scispace - formally typeset
Open AccessJournal ArticleDOI

Remote physical device fingerprinting

Reads0
Chats0
TLDR
Remote physical device fingerprinting is introduced, or fingerprinting a physical device, as opposed to an operating system or class of devices, remotely, and without the fingerprinted device's known cooperation, by exploiting small, microscopic deviations in device hardware: clock skews.
Abstract
We introduce the area of remote physical device fingerprinting, or fingerprinting a physical device, as opposed to an operating system or class of devices, remotely, and without the fingerprinted device's known cooperation. We accomplish this goal by exploiting small, microscopic deviations in device hardware: clock skews. Our techniques do not require any modification to the fingerprinted devices. Our techniques report consistent measurements when the measurer is thousands of miles, multiple hops, and tens of milliseconds away from the fingerprinted device and when the fingerprinted device is connected to the Internet from different locations and via different access technologies. Further, one can apply our passive and semipassive techniques when the fingerprinted device is behind a NAT or firewall, and. also when the device's system time is maintained via NTP or SNTP. One can use our techniques to obtain information about whether two devices on the Internet, possibly shifted in time or IP addresses, are actually the same physical device. Example applications include: computer forensics; tracking, with some probability, a physical device as it connects to the Internet from different public access points; counting the number of devices behind a NAT even when the devices use constant or random IP IDs; remotely probing a block of addresses to determine if the addresses correspond to virtual hosts, e.g., as part of a virtual honeynet; and unanonymizing anonymized network traces.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

How unique is your web browser

TL;DR: The degree to which modern web browsers are subject to "device fingerprinting" via the version and configuration information that they will transmit to websites upon request is investigated, and what countermeasures may be appropriate to prevent it is discussed.
Proceedings ArticleDOI

Wireless device identification with radiometric signatures

TL;DR: The design, implement, and evaluate a technique to identify the source network interface card (NIC) of an IEEE 802.11 frame through passive radio-frequency analysis, called PARADIS, which leverages minute imperfections of transmitter hardware that are acquired at manufacture and are present even in otherwise identical NICs.
Proceedings ArticleDOI

The Web Never Forgets: Persistent Tracking Mechanisms in the Wild

TL;DR: The evaluation of the defensive techniques used by privacy-aware users finds that there exist subtle pitfalls --- such as failing to clear state on multiple browsers at once - in which a single lapse in judgement can shatter privacy defenses.
Proceedings ArticleDOI

IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT

TL;DR: IoT Sentinel is presented, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise.
Proceedings ArticleDOI

Virtual trip lines for distributed privacy-preserving traffic monitoring

TL;DR: This work proposes a system based on virtual trip lines and an associated cloaking technique that facilitates the design of a distributed architecture, where no single entity has a complete knowledge of probe identities and fine-grained location information.
References
More filters
Book

The Mathematical Theory of Communication

TL;DR: The Mathematical Theory of Communication (MTOC) as discussed by the authors was originally published as a paper on communication theory more than fifty years ago and has since gone through four hardcover and sixteen paperback printings.
Journal ArticleDOI

An efficient algorith for determining the convex hull of a finite planar set

TL;DR: P can be chosen to I&E the centroid oC the triangle formed by X, y and z and Express each si E S in polar coordinates th origin P and 8 = 0 in the direction of zu~ arhitnry fixed half-line L from P.

TCP Extensions for High Performance

TL;DR: This memo presents a set of TCP extensions to improve performance over large bandwidth*delay product paths and to provide reliable operation over very high-speed paths.

Network Time Protocol (Version 3) Specification, Implementation and Analysis

TL;DR: This document describes the Network Time Protocol (NTP), specifies its formal structure and summarizes information useful for its implementation and describes the methods used for their implementation.
Related Papers (5)