How unique is your. onion? an analysis of the fingerprintability of tor onion services

R Overdorf, M Juarez, G Acar, R Greenstadt… - Proceedings of the 2017 …, 2017 - dl.acm.org
Recent studies have shown that Tor onion (hidden) service websites are particularly
vulnerable to website fingerprinting attacks due to their limited number and sensitive nature …

Fingerphoto spoofing in mobile devices: a preliminary study

A Taneja, A Tayal, A Malhorta… - 2016 IEEE 8th …, 2016 - ieeexplore.ieee.org
Biometric-based authentication for smart handheld devices promises to provide a reliable
and alternate security mechanism compared to traditional methods such as pins, patterns …

Two-factor authentication: is the world ready? Quantifying 2FA adoption

T Petsas, G Tsirantonakis, E Athanasopoulos… - Proceedings of the …, 2015 - dl.acm.org
As text-based passwords continue to be the dominant form for user identification today,
services try to protect their costumers by offering enhanced, and more secure, technologies …

ABC: Enabling smartphone authentication with built-in camera

Z Ba, S Piao, X Fu, D Koutsonikolas… - 25th Annual Network …, 2018 - par.nsf.gov
Reliably identifying and authenticating smart-phones is critical in our daily life since they are
increasingly being used to manage sensitive data such as private messages and financial …

Leveraging personal devices for stronger password authentication from untrusted computers

M Mannan, PC van Oorschot - Journal of Computer Security, 2011 - content.iospress.com
Internet authentication for popular end-user transactions, such as online banking and e-
commerce, continues to be dominated by passwords entered through end-user PCs. Most …

Evaluating attack and defense strategies for smartphone pin shoulder surfing

H Khan, U Hengartner, D Vogel - … of the 2018 CHI Conference on Human …, 2018 - dl.acm.org
We evaluate the efficacy of shoulder surfing defenses for PIN-based authentication systems.
We find tilting the device away from the observer, a widely adopted defense strategy …

Xhound: Quantifying the fingerprintability of browser extensions

O Starov, N Nikiforakis - 2017 IEEE Symposium on Security …, 2017 - ieeexplore.ieee.org
In recent years, researchers have shown that unwanted web tracking is on the rise, as
advertisers are trying to capitalize on users' online activity, using increasingly intrusive and …

FPRandom: Randomizing core browser objects to break advanced device fingerprinting techniques

P Laperdrix, B Baudry, V Mishra - … , ESSoS 2017, Bonn, Germany, July 3-5 …, 2017 - Springer
The rich programming interfaces (APIs) provided by web browsers can be diverted to collect
a browser fingerprint. A small number of queries on these interfaces are sufficient to build a …

Improving home automation security; integrating device fingerprinting into smart home

AC Jose, R Malekian, N Ye - IEEE Access, 2016 - ieeexplore.ieee.org
This paper explains the importance of accessing modern smart homes over the Internet, and
highlights various security issues associated with it. This paper explains the evolution of …

[引用][C] Hacking mobile phones using 2D printed fingerprints

K Cao, AK Jain - Michigan State University, Tech. Rep. MSU-CSE-16-2, 2016