades, hundreds of protein kinases have been discovered that can be classified into serine/threonine (TGF- The primary structure means the sequence of the amino acids.  ... 
doi:10.1007/978-1-4020-6754-9_13064 fatcat:pzr5w5d5tvbyte6vp2kh3unfhe

Tales from the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem

Pelayo Vallina, Álvaro Feal, Julien Gamba, Narseo Vallina-Rodriguez, Antonio Fernandez-Anta
2019 Zenodo  
Modern privacy regulations, including the General Data Protection Regulation (GDPR) in the European Union, aim to control user tracking activities in websites and mobile applications.  ...  The results indicate that, as in the regular web, tracking is prevalent across pornographic sites: 72% of the websites use third-party cookies and 5% leverage advanced user fingerprinting technologies.  ...  Hamed Haddadi (Imperial College London) for their constructive feedback on the preparation of the final version of this paper.  ... 
doi:10.5281/zenodo.3462051 fatcat:elsawl224jgvrbtevjlmjlbzvi

An extensive review of data security infrastructure and legislature

Harshit Bhavnani, Shreyansh Bardia, Aniket Modi, Ujwal Shah
2021 Security and Privacy  
One of the consequences of the ubiquity of these devices is the daily generation of data in large quantities.  ...  The last few decades have witnessed technology progress with leaps and bounds leading to the creation and global adoption of different types of digital devices and platforms that can make personalized  ...  on connectivity, mobile sensing, and applications used by the mobile devices.  ... 
doi:10.1002/spy2.189 fatcat:ht3pde37e5e2tk4ptpnenou4qy

Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications

Kenneth Li Minn Ang, Jasmine Kah Phooi Seng, Ericmoore Ngharamike
2022 Future Internet  
Mobile crowdsourcing can be seen as a new paradigm contributing to the development of the IoT.  ...  Crowdsourcing can play an important role in the Internet of Things (IoT) applications for information sensing and gathering where the participants are equipped with geolocated devices.  ...  The authors presented AnonySense, a general architecture focusing on privacy-aware mobile crowdsourcing.  ... 
doi:10.3390/fi14020049 fatcat:o62tjaayyvfnjc75irzkpzu5vy

Review of Indoor Positioning: Radio Wave Technology

Tan Kim Geok, Khaing Zar Aung, Moe Sandar Aung, Min Thu Soe, Azlan Abdaziz, Chia Pao Liew, Ferdous Hossain, Chih P. Tso, Wong Hin Yong
2020 Applied Sciences  
The indoor positioning system (IPS) is becoming increasing important in accurately determining the locations of objects by the utilization of micro-electro-mechanical-systems (MEMS) involving smartphone  ...  In summary, the recent advanced algorithms can offer precise positioning behaviour for an unknown environment in indoor locations.  ...  Thus, a radio channel combination can support escape from misclassification instead of depending on one radio channel.  ... 
doi:10.3390/app11010279 fatcat:le6p5l7gebftndyiirslmgdx5a

Security Issues in Ubiquitous Computing* [chapter]

Frank Stajano
2010 Handbook of Ambient Intelligence and Smart Environments  
Acknowledgements This chapter is based on copyrighted material from my book Security for Ubiquitous Computing (both from the first edition published by Wiley in 2002 and from the draft  ...  • What attacks can I deploy on an industrial scale, replicating them with little effort on all the devices of this model?  ...  to control the amount of information disclosed to applications and other users by the location tracking system.  ... 
doi:10.1007/978-0-387-93808-0_11 fatcat:avldavvpmrgqhamk6ewpck7k7y

Deep Learning in Mobile and Wireless Networking: A Survey

Chaoyun Zhang, Paul Patras, Hamed Haddadi
2019 IEEE Communications Surveys and Tutorials  
The rapid uptake of mobile devices and the rising popularity of mobile applications and services pose unprecedented demands on mobile and wireless networking infrastructure.  ...  Upcoming 5G systems are evolving to support exploding mobile traffic volumes, real-time extraction of fine-grained analytics, and agile management of network resources, so as to maximize user experience  ...  Mobile ASR can also accelerate text input on mobile devices, Ruan et al.'  ... 
doi:10.1109/comst.2019.2904897 fatcat:xmmrndjbsfdetpa5ef5e3v4xda

Toward Engineering a Secure Android Ecosystem

Meng Xu, Chenxiong Qian, Sangho Lee, Taesoo Kim, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee
2016 ACM Computing Surveys  
The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things.  ...  We organize the most recent security research on the Android platform into two categories: the software stack and the ecosystem.  ...  An attacker can use the accelerometer to track the tilt of a mobile device, then he/she can recover PIN code of the lockscreen [Aviv et al. 2013 ].  ... 
doi:10.1145/2963145 fatcat:d5vhxpdywrevvbh4as6vvt576q

Deep Learning in Mobile and Wireless Networking: A Survey [article]

Chaoyun Zhang, Paul Patras, Hamed Haddadi
2019 arXiv   pre-print
The rapid uptake of mobile devices and the rising popularity of mobile applications and services pose unprecedented demands on mobile and wireless networking infrastructure.  ...  Upcoming 5G systems are evolving to support exploding mobile traffic volumes, agile management of network resource to maximize user experience, and extraction of fine-grained real-time analytics.  ...  Mobile ASR can also accelerate text input on mobile devices, Ruan et al.'  ... 
arXiv:1803.04311v3 fatcat:awuvyviarvbr5kd5ilqndpfsde

ML-CB: Machine Learning Canvas Block

Nathan Reitinger, Michelle L. Mazurek
2021 Proceedings on Privacy Enhancing Technologies  
With the aim of increasing online privacy, we present a novel, machine-learning based approach to blocking one of the three main ways website visitors are tracked online—canvas fingerprinting.  ...  Because the act of canvas fingerprinting uses, at its core, a JavaScript program, and because many of these programs are reused across the web, we are able to fit several machine learning models around  ...  This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors. We thank Steven M. Bellovin for comments on an earlier version of this paper.  ... 
doi:10.2478/popets-2021-0056 fatcat:hu52tfl55feoljvn3lfvoaqilq
« Previous Showing results 1 — 15 out of 761 results