Remote physical device fingerprinting
Reads0
Chats0
TLDR
Remote physical device fingerprinting is introduced, or fingerprinting a physical device, as opposed to an operating system or class of devices, remotely, and without the fingerprinted device's known cooperation, by exploiting small, microscopic deviations in device hardware: clock skews.Abstract:
We introduce the area of remote physical device fingerprinting, or fingerprinting a physical device, as opposed to an operating system or class of devices, remotely, and without the fingerprinted device's known cooperation. We accomplish this goal by exploiting small, microscopic deviations in device hardware: clock skews. Our techniques do not require any modification to the fingerprinted devices. Our techniques report consistent measurements when the measurer is thousands of miles, multiple hops, and tens of milliseconds away from the fingerprinted device and when the fingerprinted device is connected to the Internet from different locations and via different access technologies. Further, one can apply our passive and semipassive techniques when the fingerprinted device is behind a NAT or firewall, and. also when the device's system time is maintained via NTP or SNTP. One can use our techniques to obtain information about whether two devices on the Internet, possibly shifted in time or IP addresses, are actually the same physical device. Example applications include: computer forensics; tracking, with some probability, a physical device as it connects to the Internet from different public access points; counting the number of devices behind a NAT even when the devices use constant or random IP IDs; remotely probing a block of addresses to determine if the addresses correspond to virtual hosts, e.g., as part of a virtual honeynet; and unanonymizing anonymized network traces.read more
Citations
More filters
Book ChapterDOI
How unique is your web browser
TL;DR: The degree to which modern web browsers are subject to "device fingerprinting" via the version and configuration information that they will transmit to websites upon request is investigated, and what countermeasures may be appropriate to prevent it is discussed.
Proceedings ArticleDOI
Wireless device identification with radiometric signatures
TL;DR: The design, implement, and evaluate a technique to identify the source network interface card (NIC) of an IEEE 802.11 frame through passive radio-frequency analysis, called PARADIS, which leverages minute imperfections of transmitter hardware that are acquired at manufacture and are present even in otherwise identical NICs.
Proceedings ArticleDOI
The Web Never Forgets: Persistent Tracking Mechanisms in the Wild
TL;DR: The evaluation of the defensive techniques used by privacy-aware users finds that there exist subtle pitfalls --- such as failing to clear state on multiple browsers at once - in which a single lapse in judgement can shatter privacy defenses.
Proceedings ArticleDOI
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT
Markus Miettinen,Samuel Marchal,Ibbad Hafeez,Tommaso Frassetto,Nadarajah Asokan,Ahmad-Reza Sadeghi,Sasu Tarkoma +6 more
TL;DR: IoT Sentinel is presented, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise.
Proceedings ArticleDOI
Virtual trip lines for distributed privacy-preserving traffic monitoring
Baik Hoh,Marco Gruteser,Ryan Herring,Jeff Ban,Daniel B. Work,Juan-Carlos Herrera,Alexandre M. Bayen,Murali Annavaram,Quinn Jacobson +8 more
TL;DR: This work proposes a system based on virtual trip lines and an associated cloaking technique that facilitates the design of a distributed architecture, where no single entity has a complete knowledge of probe identities and fine-grained location information.
References
More filters
Book
The Mathematical Theory of Communication
TL;DR: The Mathematical Theory of Communication (MTOC) as discussed by the authors was originally published as a paper on communication theory more than fifty years ago and has since gone through four hardcover and sixteen paperback printings.
Journal ArticleDOI
An efficient algorith for determining the convex hull of a finite planar set
TL;DR: P can be chosen to I&E the centroid oC the triangle formed by X, y and z and Express each si E S in polar coordinates th origin P and 8 = 0 in the direction of zu~ arhitnry fixed half-line L from P.
TCP Extensions for High Performance
TL;DR: This memo presents a set of TCP extensions to improve performance over large bandwidth*delay product paths and to provide reliable operation over very high-speed paths.
Network Time Protocol (Version 3) Specification, Implementation and Analysis
TL;DR: This document describes the Network Time Protocol (NTP), specifies its formal structure and summarizes information useful for its implementation and describes the methods used for their implementation.