Mobile device identification via sensor fingerprinting

H Bojinov, Y Michalevsky, G Nakibly… - arXiv preprint arXiv …, 2014 - arxiv.org
… challenges to preserving user privacy and one … device ID, or fingerprint, that is independent
of the software state and survives a hard reset. Our results show a unique device fingerprint

On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms?

T Hupperich, D Maiorca, M Kührer, T Holz… - Proceedings of the 31st …, 2015 - dl.acm.org
… to web users’ privacy as it usually takes place without the users’ … fingerprinting of mobile
devices. We investigate different scenarios in which users are able to circumvent a fingerprinting

Fingerprinting mobile devices using personalized configurations

A Kurtz, H Gascon, T Becker, K Rieck… - Proceedings on Privacy …, 2016 - petsymposium.org
… , we show how a device fingerprint can be computed using 29 … user privacy in various ways,
they are not directly related to our objective—that of fingerprinting devices for longterm user

Device fingerprinting in wireless networks: Challenges and opportunities

Q Xu, R Zheng, W Saad, Z Han - … Communications Surveys & …, 2015 - ieeexplore.ieee.org
… a degree of cooperation among users. This makes them particularly … users obtain security
credentials from legitimate users and become part of the networks. The fact that mobile devices

Mobile device fingerprinting considered harmful for risk-based authentication

J Spooren, D Preuveneers, W Joosen - Proceedings of the eighth …, 2015 - dl.acm.org
… Furthermore, the dataset we used to predict contained 6000 user agents of mobile devices
(ie smartphones and tablets as classified with UADetector3). At http://fingerbank.org a more …

Accelerometer-based device fingerprinting for multi-factor mobile authentication

T Van Goethem, W Scheepers, D Preuveneers… - … Secure Software and …, 2016 - Springer
… On the robustness of mobile device fingerprinting: can mobile users escape modern web-tracking
mechanisms? In: Proceedings of the 31st Annual Computer Security Applications …

Active behavioral fingerprinting of wireless devices

S Bratus, C Cornelius, D Kotz, D Peebles - Proceedings of the first ACM …, 2008 - dl.acm.org
fingerprinting an access point can serve as additional assurance for the mobile user that …
We identified the following active fingerprinting scenarios: 1. The FromDS and ToDS bits on a …

Behavioral fingerprinting of iot devices

B Bezawada, M Bachani, J Peterson, H Shirazi… - Proceedings of the …, 2018 - dl.acm.org
… the device when the user was not interacting with the device to capture other non-interactive
behavior of the device. … as well as traic passing through the network switch from the mobile

Leveraging sensor fingerprinting for mobile device authentication

T Hupperich, H Hosseini, T Holz - … 2016, San Sebastián, Spain, July 7-8 …, 2016 - Springer
… yield precise device fingerprints when evaluating … mobile device on a flat table and leave
it still to gather clean measurements for calibration. Second, the user is asked to turn the device

IoT device fingerprint using deep learning

S Aneja, N Aneja, MS Islam - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
… since the radio transmission by the mobile device captured by monitoring stations for
fingerprinting does not require permission of a user. Non-cooperative MAC Layer frame bit analysis …