Mobile device identification via sensor fingerprinting
We demonstrate how the multitude of sensors on a smartphone can be used to construct a
reliable hardware fingerprint of the phone. Such a fingerprint can be used to de-anonymize …
reliable hardware fingerprint of the phone. Such a fingerprint can be used to de-anonymize …
SensorID: Sensor calibration fingerprinting for smartphones
J Zhang, AR Beresford, I Sheret - 2019 IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Sensors are an essential component of many computer systems today. Mobile devices are a
good example, containing a vast array of sensors from accelerometers and GPS units, to …
good example, containing a vast array of sensors from accelerometers and GPS units, to …
Morellian analysis for browsers: Making web authentication stronger with canvas fingerprinting
In this paper, we present the first fingerprinting-based authentication scheme that is not
vulnerable to trivial replay attacks. Our proposed canvas-based fingerprinting technique …
vulnerable to trivial replay attacks. Our proposed canvas-based fingerprinting technique …
Passpet: convenient password management and phishing protection
KP Yee, K Sitaker - Proceedings of the second symposium on Usable …, 2006 - dl.acm.org
We describe Passpet, a tool that improves both the convenience and security of website
logins through a combination of techniques. Password hashing helps users manage …
logins through a combination of techniques. Password hashing helps users manage …
Revealing your mobile password via WiFi signals: Attacks and countermeasures
In this study, we present WindTalker, a novel and practical keystroke inference framework
that can be used to infer the sensitive keystrokes on a mobile device through WiFi-based …
that can be used to infer the sensitive keystrokes on a mobile device through WiFi-based …
Everyone is different: Client-side diversification for defending against extension fingerprinting
Browser fingerprinting refers to the extraction of attributes from a user's browser which can
be combined into a near-unique fingerprint. These fingerprints can be used to re-identify …
be combined into a near-unique fingerprint. These fingerprints can be used to re-identify …
When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals
In this study, we present WindTalker, a novel and practical keystroke inference framework
that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi …
that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi …
Stealing passwords by observing hands movement
The use of mobile phones in public places opens up the possibilities of remote side channel
attacks on these devices. We present a video-based side channel attack to decipher …
attacks on these devices. We present a video-based side channel attack to decipher …
{Fp-Scanner}: The privacy implications of browser fingerprint inconsistencies
By exploiting the diversity of device and browser configurations, browser fingerprinting
established itself as a viable technique to enable stateless user tracking in production …
established itself as a viable technique to enable stateless user tracking in production …
Browser fingerprinting: A survey
With this article, we survey the research performed in the domain of browser fingerprinting,
while providing an accessible entry point to newcomers in the field. We explain how this …
while providing an accessible entry point to newcomers in the field. We explain how this …