GTID: A Technique for Physical Device and Device Type Fingerprinting

SV Radhakrishnan, AS Uluagac… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we introduce GTID, a technique that can actively and passively fingerprint
wireless devices and their types using wire-side observations in a local network. GTID …

Device fingerprinting in wireless networks: Challenges and opportunities

Q Xu, R Zheng, W Saad, Z Han - … Communications Surveys & …, 2015 - ieeexplore.ieee.org
Node forgery or impersonation, in which legitimate cryptographic credentials are captured
by an adversary, constitutes one major security threat facing wireless networks. The fact that …

[PDF][PDF] Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.

A Das, N Borisov, M Caesar - NDSS, 2016 - ndss-symposium.org
Modern smartphones contain motion sensors, such as accelerometers and gyroscopes.
These sensors have many useful applications; however, they can also be used to uniquely …

SmartAuth: dynamic context fingerprinting for continuous user authentication

D Preuveneers, W Joosen - Proceedings of the 30th annual ACM …, 2015 - dl.acm.org
As recent incidents have shown, weak passwords are a severe security risk for
authenticating users and granting access to protected resources. Additionally, strong …

Tripwire: Inferring internet site compromise

J DeBlasio, S Savage, GM Voelker… - Proceedings of the 2017 …, 2017 - dl.acm.org
Password reuse has been long understood as a problem: credentials stolen from one site
may be leveraged to gain access to another site for which they share a password. Indeed, it …

Clock around the clock: Time-based device fingerprinting

I Sanchez-Rola, I Santos, D Balzarotti - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Physical device fingerprinting exploits hardware features to uniquely identify a machine.
This technique has been used for authentication, license binding, or attackers identification …

How unique is your web browser?

P Eckersley - … : 10th International Symposium, PETS 2010, Berlin …, 2010 - Springer
We investigate the degree to which modern web browsers are subject to “device
fingerprinting” via the version and configuration information that they will transmit to websites …

Authentication at scale

E Grosse, M Upadhyay - IEEE Security & Privacy, 2012 - ieeexplore.ieee.org
Like many in the industry, the authors believe passwords and simple bearer tokens, such as
cookies, are no longer sufficient to keep users safe. Google employs a base level of …

Drawnapart: A device identification technique based on remote gpu fingerprinting

T Laor, N Mehanna, A Durey, V Dyadyuk… - arXiv preprint arXiv …, 2022 - arxiv.org
Browser fingerprinting aims to identify users or their devices, through scripts that execute in
the users' browser and collect information on software or hardware characteristics. It is used …

DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices

T Van Nguyen, N Sae-Bae, N Memon - computers & security, 2017 - Elsevier
This paper presents D raw-A-PIN, a user authentication system on a device with a touch
interface that supports the use of PINs. In the proposed system, the user is asked to draw her …