Mobile device identification via sensor fingerprinting

H Bojinov, Y Michalevsky, G Nakibly… - arXiv preprint arXiv …, 2014 - arxiv.org
We demonstrate how the multitude of sensors on a smartphone can be used to construct a
reliable hardware fingerprint of the phone. Such a fingerprint can be used to de-anonymize …

SensorID: Sensor calibration fingerprinting for smartphones

J Zhang, AR Beresford, I Sheret - 2019 IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Sensors are an essential component of many computer systems today. Mobile devices are a
good example, containing a vast array of sensors from accelerometers and GPS units, to …

Morellian analysis for browsers: Making web authentication stronger with canvas fingerprinting

P Laperdrix, G Avoine, B Baudry… - Detection of Intrusions and …, 2019 - Springer
In this paper, we present the first fingerprinting-based authentication scheme that is not
vulnerable to trivial replay attacks. Our proposed canvas-based fingerprinting technique …

Passpet: convenient password management and phishing protection

KP Yee, K Sitaker - Proceedings of the second symposium on Usable …, 2006 - dl.acm.org
We describe Passpet, a tool that improves both the convenience and security of website
logins through a combination of techniques. Password hashing helps users manage …

Revealing your mobile password via WiFi signals: Attacks and countermeasures

Y Meng, J Li, H Zhu, X Liang, Y Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this study, we present WindTalker, a novel and practical keystroke inference framework
that can be used to infer the sensitive keystrokes on a mobile device through WiFi-based …

Everyone is different: Client-side diversification for defending against extension fingerprinting

E Trickel, O Starov, A Kapravelos, N Nikiforakis… - 28th USENIX Security …, 2019 - usenix.org
Browser fingerprinting refers to the extraction of attributes from a user's browser which can
be combined into a near-unique fingerprint. These fingerprints can be used to re-identify …

When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals

M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu… - Proceedings of the 2016 …, 2016 - dl.acm.org
In this study, we present WindTalker, a novel and practical keystroke inference framework
that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi …

Stealing passwords by observing hands movement

D Shukla, VV Phoha - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
The use of mobile phones in public places opens up the possibilities of remote side channel
attacks on these devices. We present a video-based side channel attack to decipher …

{Fp-Scanner}: The privacy implications of browser fingerprint inconsistencies

A Vastel, P Laperdrix, W Rudametkin… - 27th USENIX Security …, 2018 - usenix.org
By exploiting the diversity of device and browser configurations, browser fingerprinting
established itself as a viable technique to enable stateless user tracking in production …

Browser fingerprinting: A survey

P Laperdrix, N Bielova, B Baudry… - ACM Transactions on the …, 2020 - dl.acm.org
With this article, we survey the research performed in the domain of browser fingerprinting,
while providing an accessible entry point to newcomers in the field. We explain how this …